Reference no: EM132369908
Provide (2) 150 words response with a minimum of 2 APA references at the discussions below. Response provided should further discuss the subject or provide more insight.
DISCUSSION 1:
Over the last 5 years there have been multiple times that I have had to make sure non-repudiation was important. When being in the military you want to make sure that every email sent, or document signed is actually the person signing it. For this reason, every email is sent with a digital signature and "stamped" with non-repudiation. It is for the non-repudiation that you want to make sure to keep your smart card information to yourself and not give it out. If you were to give it out then because of the authentication and integrity that takes place, you would be held accountable for their actions.
As to prove non-repudiation you need authentication and integrity, another example is when I bought my car. Not only did they have to make sure I was who I said, but they also checked my credit score. For this reason, non-repudiation was in place, and I have to pay back the loan I received. It would be very hard to try and say that it was not me who purchased that vehicle.
The final items that I entered into non-repudiation with are my transactions with Amazon. With Amazon being a secure site used through a username and password the only way you could say this is not yourself is if the IP traced back to the purchase is a computer or device that you do not have control of or that you have never been on before. This is because through the use of a public key and site encryption, Amazon purchases become non-repudiated. For this reason, it is a horrible idea to give out your username and password for anyone else to use your account.
DISCUSSION 2:
Non-repudiation in e-commerce is when a transaction was processed and the validity of the transaction cant be disputed by the customer or the seller. Companies have turned to using encryption as a way to secure these transactions. Non-repudiation is saying the transaction did occur, it says nothing about if the authorized person made the transaction.
One example of this happening is when I bought some items at the grocery store. I used my debit card and provided the card and my pin, the transaction was carried over the Internet and encrypted with a public key.
When I bought my house the loan company used a browser based system which used a two part authentication system to sign certain documents. The loan company would send an email to the email address I provided, I would then enter my information and establish a pin to sign the documents. Due to my work schedule my wife was the person actually signing these documents for me.
On occasion I will do some day trading on my account setup through an online brokerage firm. These transactions are made through e-commerce which is protected by a secured encryption tunnel which is used to try and guarantee the person making the trades is the person who is authorized to do so.
Each one of these browser based transactions are performed over a HTTPS encrypted web page which has a certificate that validates the site being used. E-commerce applications use servers that stores digital certificates that provide a basis for the sharing of private and public keys.