This document surveys methods for confidential data storage and deletion. It begins with an introduction explaining the importance of protecting sensitive data throughout its lifetime, from storage to disposal. It then provides background on security concepts and compares existing approaches based on their strength of confidentiality, ease of use, performance, and flexibility in implementing security policies. The focus is on single-user computing environments and threats from dead forensic analysis of storage media.