Security

A method of Threat Mitigation that involves isolating critical information or vulnerable devices so that the scope of the breach cannot reach protected data.

Databases

Involves making all transactions independent of eachother