To ensure confidentiality we use encryption for data at rest (for instance AES256), full disk
encryption. Secure transport protocols for data in motion. (SSL, TLS or IPSEC). There are many
attacks against encryption, it is almost always easier to steal the key than breaking it, this is
done with cryptanalysis.