I am interested in helping you get the best solution for your situation.
With that in mind, please know that this post is meant to be helpful rather than negative. Also, the gist of my response is based on your use of the term "extremely sensitive" - I interpret that to mean that the potential consequences of a breach in security are vastly greater than the substantial cost in money, time, and resources necessary to successfully implement a secure application. If the potential consequences of a security breach are not really so bad after all, then perhaps my comments are overly cautious.
If security is truly your number one priority, and you are new to Access, then you should consider giving this task to a person or company with a proven track record in Access security. Learning by doing is fine for forms, but not a good idea for security. Defects in forms typically result in a temporary loss in usability or functionality, and can be fixed by simple editing. Defects in security can result in unrecoverable and potentially huge losses.
Access security is difficult to master, and there are numerous potential weak links that can be exploited by a knowledgeable person to gain unauthorized access to your data. If you search the web on this topic, you will even find many products and services that claim the ability to open your secure database. Many people assert that Access is fundamentally insecure.
In addition to security, you mentioned:
* splitting the DB - This is almost always a good idea, but adds slightly to the comlexity to your security scheme.
* encrypting via extra table - Encrypting comes with its own can of worms - what encryption technology are you using?
* access restricted to "admin level" - Do you mean access to the file is restricted by operating system permissions, or do you mean the "admin" user or "Admins" group in Access? If you mean the latter, this is big trouble, because, contrary to intuition, the admin user is totally insecure as anyone with even slight familiarity with Access security will confirm.
Implementing user-level security for a multi-user, two-tiered Access application is not a trivial task, especially for a beginner. If you choose to do it on your own, you have a risky and big task ahead of you. I'd recommend getting someone else to do it, but if you choose not to, I'd recommend (1) taking formal training on Access development and Access security, (2) building many practice databases until you know where the weak links are and until you know you have the secure development process down pat, and (3) testing your security implementation by trying some of the products and/or services that claim to be able to open your secured database.
I put some time into this reply because I hope you will get the best solution for your situation. However, I really think you should get formal training before implementing a secure database.
Good luck...