__________ is a strategy for the protection of information assets that uses multiple layers and different types of controls (managerial, operational, and technical) to provide optimal protection.
Defense in depth is secure strategy used for the protection of information assets that employs the use of multiple layers and different types of controls to provide optimal protection.
The phrase "defense in depth" is often associated with the field of cyber-security.
It is a sure and secure way of storing data in a database.
This methodology is an information assurance procedure that creates a multi-layered approach to avoid security breaches in handling of data.