The message is sent over the network and the receiving end decrypts the message with the right key to
view the content. In securing data, the encryption procedures are categorized into two which is Asymmetric and
Symmetric encryption techniques. These techniques depends on the type of security key that is been deployed to
encrypt or decrypt the data that was secured.