O'Reilly logo
  • Bradley Ross thinks this is interesting:

   An enterprise can use three main approaches to computer security: one based on correctness, one involving isolation, and one involving. The ideal method is to employ all three together.

From

Cover of Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition, 5th Edition

Note

There is a typo in this section as the third approach is not named. It is apparently obfuscation.