Kevin, a security team member, was instructed to share a policy document with the employees. As it was supposed to be shared within the network, he used a simple algorithm to encrypt the document that just rearranges the same characters to produce the ciphertext.
Identify the type of cipher employed by Kevin in the above scenario.
Kenneth
3 months agoEzekiel
4 months agoAlesia
4 months agoSlyvia
4 months agoStephen
4 months agoErinn
4 months agoRolland
5 months agoAlex
5 months agoLouisa
5 months agoHenriette
5 months agoRupert
5 months agoKate
5 months agoRodolfo
5 months agoQueen
10 months agoBarabara
9 months agoTruman
9 months agoBronwyn
9 months agoEttie
10 months agoTheodora
9 months agoDannie
9 months agoDan
10 months agoJennie
11 months agoKanisha
9 months agoGerald
10 months agoEric
10 months agoTorie
10 months agoJoesph
11 months agoTorie
10 months agoDonette
10 months agoGlenn
11 months agoLeslie
11 months agoTelma
11 months ago