Discussion Post
Explain how to identify the relevant system logs so they can be reviewed for encryption issues and compromises.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.