ICT (Year 10)

Data Security

Which of the following is a common method to ensure data security?