Which of the security approach involves creating layers of security beginning with the points of access to a network and continuing with cascading layers of security at various points?
a. Defense in depth
b. Least privilege
c. Separation of privileges
d. Security through obscurity
Answer: a. Defense in depth