1. Summarize basic considerations for secure, trustworthy software.
2. Summarize the basic security features of a well-written file encryption program.
3. Does your organization have a policy on using encryption? If so, describe how file encryption is used in the policy
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here