Topic 2: Data Transmission
2.3 Encryption
2.3.2 Understand how data is encrypted using symmetric and asymmetric encryption
Asymmetric encryption includes the use of public and private keys