An information system owner has supplied a new requirement to the development team that calls
for increased non-repudiation within the application. After undergoing several audits, the owner
determined that current levels of non-repudiation were insufficient. Which of the following
capabilities would be MOST appropriate to consider implementing is response to the new
requirement?
A.
Transitive trust
B.
Symmetric encryption
C.
Two-factor authentication
D.
Digital signatures
E.
One-time passwords