Approaches, Significance, Pros and Cons of Securing Data