What is the primary purpose of applying masking to sensitive data within an organization's IT environment?
To obscure specific data elements within a database to hide sensitive information from unauthorized viewers
To irreversibly transform data into a cryptographic string to verify its integrity
To encrypt data with a cryptographic key to ensure only authorized users can access the content
To physically separate sensitive data from the rest of the organization's data environment