Which of the following is used to preserve confidentiality in software?
Encryption
Hashing
Recovery
Redundancy