Which information security principle states that organizations should defend systems against any particular attack using several independent methods?
Which information security principle states that organizations should defend systems against any particular attack using several independent methods?