Chapter 8 – Asymmetric Cryptography and PKI Section 4 – Cryptography in Use Certified Information Systems Security Officer P a g e | 414 ©Mile2 – All Rights Reserved - v18