Determine encryption that is needed to provide security for the company’s system. This will include plans to address: Passive and active network attacks Symmetric encryption Dissecting block and stream ciphers Dissecting the public-key algorithms Creating key pairs Passwords, hash, salt, and rainbow tables Secure Sockets Layer Email and IP security