Which of the following correctly lists the three legs of network security?
A. network, boundary, software
B. Physical, Personnel, System and Network security
C. Physical, personnel, component
D. Physical, network, software