Kevin, a security team member, was instructed to share a policy document with the employees. As it was supposed to be shared within the network, he used a simple algorithm to encrypt the document that just rearranges the same characters to produce the ciphertext.
Identify the type of cipher employed by Kevin in the above scenario.
Queen
2 months agoBarabara
28 days agoTruman
29 days agoBronwyn
1 months agoEttie
2 months agoTheodora
1 months agoDannie
2 months agoDan
2 months agoJennie
3 months agoKanisha
2 months agoGerald
2 months agoEric
2 months agoTorie
2 months agoJoesph
3 months agoTorie
2 months agoDonette
2 months agoGlenn
3 months agoLeslie
3 months agoTelma
4 months ago