1.Describe two cryptographic applications and how they are used in Information System Security.

Your post should be at least 350 words.

2. Describe three network security risks and how an administrator may be able to defend aganist them.

Your post should be at least 350 words.

3. What are some of the characteristics and operations of some of the malicious software that exists today?

Your post should be at least 350 words.