4 Encryption Methods to Protect Your Sensitive Data