Kevin, a security team member, was instructed to share a policy document with the employees. As it was supposed to be shared within the network, he used a simple algorithm to encrypt the document that just rearranges the same characters to produce the ciphertext.
Identify the type of cipher employed by Kevin in the above scenario.
Kenneth
3 months agoEzekiel
3 months agoAlesia
3 months agoSlyvia
4 months agoStephen
4 months agoErinn
4 months agoRolland
4 months agoAlex
4 months agoLouisa
5 months agoHenriette
5 months agoRupert
5 months agoKate
5 months agoRodolfo
5 months agoQueen
10 months agoBarabara
8 months agoTruman
8 months agoBronwyn
9 months agoEttie
10 months agoTheodora
9 months agoDannie
9 months agoDan
9 months agoJennie
10 months agoKanisha
9 months agoGerald
9 months agoEric
10 months agoTorie
10 months agoJoesph
10 months agoTorie
9 months agoDonette
10 months agoGlenn
11 months agoLeslie
11 months agoTelma
11 months ago