Describe

 Describe asymmetric, symmetric and public versus private keys. Also pick a type of encryption AES, DES some type and provide an explanation of how that encryption can be used to protect the CIA triad. 

Tags: No tags