Answer:
It is where each system is designed so that it only has the permissions necessary to operate, nothing more.
Step-by-step explanation:
This is done for security concerns, which is the whole reason for cybersecurity.
8.8m questions
11.4m answers