Which of the following defensive measures can help against insider attacks? a) Avoid single points of failure b) Keep a log of all users' actions c) Use code walk-throughs d) Verify credentials before allowing access to the server room e) Limit authority and permissions