A Look at the Vital Methods of Data Destruction