Section 3.9 Compare Other Methods of Data Protection