An information system owner has supplied a new requirement to the development team that calls for increased
non-repudiation within the application. After undergoing several audits, the owner determined that current levels
of non-repudiation were insufficient. Which of the following capabilities would be MOST appropriate to consider
implementing is response to the new requirement?
A.
Transitive trust
B.
Symmetric encryption
C.
Two-factor authentication
D.
Digital signatures
E.
One-time passwords
http://searchsecurity.techtarget.com/definition/nonrepudiation