logo

Assessment 2 - Information Security - ITC595

   

Added on  2024-05-21

8 Pages2053 Words297 Views
 | 
 | 
 | 
Mohammed Muntajib Bilal 11613037
ITC595
Information Security
Assessment 2
Student Name: Mohammed Muntajib Bilal
Student ID: 11613037
1
Assessment 2 - Information Security - ITC595_1

Mohammed Muntajib Bilal 11613037
Contents
Question 1..................................................................................................................................3
Question 2..................................................................................................................................3
Question 3..................................................................................................................................4
Question 4..................................................................................................................................4
Question 5..................................................................................................................................5
References..................................................................................................................................8
2
Assessment 2 - Information Security - ITC595_2

Mohammed Muntajib Bilal 11613037
Question 1
Roles of CIA (Confidentiality, Integrity, and Availability) in ATMs
ATMs have to be more secure for the obvious reasons of account security. The CIA triad
plays a vital role in managing the security of the system. Following are some explanation
about CIA triad in ATM:
Confidentiality
It is the concept of concealing the information from an unauthenticated person. This will help
in protecting the data from misuse and maintaining the confidentiality of information.
In case of ATM card pin, the user and only the bank system is responsible for holding the pin
of the card. Here pin of the ATM card must be always confidential and this will prevent any
future leakage of information. For this several security measures can be taken for the security
of the confidentiality of the ATM network.
ATM should be so secured that it must hold the information about the user for only a
particular session and when the session expires the data must not be accessible in any way.
This will keep the unauthorized person to attack the account of the victim (“Tuli & Kaur”,
2013).
Integrity
Data integrity is the technique of preserving the important data from any kind of loss or
change in the information form any unauthorized person. Whatever the transactions made by
the user should not be leaked so that there could not be any kind of data loss or alteration in
the content.
Several transactions are held at ATM, people withdraw and deposits money. There is a high
risk of security breach and loss of data integrity can be there (“Tuli & Kaur”, 2013).
So, therefore, there is a need for security measures in preserving the data integrity of
information.
Availability
ATM must always be available at any time for service providence to the users. ATM must be
accessible easily so that there is no interference in the service. Attackers attack the
availability of the ATM machine so that it cannot provide any further service.
ATM service providers must take care of the availability of ATM at every time, for this, they
can take security protocols to deal with the availability criteria so that intruders cannot block
the availability of the ATM machine (“Tuli & Kaur”, 2013).
Question 2
The total number of numerical digits on ATM keypad are 10 i.e. 0-9
If a thief has managed to broke any of the five numerical keys, then the other 5 keys are in a
working condition. Which means that the pin combination of the user whose card is stuck
after the withdrawal is made up of any of these 5 working numbers.
Total number of possible combinations for a 4-digit number using 5 digits only = 54 = 625
3
Assessment 2 - Information Security - ITC595_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security Management - Assignment
|8
|2250
|44

Information Security Question Answer 2022
|14
|4556
|34

Information Security: CIA Triad, ATM Security, Biometric Authentication, Cipher Text Decryption
|9
|1589
|359

Information Security: CIA Triad, Biometrics, and Deciphering Techniques
|7
|1541
|307

Role of Confidentiality, Integrity, and Availability in ATM system
|8
|1687
|2617

Information Security: ATM, Biometric Authentication, and Caesar Cipher
|10
|3304
|496