Kevin, a security team member, was instructed to share a policy document with the employees. As it was supposed to be shared within the network, he used a simple algorithm to encrypt the document that just rearranges the same characters to produce the ciphertext.
Identify the type of cipher employed by Kevin in the above scenario.
Joesph
4 days agoGlenn
5 days agoLeslie
10 days agoTelma
14 days ago