Encryption converts plaintext into ciphertext using an algorithm and key so that only authorised parties can recover the original information. It safeguards confidentiality when data is stored or transmitted over insecure networks. Modern ICT systems rely heavily on encryption for secure web browsing, email and payment transactions. Therefore the process described is encryption.
Option A:
Option A, compression, reduces the size of data to save bandwidth or storage but does not by itself prevent unauthorised reading. Compressed data is usually easily decompressed without secret keys.
Option B:
Option B, virtualization, refers to creating virtual instances of hardware or operating systems and is unrelated to coding data for secrecy. It addresses resource utilisation rather than confidentiality.
Option C:
Option C is correct because encryption specifically targets security by scrambling data based on cryptographic techniques. Without the appropriate decryption key, intercepted ciphertext should be unintelligible to attackers.
Option D:
Option D, defragmentation, reorganises files on storage media to improve access speed and has no role in preventing others from understanding the content.
Comment Your Answer
Please login to comment your answer.
Sign In
Sign Up
Answers commented by others
No answers commented yet. Be the first to comment!