COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Integrity
|
|
Authentication
|
|
Confidentiality
|
|
Authorization
|
|
Non-repudiation
|
Detailed explanation-1: -Digital signatures provide authenticity protection, integrity protection, and non-repudiation, but not confidentiality protection. The result of a cryptographic transformation of data that, when properly implemented, provides origin authentication, assurance of data integrity and signatory non-repudiation.
Detailed explanation-2: -Nonrepudiation is typically comprised of authentication, auditing/logging, and cryptography services.
Detailed explanation-3: -A service using a digital signature that is used to support a determination by a third party of whether a message was actually signed by a given entity.
Detailed explanation-4: -Nonrepudiation is achieved through cryptography, like digital signatures, and includes other services for authentication, auditing and logging. In online transactions, digital signatures ensure that a party cannot later deny sending information or deny the authenticity of its signature.