Kevin, a security team member, was instructed to share a policy document with the employees. As it was supposed to be shared within the network, he used a simple algorithm to encrypt the document that just rearranges the same characters to produce the ciphertext.
Identify the type of cipher employed by Kevin in the above scenario.
Kenneth
4 months agoEzekiel
5 months agoAlesia
5 months agoSlyvia
5 months agoStephen
5 months agoErinn
6 months agoRolland
6 months agoAlex
6 months agoLouisa
6 months agoHenriette
6 months agoRupert
6 months agoKate
6 months agoRodolfo
6 months agoQueen
11 months agoBarabara
10 months agoTruman
10 months agoBronwyn
10 months agoEttie
11 months agoTheodora
10 months agoDannie
10 months agoDan
11 months agoJennie
12 months agoKanisha
10 months agoGerald
11 months agoEric
11 months agoTorie
11 months agoJoesph
12 months agoTorie
11 months agoDonette
11 months agoGlenn
1 year agoLeslie
1 year agoTelma
1 year ago