Computer Science (Year 9)

Data Security

Which of the following is a common method for securing data?