https://www.yourcyberpath.com/87/
\n\nIn the fourth video of this five-part series discussing the CIA-NA pentagram, Kips and Jason talk about nonrepudiation.
\n\nIn simple terms, nonrepudiation means you can't say you didn't do the thing that you did.
\n\nJason and Kip go over some examples of nonrepudiation in both the physical realm and the digital world highlighting that you should always use some type of example when you're asked about a specific term like nonrepudiation.
\n\nThey also dive deep into digital signatures, public keys, and how these are utilized in software companies and the reasons they are used.
\n\nIn the end, they discuss some hashing algorithms, how they work, and what are the best practices when using them - emphasizing that you can't have all the security and usability at the same time and you're always going to have to balance these two with each other and find something which works best for you.
\n\nWhat You\u2019ll Learn
\n\n\u25cf\xa0\xa0\xa0What is nonrepudiation?
\n\n\u25cf\xa0\xa0\xa0What kinds of interview questions could you get related to repudiation?
\n\n\u25cf\xa0\xa0\xa0What is the difference between the different availability options?
\n\n\u25cf\xa0\xa0 How can a software company provide repudiation for their code?
\n\n\u25cf\xa0\xa0\xa0How do you calculate a hash value?
\n\nRelevant Websites For This Episode
\n\n\u25cf\xa0\xa0\xa0https://www.yourcyberpath.com/
\n\nOther Relevant Episodes
\n\n\u25cf\xa0\xa0\xa0Episode 84 - The CIA Triad - The Basis of Cybersecurity (Confidentiality)
\n\n\u25cf\xa0\xa0 Episode 85 - The CIA Triad - The Basis of Cybersecurity (Integrity)
\n\n\u25cf\xa0\xa0\xa0Episode 86 - The CIA Triad - The Basis of Cybersecurity (Availability)