answersLogoWhite

0

Non-repudiation is the inability to deny sending a message, and is usually accomplished via digital signatures or a trusted third party (TTP).

If the signature is known to belong to the sender, then we can assume that any message sent using that signature was sent with the knowledge of the sender. Therefore, the sender can not later say, "I never sent a resignation letter" when we have a digitally signed message saying otherwise. This method is common with asymmetric (public key) cryptography.

When using a TTP, the sender will send a message (signed or not) to a third party which the sender and receiver have previously agreed upon, the TTP then forwards the message to the final recipient(s). This method of transmission is generally used with symmetric (private key) cryptography. Because the TTP has received the message, they essentially act as witnesses, so the sender can not deny having sent a message.

The caveat with non-repudiation is that we assume the keys have not been compromised - but that's another discussion. The mechanics of how these forms of cryptography work can be found elsewhere on this site, or at sites dedicated to IA, cybersecurity, and cryptography.

User Avatar

Wiki User

14y ago

What else can I help you with?

Continue Learning about Information Science

Is responsible for ensuring that each assigned DoD information system has a designated Information Assurance Manager IAM with the support authority and resources to satisfy the responsibilities es?

The Defense Information Systems Agency (DISA) is responsible for ensuring that each DoD information system has a designated Information Assurance Manager (IAM) with the necessary support, authority, and resources to fulfill their responsibilities for information assurance. This is to ensure that the information systems adhere to the DoD's security requirements and guidelines.


Information assurance represents an internal human threat?

While employees can pose a threat to information security through intentional or unintentional actions, information assurance focuses on ensuring the confidentiality, integrity, and availability of data and information systems. It involves implementing security measures, policies, and protocols to protect against both internal and external threats to an organization's information assets.


Best describes IA for Information Assurance Awareness?

Information Assurance Awareness (IA) is a program designed to educate individuals about the importance of safeguarding sensitive information and systems from security threats. It aims to promote a culture of security awareness, best practices, and compliance with policies and regulations to mitigate risks and protect organizations from cyber attacks.


What are the duties of the information assurance manager?

An information assurance manager is responsible for overseeing the security of an organization's information systems, including implementing security policies, conducting risk assessments, and ensuring compliance with security regulations. They also manage security incidents, provide security awareness training, and work to continuously improve the organization's security posture.


What is scanning footprinting and enumeration in Information Assurance?

Scanning in information assurance involves using tools to search and analyze a network for vulnerabilities and weak points. Footprinting is the first step in scanning, where attackers gather information about the target system to understand its structure and potential entry points. Enumeration is the process of extracting more detailed information about the target system, such as usernames and network resources, to plan a potential attack.

Related Questions

Who is responsible for Information Assurance?

Normally, a Senior Information Assurance Officer is responsible for Information Assurance.


What is your point of contact for reporting computer security incidents?

Information Assurance Manager (IAM) Information Assurance Officer (IAO


Confidentiality is the assurance that information is not disclosed to?

Confidentiality is the assurance that things are not disclosed to unauthorized recipients.


What kind of practice is information assurance?

Information assurance is about minimizing risks when dealing with information and data. It is an important practice when dealing with the storage and processing of digital data.


What Assurance that information is not disclosed to unauthorized recipients?

Confidentiality is the assurance that things are not disclosed to unauthorized recipients.


Assurance that information is not disclosed to unauthorized recipients?

Confidentiality is the assurance that things are not disclosed to unauthorized recipients.


Nonrepudiation ensures users cannot deny sending andor receiving data?

true


Where can one find more information on pearl assurance?

The first place to look for information about Pearl Assurance would be their company website which has pages describing their business philosophy and also has a page with contact information. Wikipedia also has a page for Pearl Assurance.


What is IT QA?

information technology quality assurance


What type of information is dealt with in an assurance service?

Information in an assurance service can be financial or nonfinancial, historical or forward-looking, discrete data or information about systems, internal or external to the decision maker.


What does diacap mean?

DoD InfDoD Information Assurance Certification and Accreditation Programormation Assurance Certification and Accreditation Program


What is is the assurance that information is not disclosed to unauthorized individuals processes or devices?

Confidentiality is the assurance that things are not disclosed to unauthorized recipients.