what is a vulnerability discovery policy Post navigation Natalie has detected a computer security incident. Which would be her BEST reaction strategy? What is Asymmetric encryption how many keys do we need and are they both Public ?