________ is being able to manage security technologies from a single security management console or at least from a relatively few consoles.
When an attacker has to break through multiple countermeasures to succeed, it's known as ________.
The systems development life cycle is most connected to the ________ of the plan-protect-respond cycle of security management.
Implementing no countermeasures to security challenges and absorbing any damages that may occur is known as ________.
The most common example of risk transference is ________.
Installing firewalls in a company is an example of ________.