Mile2 Cybersecurity Certifications

Reply To: OCU C)ISSO D Discussion Lesson 08

#85778
Kevin Mehok
Participant

Hey Kelly,

Great job. You listed clear examples of both Symmetric Cryptography and Asymmetric cryptography. The irony is key, lol, yes, the ‘key’ for encryption. To me, the lock calling for the pair in asymmetric cryptography which regulates, if you will, private and public.

Thanks for your post.

God Bless,

Kevin

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .