The use of passwords

The use of data encryption

The use of a firewall

The use of intension detection system

Digital certificate e.t.c

Example

1. Data encryption: Involves the translation of data into a form that is illegible without a deciphering mechanism

2. Password: this involves a secret word or phrase that gives authorized user access to a particular file, system or database.

Copyright warnings! Do not copy.