Watch this video on YouTube
Which security concept, if implemented correctly, will protect the data on a system, even if a malicious actor gains access to the actual system?