logo

Analysis of Information Security Report

   

Added on  2022-09-15

6 Pages1350 Words14 Views
Running head: ANALYSIS OF INFORMATION SECURITY
ANALYSIS OF INFORMATION SECURITY
Name of student
Name of university
Author’s note:
Analysis of Information Security Report_1
ANALYSIS OF INFORMATION SECURITY
1
Examples of confidentiality, integrity and availability requirements associated with
ATM and description of the degree of importance for each requirement
In order to access required cash from the ATM, consumers are required to enter a PIN
and after consumers provide the PIN, the ATM then verifies the PIN, and if it is correct then
only consumers are allowed to access the cash from the account. Therefore, in ATM
transaction PIN is important for identifying the authenticity of the consumers (Asgari et al.,
2017). Therefore, it is required that ATM ensures the confidentiality of the PIN not only in
the host machine but also during the transaction as well. It is also important that the integrity
of the records associated with the consumer accounts are ensured as well. Along with this
integrity of the individual transactions are also important which needs to be ensured as well
(Montefusco et al., 2016). Availability of the ATM is required to ensure quality service of the
bank, however, this is not as important as confidentiality and integrity are important in the
context of ATM transaction.
Confidentiality requirement:
The media that is considered for ensuring effective and efficient communication
between ATMs and the bank required to be encrypted and this is one of the most
important requirements in terms of ensuring confidentiality (Gonçalves & da Silva,
2018).
PIN needs to be encrypted if it is stored in the database of the bank.
Integrity Requirement
The action that is taken by the ATM during the transaction is in accordance with the account
that is associated with the card considered for the transaction (Bogoda, Mo & Bil, 2019).
Availability requirements
Analysis of Information Security Report_2
ANALYSIS OF INFORMATION SECURITY
2
The system should be capable of executing a ta transaction of at least 1000-
synchronous users and this needs to be ensured at any time
The system should ensure availability at 99.9% time for ensuring that the service
provided by the bank is effective and efficient as well.
Three reasons for which people may be reluctant to use biometrics. Description of
various strategies to counter those objections
Investment in infrastructure:
In order to implement biometric authentication in the organization, companies need to
invest in infrastructure and therefore organisations, especially small companies are not
interested in investment for deploying biometric authentication in the organizations (Kindt,
2016).
Strategy to counter the objection:
In order to convince organizations in investment for deploying biometric
authentication, authorities of the companies will be provided a detailed description of the
benefits of the biometric application such as automatic authentication of the employees,
identifying if employees are trying to cheat with their attendance and therefore this also
allows to analyses productivity of the employees which is important for any organization
(Memon, 2017).
Lack of awareness about biometric authentication:
Employees, especially people with less technical knowledge think that accessing the
biometric system is too complex and therefore they are not interested in accessing biometric
system.
Strategy to counter the objection:
Analysis of Information Security Report_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Security
|5
|1162
|73

Factors for Protection of ATM Security, Biometric Authentication and Cryptography
|7
|1209
|292

Information Security Assignment 2022
|6
|1257
|31

Security Fundamentals Assignment
|6
|1116
|216

Information Security - Desklib
|6
|1617
|403

Information Technology - Assignment Solution
|5
|1474
|167