Common Approaches to Security
One type of approach is based on physical security
- usually expensive and of limited scope
- may provide the best assurances
Other (more common) approaches
- hide your data somehow
- just don’t tell (“security through obscurity”)
- scramble it using some math (cryptography)!