Encryption Technologies” Please respond to the following:
- Compare and contrast symmetric and asymmetric encryption and determine which you believe is the optimal choice for an enterprise. Additionally, identify each encryption’s potential uses on an enterprise level. Justify your answer.
- discuss the tool’s primary uses, strengths and weaknesses, competing products, costs, system requirements, and whether hackers and / or security personnel commonly use the tool. Explain why you would or would not consider utilizing this tool as a security professional. If you would consider utilizing this tool, provide a scenario where this tool would assist you in your duties. If you would not consider utilizing this tool, justify your reasons why.