rendering information unreadable in such a way that authorized users may later make the information readable b. placing information in the de-militarized zone c. adding a password to information d. placing information behind a firewall