The document discusses various methods of securing data including encryption techniques like symmetric encryption, public key encryption, hashing, and digital signatures as well as network security concepts like firewalls, intrusion detection, and viruses. It provides details on algorithms like DES, RSA, and protocols like SSL/TLS while summarizing common data security threats and approaches to mitigate risks.