Discussion Post
Describe two cryptographic applications and how they are used in Information System Security.
The response should include a reference list. Using one-inch margins, Times New Roman 12 pnt font, double-space and APA style of writing and citations.