logo

Information Security: Importance of CIA Requirements in ATM Systems

   

Added on  2023-06-13

13 Pages3715 Words129 Views
Theoretical Computer ScienceArtificial Intelligence
 | 
 | 
 | 
Running head: INFORMATION SECURITY
Information Security
Name of the Student
Name of the University
Author’s Note:
Information Security: Importance of CIA Requirements in ATM Systems_1

1
INFORMATION SECURITY
Table of Contents
Question 1..................................................................................................................................2
Question 2..................................................................................................................................3
Question 3..................................................................................................................................4
Question 4..................................................................................................................................5
Question 5..................................................................................................................................6
References..................................................................................................................................8
Information Security: Importance of CIA Requirements in ATM Systems_2

2
INFORMATION SECURITY
Question 1
Automated Teller Machines or simply ATMs are designed for the benefit of those
people, who do not have time to go to the bank for the purpose of withdrawing any amount of
money (Laudon & Laudon, 2015). It is a particular device for electronic telecommunications,
which significantly enables all the customers or clients of the financial institutions for
performing any kind of financial transaction. These types of systems are integrated with
information systems. CIA or confidentiality, integrity and availability are the most important
requirements that are solely related to these types of information systems. These three
requirements are extremely important for the ATM as they are responsible for the overall
security of the information system (Venkatesh, Brown & Bala, 2013). The description of
these requirements with their importance is stated below.
i) Confidentiality: This is the first and the foremost requirement of the CIA.
Confidentiality can be solely defined as the set of regulations and rules, which restricts the
access or rather, limits the access to any type of confidential or sensitive information. It is
extremely important for any type of ATM systems. The responsibility of confidentiality in
any ATM machine is completely on the bank authorities and the users. Examples of
confidentiality in any such system are as follows:
a) The details of the users should be strictly maintained and thus the confidentiality
would be maintained.
b) The data encryption of the PIN number and the ATM card number of any particular
authorized user is to be kept private and secret so that there is no chance of lack of
confidentiality (Stair & Reynolds, 2013).
ii) Integrity: The second requirement of the CIA is integrity. The data that is
categorized as per the amount or the damage incurred can be done without letting it fall in the
wrong hands. Various stringent measures could be easily implemented as per these
categories. The PIN number of the card helps to maintain this integrity. The accuracy is kept
through this. Examples of integrity in any such system are as follows:
a) The best example of integrity in ATM machine is the checksums. Even the
cryptographic checksums are utilized in this purpose.
b) The second example of the integrity maintenance is the accidental or deliberate file
deletion or even altering the contents of the confidential information.
iii) Availability: The third and another significant requirement in the CIA is the
availability (Galliers & Leidner, 2014). This particular requirement helps to determine the
available resources for any ATM transaction. The hardware that is utilized here has an
incorporation of information system within it. Under no circumstances, this data should be
changed or altered and thus, the steps for ensuring that data is not taken by the unauthorized
people should be executed with excellence. Examples of availability in any such system are
as follows:
a) The first example of availability in ATM is the availability of information, which is
solely needed for completing the transaction (Rainer et al., 2013).
Information Security: Importance of CIA Requirements in ATM Systems_3

3
INFORMATION SECURITY
b) The second example of availability in ATM is the presence of systems and the
card.
Information Security: Importance of CIA Requirements in ATM Systems_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security: ATM, Biometric Authentication, Transposition Cipher
|10
|3198
|200

Information Security: ATM, Biometric Authentication, and Caesar Cipher
|10
|3304
|496

ATM Security: Maintaining Confidentiality, Integrity and Availability
|10
|2628
|282

Information Security: ATM, Biometric Authentication, and Transposition Cipher
|14
|2706
|261

Information Security: ATM, Biometric Authentication, Encryption
|9
|3313
|419

Assessment 2 - Information Security - ITC595
|8
|2053
|297