This 5 page paper discusses the pros and cons of using encryption as a security tool for corporate security. Bibliography lists 5 sources.