In: Physics
Short answer
Part A) (TCO 2) Briefly explain how the three effects of security controls--prevention, detection, and recovery--can be used to maintain the known good state for a system.
Part B) (TCO 10) Explain how a user's public key is protected in an asymmetric cryptosystem.