Watch this video on YouTube
Which of the following best describes the role of security controls in an information security strategy?