Employees of the Tyrell Corporation must log in to the organ…

Employees of the Tyrell Corporation must log in to the organization’s secure wireless network to access organizational resources. The network uses digital keys and algorithms to transform clear text into coded, unintelligible text for secure communication. This is an example of ____________.