Authors: Surbhi Sahu
Abstract: In modern digital environments, sensitive information is constantly transmitted across networks and stored in distributed systems such as databases, cloud infrastructures, and storage devices. The increasing number of cyber threats such as data breaches, interception attacks, and unauthorized access has made data security a major concern for organizations and individuals. This research paper examines techniques used to secure data during transmission and storage, including encryption algorithms, secure communication protocols, and access control mechanisms. Symmetric and asymmetric cryptographic methods such as AES, DES, RSA, and ECC are analyzed to understand their effectiveness in protecting data confidentiality and integrity. Additionally, modern security approaches such as homomorphic encryption, blockchain-based storage, and quantum‑resistant cryptography are discussed. The paper concludes that a combination of encryption techniques, secure protocols, and strong authentication systems is essential for protecting sensitive information in modern computing systems.