Solved by a verified expert :Week 3 discussion
DQ1 Cryptography
Explain the role of Cryptography in authentication,
confidentiality, and integrity. Give an example where Symmetric Cryptography
(Secret Key) is normally used and an example where Asymmetric Cryptography
(Public Key) is normally used.
DQ2 Computer System Life Cycle
Describe the security issues that apply to the disposition
(retirement and disposal) phase of the Computer System Life Cycle. What needs
to be accomplished and why?