The common technique for masking contents of messages or other information traffic so that opponents, even if they captured the message, could not extract the information from the message is _________ .
What will be an ideal response?
ENCRYPTION
Business