Your enterprise is developing a database system that will contain highly sensitive data. Security of the data will take priority over database processing speed. Which database protection technique should be employed?
A.
Backups
B.
User views
C.
Encryption
D.
Integrity controls
C