Which of the following security strategies allows a company to limit damage to internal systems and provides loss control?