Which of the following is a defense technique to protect computers from incoming risks?