The practice of having multiple overlapping means of securing the environment with a variety of methods.
a) DDoS protection
b) Multi-factor authentication
c) Defense in depth
d) Single sign-on