Question No. 1. Describe the three goals of cryptography.
Question No. 2. Draw a table showing if hashing and data signature meet the goals of cryptography
Question No. 3. Cite at least two examples of incidents for each of the incidents severity levels.
Question No. 4. How the company should act with employees that report false positive incidents