Which of the following strategies, if used individually, is viewed to be the most secure method to protect data?