backup data public key infrastructure analysis secure methods database laptop encryption cryptography security recovery authentication computer public key notebook computer repair hosting internet security