.Discuss key management techniques. What are some of the considerations and issues? Give at least two examples of key management techniques.

1.. Give an (example of why data encryption is needed and when you would use encryption.

  1. Name three data elements examples that would require dataencryption (per regulations suchas, HIPPA)
  2. Discus the prosand cons between the use of hashing versus the use of encryption0n.

 

4.Discuss key management techniques. What are some of the considerations and issues? Give at least two examples of key management techniques.