<Li> Logging and auditing </Li> <Li> Physical security (e.g. deadbolt locks) </Li> <Li> Timed access control </Li> <Li> Internet Security Awareness Training </Li>

All of the following are benefits of the defense-in-depth approach except