Which security strategy requires using several, varying methods to protect IT systems against attacks?
Defense in depth
Three-way handshake
Covert channels
Exponential backoff algorithm
Submit