. Explain how a Trojan horse works.
. Compare and contrast symmetric and asymmetric encryption.
Describe how symmetric encryption and decryption work.
. Explain how a Trojan horse works.
. Compare and contrast symmetric and asymmetric encryption.
Describe how symmetric encryption and decryption work.