👤

What are referred to as techniques for ensuring that the data stored in a computer cannot be read or compromised by any stranger without the owner's authorization?