Nice post on the role of the cryptographic algorithm. One good thing you need to be aware is the fact that these algorithms can be utilized in a way to strengthen an organizations existing plan by providing an additional layer of prevention especially as it relates to network security, but as Olzak (2012) notes, before looking at when and what to encrypt, it is important to understand where encryption fits in the overall security controls architecture. In your own view, do you think that encryption adds additional overhead and cost to the data process? use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA citation method (citation should be relevant and current). Page-length requirements:3paragraphs. Make sure you cite if you take a piece of someone’s work, very important and your reference should relate to your writing (don’t cite a reference because it relates to the course and not this very paper) at least 2 current and relevant academic references. No heavy paraphrasing of others work.