Match each description on the left with the corresponding term on the right.
___ The theory that unless a subject is given explicit access to an object, it should be denied access to that object
___ Series of checks and balances to make sure the entire system is secured from multiple perspectives
___ Assurance that an entity only has the minimal amount of privileges to perform their duties
___The breaking down of larger tasks into smaller, more manageable tasks
1. Encapsulation
2. Fail-Safe Defaults/Fail Secure
3. Isolation
4. Layering
5. Least Privilege
6. Modularity