3.3 Strategies to protect data

Question goes here


Info goes here