Provide a scenario and explain how data is secured using the plaintext and ciphertext process. choose one other scholarly reference to support your discussion.

In this essay, you will provide a real-world example of how cryptography/hashing can be used in order to secure data transmission across a network. Provide a scenario and explain how data is secured using the plaintext and ciphertext process. choose one other scholarly reference to support your discussion.
Requirements:
Submit in a Word document.Include cover pageMust be a minimum of two pages (excluding references and cover page)Appropriate APA format is required.Properly cite and reference any borrowed resource(s)