The use of passwords
The use of data encryption
The use of a firewall
The use of intension detection system
Digital certificate e.t.c
Example
1. Data encryption: Involves the translation of data into a form that is illegible without a deciphering mechanism
2. Password: this involves a secret word or phrase that gives authorized user access to a particular file, system or database.