Watch this video on YouTube
Which of the following methods involves deleting encryption keys to render encrypted data inaccessible?