Information Security
Control Methods
Encryption can be used as a control to mitigate any Threats from exploiting Vulnerabilities such that it upholds The CIA Triad, the concept of encryption as a control is to scramble data so that its meaningless for intruders without how it was scrambled
Encryption Example
Data can only be read by someone who has the decryption key
Feynman
If you bike is locked, the only way to ride your bike is to open it using that specific key. If anyone who doesn’t have that key tried to unlock the bike it wouldn’t work