A pharmaceutical company wants to apply encryption throughout the lifecycle of their data generated by the drug research team. Initially, the company wants to encrypt the data at rest. Which of the following encryption methods should the company use ________.
1) Symmetric encryption
2) Asymmetric encryption
3) Hashing
4) Digital signatures