For this assignment, create a new message and address the following items in your response.
- Describe the five basic attacks on authentication systems.
- Outline the symmetric encryption process and explain the components involved in the process.
- Summarize the different situations in which people use file encryption software.
- Describe the different categories of asymmetric encryption algorithms and how they are used in practice.