Problem:
In the field of Information Security, businesses and organizations must encrypt data so that the transfer of personal information is not compromised. In this discussion, we will go through the process of encryption and then apply the results of the encryption to the concepts of Sets we have studied this week: 1) Watch the following video showing a demonstration of how to do your initial posting: MA2000 Discussion 2.1 Example 2) Open the Discussion 02.1 Assignment PDF. Using the first letter of your last name, identify the first word and second word that you will encrypt using the Caesar Cipher method. 3) Perform the encryption using the Caesar Cipher on your first word. Eliminate all duplicate elements in your encryption. In your initial post provide the set of distinct letters as a set in roster form (i.e. the "{", followed by the distinct list of letters, followed by a "}" 4) Perform the encryption using the Caesar Cipher on your second word. Eliminate all duplicate elements in your encryption. In your initial post provide the set of distinct letters as a set in roster form (i.e. the "{", followed by the distinct list of letters, followed by a "}" 5)