The process of transforming plaintext information into ciphertext that can only be decoded by authorized individuals who have the decryption key is known as data encryption.
A penetration test involves simulating cyber attacks on a system, network, or application to identify vulnerabilities that malicious hackers could exploit.