Which of the following is an effective solution to ensure confidentiality?
(1)Logging and Auditing
(2)Data Hiding
(3)Network Monitoring
(4)Encryption