Kevin, a security team member, was instructed to share a policy document with the employees. As it was supposed to be shared within the network, he used a simple algorithm to encrypt the document that just rearranges the same characters to produce the ciphertext.
Identify the type of cipher employed by Kevin in the above scenario.
Queen
2 months agoBarabara
9 days agoTruman
10 days agoBronwyn
24 days agoEttie
2 months agoTheodora
21 days agoDannie
26 days agoDan
1 months agoJennie
2 months agoKanisha
29 days agoGerald
1 months agoEric
2 months agoTorie
2 months agoJoesph
3 months agoTorie
1 months agoDonette
2 months agoGlenn
3 months agoLeslie
3 months agoTelma
3 months ago