An intruder with malicious intent breaks into an office and steals a hard drive

containing sensitive information about the company's business. however, when

attempting to access the drive's contents, the intruder is met with the company's

authentication protocols and data encryption measures. what type of security is

illustrated in this example?

product security

data security

governance

cyber intelligence