Non-repudiation - CompTIA Security+ SY0-701 - 1.2

แชร์
ฝัง
  • เผยแพร่เมื่อ 24 พ.ย. 2024

ความคิดเห็น • 25

  • @DavidSmith-qo7vf
    @DavidSmith-qo7vf 7 หลายเดือนก่อน +48

    Non-Repudiation is like returning something to the store and needing to have a Receipt and the card used during purchase?

    • @afjelidfjssaf
      @afjelidfjssaf 7 หลายเดือนก่อน +18

      yeah something along those lines

    • @konteezy203
      @konteezy203 10 วันที่ผ่านมา

      I look at it as, no takebacksies.

  • @tekguru6213
    @tekguru6213 5 หลายเดือนก่อน +11

    Absolute fantastic training. You are an absolute gem. Thank you for all you have done to contribute to society.
    Question: When did Alice ever create the public key to give to Bob? When was that key ever created for Bob to gain from Alice? You mentioned in the process that Alice created a private key for herself so she could encrypt with the digital signature, but at what point did Alice ever create the public key?
    Update: Explained in another video. I realize now both keys are generated at the same time of encryption.

    • @ethanpayne4116
      @ethanpayne4116 4 หลายเดือนก่อน

      The public/private key pair is generated by Alice using some mathematics that you can read more in detail elsewhere, and the same key can be used to encrypt many documents so Alice can have created her keys potentially a long time before the interaction with Bob

  • @shobha000s
    @shobha000s 11 หลายเดือนก่อน +48

    Prof. Messer, how will Bob know which hash algorithm Alice used so that he can compare two hash values. Given, the public key does not contain any information about hash algorithm.
    Do Alice and Bob agree on a specific hash function (e.g., SHA-256, SHA-3) in first place that will be used for hashing during the digital signature process?

    • @fundamxd
      @fundamxd 10 หลายเดือนก่อน +21

      You totally get it! This is exactly what happens.

    • @thatguy1398
      @thatguy1398 6 หลายเดือนก่อน

      @@fundamxd is this agreement automatic? Or do they literally agree beforehand?

    • @fundamxd
      @fundamxd 6 หลายเดือนก่อน +9

      @@thatguy1398 They literally agree beforehand

    • @thatguy1398
      @thatguy1398 6 หลายเดือนก่อน +2

      @@fundamxdthank you

    • @fundamxd
      @fundamxd 6 หลายเดือนก่อน

      @@thatguy1398 You're welcome

  • @benjamin2713
    @benjamin2713 2 หลายเดือนก่อน

    Very useful infographics in this video!

  • @avonix4947
    @avonix4947 2 หลายเดือนก่อน

    Thank you for this excellent video!!

  • @getflashedkid6760
    @getflashedkid6760 2 หลายเดือนก่อน

    Bravo feellas!

  • @Xpressd
    @Xpressd 3 หลายเดือนก่อน

    🏆 thank you for this content 🥇

  • @tesfalegntadesse3123
    @tesfalegntadesse3123 9 หลายเดือนก่อน +10

    any one who passed CompTIA Security+ exam I wan to ask you that regarding the multiple-choice questions. For each question, is there only one correct answer, or might there be more than one correct answer?

    • @michael2093
      @michael2093 8 หลายเดือนก่อน +27

      unless the question says to pick multiple than there is only one right answer. its tough, pick the best one that fits the question.

    • @tesfalegntadesse3123
      @tesfalegntadesse3123 8 หลายเดือนก่อน +6

      @@michael2093 Thanks so much for your information

    • @Jays3DP
      @Jays3DP 2 วันที่ผ่านมา

      @@michael2093That is not entirely true. Some answers may be more right than others, but there are multiple right answers in some cases. The most right answer will have the most points, whereas the somewhat right answers may have partial or no points. the question may not even be weighed at all, as some questions are experimental. Just answers to the best of your knowledge and you’ll be fine.

  • @Vonnaismable
    @Vonnaismable 5 หลายเดือนก่อน +5

    Professor, with there being so much job-hiring scams, could this be a good way to verify authentication of emails or detecting phishing?

    • @hatboxpirate
      @hatboxpirate 3 หลายเดือนก่อน +4

      Yes, it sure can, to an extent. Using DKIM, companies can post their public keys in their DNS records and then digitally sign their emails. Recipients could use the public key to make sure emails came from the sender and are legitimate.

  • @pananonim6744
    @pananonim6744 21 วันที่ผ่านมา

    Szczęść Boże