Building an Impenetrable Data Security Management System