An Analysis Contemporary Security Methods Crucial Opportinity for Ensuring Privacy and Protection