Information Security

Information Security

Describe two cryptographic applications and how they are used in Information System Security. at least 300 words.