1. Official Vendor Documentation (Cisco): In its overview of data security, Cisco identifies encryption as a primary technology for protecting data. "Data security includes... encryption, hashing, tokenization, and key management practices that protect data across all applications and platforms." This positions encryption as a core component of a data security strategy.
Source: Cisco, "What Is Data Security?", cisco.com. Accessed under the "How does data security work?" section.
2. Peer-reviewed Academic Publications (via University Textbook): Foundational cybersecurity textbooks explicitly link encryption to the core security principle of confidentiality. The OSI security architecture defines confidentiality as a primary security service, with encryption being the most common mechanism to provide it.
Source: Stallings, W., & Brown, L. (2018). Computer Security: Principles and Practice (4th ed.). Pearson. Chapter 1, Section 1.2, "The OSI Security Architecture," and Chapter 2, "Introduction to Cryptography."
3. Official Standards Documentation (NIST): The National Institute of Standards and Technology (NIST) identifies encryption as a fundamental security control for protecting information. For example, control SC-28 requires the protection of information at rest through mechanisms including encryption.
Source: NIST Special Publication 800-53 Revision 5, "Security and Privacy Controls for Information Systems and Organizations," Control Family: System and Communications Protection (SC), Control ID: SC-28.