Non repudiation responses

Assignment Help Basic Computer Science
Reference no: EM132369908

Provide (2) 150 words response with a minimum of 2 APA references at the discussions below. Response provided should further discuss the subject or provide more insight.

DISCUSSION 1:

Over the last 5 years there have been multiple times that I have had to make sure non-repudiation was important. When being in the military you want to make sure that every email sent, or document signed is actually the person signing it. For this reason, every email is sent with a digital signature and "stamped" with non-repudiation. It is for the non-repudiation that you want to make sure to keep your smart card information to yourself and not give it out. If you were to give it out then because of the authentication and integrity that takes place, you would be held accountable for their actions.

As to prove non-repudiation you need authentication and integrity, another example is when I bought my car. Not only did they have to make sure I was who I said, but they also checked my credit score. For this reason, non-repudiation was in place, and I have to pay back the loan I received. It would be very hard to try and say that it was not me who purchased that vehicle.

The final items that I entered into non-repudiation with are my transactions with Amazon. With Amazon being a secure site used through a username and password the only way you could say this is not yourself is if the IP traced back to the purchase is a computer or device that you do not have control of or that you have never been on before. This is because through the use of a public key and site encryption, Amazon purchases become non-repudiated. For this reason, it is a horrible idea to give out your username and password for anyone else to use your account.

DISCUSSION 2:

Non-repudiation in e-commerce is when a transaction was processed and the validity of the transaction cant be disputed by the customer or the seller. Companies have turned to using encryption as a way to secure these transactions. Non-repudiation is saying the transaction did occur, it says nothing about if the authorized person made the transaction.

One example of this happening is when I bought some items at the grocery store. I used my debit card and provided the card and my pin, the transaction was carried over the Internet and encrypted with a public key.

When I bought my house the loan company used a browser based system which used a two part authentication system to sign certain documents. The loan company would send an email to the email address I provided, I would then enter my information and establish a pin to sign the documents. Due to my work schedule my wife was the person actually signing these documents for me.

On occasion I will do some day trading on my account setup through an online brokerage firm. These transactions are made through e-commerce which is protected by a secured encryption tunnel which is used to try and guarantee the person making the trades is the person who is authorized to do so.

Each one of these browser based transactions are performed over a HTTPS encrypted web page which has a certificate that validates the site being used. E-commerce applications use servers that stores digital certificates that provide a basis for the sharing of private and public keys.

Reference no: EM132369908

Questions Cloud

Delphi technique-brainstorming or nominal group technique : Define and briefly discuss the following brainstorming techniques, the delphi technique, brainstorming, or nominal group technique.
Discuss from personal point of view advantages-disadvantages : Discuss from your personal point of view the advantages/disadvantages and like/dislike of working for each gender.
Differences exist between men and women in negotiation : What types of differences exist between men and women in negotiation?
Methods to assess the quality of simulations : The Standard View method relies on realist perspective because it refers to observability of reality to compare real with simulated data produced by simulation
Non repudiation responses : Non-repudiation in e-commerce is when a transaction was processed and the validity of the transaction cant be disputed by the customer or the seller.
Compliance laws and challenges responses : It is necessary to have U.S. compliance laws to ensure that data is handled properly and there are standards that must be upheld to some degree.
Actions and making appropriate connections : Reflecting on your thoughts, feelings, and actions and making appropriate connections will help you plan for your future success.
Security attacks through wap : Produce a report on why sensitive information should not be sent over the Wireless Application Protocol.
Characteristics of successful IG program : identification and the introduction of the Principles, and the characteristics of a successful IG program.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create a procedure namedfindthrees that returns 1

Create a procedure namedFindThrees that returns 1 if an array has three consecutive values of 3 somewhere in the array.

  Can rtp be designed to eliminate the sequence number field

The RTP incorporates a sequence number filed in addition to the timestamp field. Can RTP be designed to eliminate the sequence number field and use the timestamp field to resequence the out-of-order received packets? Justify your answer.

  Formatting and installation of windows

Define steps and state procedures of formatting and installation of windows operating system on a computer or a system?

  What is the role of v&v in system vulnerability

Part of the problem in design flaws involves issues associated with software verification and validation (V&V). What is the role of V&V in system vulnerability?

  Receive higher wage rates than others

1. Provide three important reasons why some workers receive higher wage rates than others.

  What major problem do you see with this method

What major problem do you see with this method?

  Stocks on margin and buying call options for that stock

What are similarities between buying stocks on margin and buying call options for that stock?

  Write a program to erase the first 100 words of the on-chip

Write a program to erase the first 100 words of the on-chip

  Design an efficient incremental update algorithm

The sampling cube was proposed for multidimensional analysis of sampling data (e.g., survey data). In many real applications, sampling data can be of high dimensionality (e.g., it is not unusual to have more than 50 dimensions in a survey data set..

  Product and expenditure approaches

Determine GDP in this economy during this year by using the product and expenditure approaches.

  Give the correct shift and how many tries it took you

Decrypt the string EILKNPWJP (which was encrypted with a Caesar Cipher) using the Vigenere square and the fact that ``E'', ``T'' and ``A'' are the most common

  Analyze the data from this experiment (use a = 0.05)

Analyze the data from this experiment (use α = 0.05).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd