Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Non Repudiation

Developing Next-Generation Countermeasures for Homeland Security Threat Prevention
Assurance the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the data.
Published in Chapter:
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Maurice Dawson (Illinois Institute of Technology, USA), Marwan Omar (Saint Leo University, USA), Jonathan Abramson (Post University, USA), Brian Leonard (Alabama A&M University, USA), and Dustin Bessette (National Graduate School of Quality Management, USA)
DOI: 10.4018/978-1-5225-0703-1.ch010
Abstract
The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR