non-repudiation Flashcards
(25 cards)
What is non-repudiation?
Non-repudiation is a security principle that ensures that a party in a transaction cannot deny the authenticity of their signature or the sending of a message.
True or False: Non-repudiation provides proof of the origin, integrity, and authenticity of data.
True
Fill in the blank: Non-repudiation is primarily achieved through the use of __________.
digital signatures
What role do digital signatures play in non-repudiation?
Digital signatures provide a way to verify the identity of the sender and ensure that the message has not been altered.
Which of the following is NOT a component of non-repudiation? A) Authentication B) Integrity C) Availability
C) Availability
What is the purpose of a timestamp in non-repudiation?
A timestamp provides a record of when a transaction occurred, which helps establish the timeline of events.
True or False: Non-repudiation can only be achieved in digital communications.
False
What is the difference between non-repudiation and authentication?
Non-repudiation ensures that a party cannot deny their actions, while authentication verifies the identity of a user or system.
Multiple Choice: Which technology is commonly used to implement non-repudiation? A) Blockchain B) Firewalls C) Antivirus Software
A) Blockchain
What is a non-repudiation service?
A non-repudiation service is a service that provides proof of the integrity and origin of data, ensuring that the sender cannot deny having sent the data.
Fill in the blank: To achieve non-repudiation, organizations often use __________ to store transaction logs.
secure audit trails
True or False: Non-repudiation is only relevant in financial transactions.
False
What is the role of a Certificate Authority (CA) in non-repudiation?
A Certificate Authority issues digital certificates that verify the identity of individuals or entities, facilitating non-repudiation.
What is the significance of public key infrastructure (PKI) in non-repudiation?
PKI provides the framework for creating, managing, and distributing digital certificates, which are essential for implementing non-repudiation.
Multiple Choice: Which of the following best describes a non-repudiation policy? A) A set of guidelines for data encryption B) A framework for ensuring accountability in transactions C) A method for securing physical access
B) A framework for ensuring accountability in transactions
What is a repudiation attack?
A repudiation attack occurs when a user denies having sent a message or completed a transaction, undermining non-repudiation.
True or False: Non-repudiation is only concerned with the sender’s actions.
False
In the context of non-repudiation, what does ‘accountability’ refer to?
Accountability refers to the obligation of individuals or entities to account for their actions, ensuring they cannot deny them later.
Fill in the blank: In a non-repudiation scenario, __________ serves as evidence of a transaction.
logs or records
What is the importance of hashing in non-repudiation?
Hashing ensures data integrity by creating a unique representation of the data, allowing verification that it has not been altered.
Multiple Choice: Which of the following is a challenge to achieving non-repudiation? A) User authentication B) Data encryption C) Key management
C) Key management
What type of evidence is typically required to prove non-repudiation?
Evidence typically includes digital signatures, timestamps, and transaction logs.
True or False: Non-repudiation can help prevent fraud.
True
What is the relationship between non-repudiation and legal compliance?
Non-repudiation supports legal compliance by providing verifiable evidence of transactions and communications.