Which of the following prevention methods is considered to be digital security?