Make a pro/con list of when to use file encryption and when to use file-based access control, like access control lists. In a pro/con list, you list the two alternatives (“File Encryption” and “Access Control”) and then under each, make a list of features that favor choosing that alternative
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here