Watch this video on YouTube
In the context of the CIA Triad, which of the following security controls would primarily enhance data availability? (★)