They all involve access to information. Authentication techniques such as passwords/passphrases/SSO etc. all are methods of gaining access to information. Authentication can be something you know (passwords), something you have (key/card), or something you are (fingerprint, face ID). Access control monitoring is a method of keeping track of who is accessing data and if they should have access or not. Systems such as IDS and IPS can detect breaches and alert system admins of the intrusions.