This week focused on security. Using the example of Bob, Alice, and Trudy, we had an overview of cryptography. We saw the difference between symmetric and public key encryption, and the importance of having public/private key pairs. We also saw the importance of authentication, in order to combat man-in-the-middle attacks.