Which of the following security techniques is the company applying?