A systems administrator receives an alert indicating potential unauthorized access to sensitive data, suggesting either an internal compromise or an external breach. The organization wants to prevent future occurrences of similar issues. To address this, the systems administrator is tasked with implementing stricter controls. Considering the nature of the unauthorized access, which of the following measures would be most effective?
A.Data obfuscation
B.Data encryption
C.Data masking
D.Permission restrictions