Discussion: Information Assurance
a) Describe two cryptographic applications and how they are used in Information System Security.
b) Describe three network security risks and how an administrator may be able to defend aganist them.
c) What are some of the characteristics and operations of some of the malicious software that exists today?
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.