Which of the following defensive measures can help against insider attacks?
a) Avoid single points of failure
b) Keep a log of all users' actions
c) Use code walk-throughs
d) Verify credentials before allowing access to the server room
e) Limit authority and permissions