... unavailable through its primary mechanism, is an important part of your security plan Unfortunately, key recovery opens another can of worms relating to an individual’s privacy and the presumed control ... staff for any training, policies, and procedures they may need to be aware of if they must manage keys 141 142 Chapter Selling Security Worksheet for Encryption IMPACT ANALYSIS ID BEFORE PLAN PERCENT ... password attempts And, finally, many smart cards can be configured so that the key is generated directly on the smart card and never leaves it This means that hackers cannot gain any access to the...