What are the strengths and weaknesses of asymmetric key cryptography and give an example of where this type of cryptography is used.

1. What are the strengths and weaknesses of asymmetric key cryptography and give an example of where this type of cryptography is used.

 2. What is cryptanalysis and describe some of the common cryptanalytic techniques used in attacks.

3. What is CPTED and describe how following the CPTED discipline can provide a more aesthetic alternative to classic target hardening approaches. Make sure that the three CPTED strategies are covered in your response.