When considering data center security. which aspect represents the weakest link?