The Implementation method(s) can be used to incorporate multilayer access control

Determine the impact that cryptography plays on email exchange. Should a company encrypt their email traffic and what would be the disadvantage for encrypting the data. You must use at least two scholarly resource.

Sample Solution