5 methods of protecting data