Analyze and apply the most appropriate solutions to problems related to the field of Security and Information Assurance.You are assigned to manage keys for a cryptographic system in your company. You found that one of the keys is leaked. What is the impact of a leaked cryptography key to a company? Provide four (4) recommendations to compromise this vulneraFor more information on A Cryptographic System check on:https://en.wikipedia.org/wiki/Cryptography