issc422 discussion 2
. Be sure to list your references at the end of your post. References must be in APA citation format. All posts must be a minimum of 250-300 words.
Topic: Public Key Infrastructure
Which one of the following statements is most correct about data encryption as a method of protecting data?
- It should sometimes be used for password files
- It is usually easily administered
- It makes few demands on system resources
- It requires careful key Management