A ______________ is comprised of encryption technologies, services and software than an organization employs to protect its data transactions and other business interactions from being comprised.
Encryption
Tunneling
SSL
Public Key Infrastructure (PKI)