Kevin, a security team member, was instructed to share a policy document with the employees. As it was supposed to be shared within the network, he used a simple algorithm to encrypt the document that just rearranges the same characters to produce the ciphertext.
Identify the type of cipher employed by Kevin in the above scenario.
Jennie
4 days agoJoesph
13 days agoGlenn
14 days agoLeslie
19 days agoTelma
23 days ago