Which of the following techniques is BEST suited to preserve the confidentiality of a system’s data?
Audit log review
Database encryption
Immutable backups
Database record locking
Submit