Preeti needs to send a very confidential message to her colleague in office over a secure channel. She uses a technique wherein an actual message (which is in readable form) can be converted into an unreadable message. This concept is known as____
a. Encryption
b. Decryption
c. Plagiarism
d. Data Security