Writing and Discussion

User Generated

QbaalYrr

Writing

Description

Below are the quesitons:

Discussion:

Describe a well-known example or personal experience of repudiation (please do not include specific names of organizations or people).

Writing Assignment:

In approximately 300 words, answer the question below.

Follow APA guidelines. Which of the following do you prefer most and why?

• STRIDE

• STRIDE-per-Element

• STRIDE-per-Interaction

• DESIST

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: REPUDIATION AND STRIDE

Repudiation and STRIDE
Name
Institution

1

REPUDIATION AND STRIDE

2
Repudiation and STRIDE

A repudiation attack in relation to computer science is made to happen when a system or
an application fails to adopt controls in order to track properly and to log the action of the users
hence leading to identification forge of the new actions and permitting malicious manipulation.
The repudiation can be used in the changing of the authoring information of the actions which
the malicious user executes in the logging a data which is wrong to wrong log files. The usage of
repudiation can usually be extended manipulation of data which is general in the name of others
and also spoofing mail messages in a similar manner. If repudiation occurs, the data which is
stored in the log files can be termed as misleading and also invalid. Repudiation can really lead
to poor performance in organizations in case it occurs. Therefore, organizations should always
work hard to avoid this attack.
Example
Use of digital signatures in business activities is an example of repudiation. A retailer in
an E-commerce business can electronically accept invoices from a supplier through the use of an
interface which is integrated. Therefore, the partner is automatically authenticated by the
interface by simply confirming that they can still decrypt a message which was encrypted using a
key which is public and it is found on another partner’s certificate which is digital. This process
involves sending a hash code which is encrypted and also requires the other partner to decrypt
and also send it back. Hence, an audit trail is created which includes the hash code which is
unique and that was decrypted by the partner. Therefore, the only way that the partner can claim
the transaction realistically that did not happen in order to claim the key which is private was
compromised. This is an example ...


Anonymous
Great! 10/10 would recommend using Studypool to help you study.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags