Problem
• Topic I: "Decrypting an encrypted document" An employee of your company has left the organization on poor terms. Before they left they encrypted all of their important documents. This employee did not leave a decryption key and has not responded to be contacted. You have been asked by your manager to try and retrieve the data by using all means possible. Using what was learned this week how would you go about trying to retrieve the data?
• Topic II: "Cryptography/encryption" - Ee covered various items relating to cryptography and/or data encryption. Which of the topics that were covered under cryptography/encryption did you find the most interesting and/or important? Please explain in detail why.
• Topic III: "Certificates" - We looked discussed the use of certificates. After reading this section how secure or insecure do you feel this method of proving identity and/or securing communications is? Can you think of any ways the use of certificates can be compromised?