This article discusses the importance of confidentiality, availability and integrity within ATM systems. It also covers bio-metric authentication, circumstances in which false negatives are serious than false positives and transposition.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: INFORMATION SECURITY SYSTEMS IN ATM INFORMATION SECURITY SYSTEMS IN ATM Name of the Student Name of the University Author’s note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1INFORMATION SECURITY SYSTEMS IN ATM Question 1: Importance of Confidentiality, Availability and Integrity within ATM Systems The security in the network of ATMs is extremely important. The security specification, which is included in the security services are in much need and they are highly needed for the users who are trying to protect their ATM cards from misuse by unauthorized users. The confidentiality, availability and integrity of data should be the major area of concern. Confidentiality–ThenetworkofATMshouldbecapableofsupportingthe confidentiality of the data of the user. The confidentiality of the data means that the vital information should not be disclosed from unauthorized parties. The statements of the bank accounts, personal information of an individual, secrets of trade, government documents and credit/debitcardnumbersshouldremainconfidential.Encryptionishighlynecessaryto implement this strategy. SSL/TLS is one example of encryption, which is used to ensure the confidentiality of data (De Gramatica et al., 2015). Availability– The data availability refers to ensure that the accredited parties are able to gain information of the ATM systems when they would require. Access denial has become a common attack in the ATM network. The main aim of DDoS attacks is meant to deny users of accessing the private information that is contained in the ATM cards (Narman et al., 2014). Integrity of Data– The integrity of data refers to the ways in which users of the ATM systems can protect their information from any kind of modification by unofficial parties. The most common methods of protecting the integrity of data is to hash the received data and thus compare it to the hash of the original message that was sent (Ramasamy & Sabatini, 2015).
2INFORMATION SECURITY SYSTEMS IN ATM Question 2: The thief would be able to find out different possibilities of entering the keys with the help of four functional keys. The total number of possibilities, which could be entered by the thief are: 5P4= 5!/(5 - 4)! = 5!/4! = 120 ways by which the thief can detect the pin of the card. Question 3: Bio-Metric Authentication The three possible reasons for which users are reluctant towards using bio-metrics are: 1.Thebiometrictechnologyiscomplicatedandcostlytoimplementinvarious organizations. The entire system of the deployment of biometrics would require the installation of their personal application serves and hardware. 2.There are many situations in which there are some major problems of accuracy in biometrics. There are many situations in which the biometric system cannot recognize the identification of the user. 3. The users of the biometric system might have a notion that attackers might manipulate the biometric system and thus they would gain access to their unique fingerprints. This would lead to the loss of their personal identity as once the biometric of an individual is stolen, it cannot be changed (Bolle et al., 2013). The different ways of countering the issues related to biometrics are: 1. The biometric systems should be installed in such workplaces where there is a high level of concern for the security and in disciplined workplaces. The cost benefit ratio should be calculated before installation of the machine.
3INFORMATION SECURITY SYSTEMS IN ATM 2. The biometric systems have a high functionality level. The biometric system should be efficient in order to validate the identity of a person properly by comparing it with the captured characteristic of the biometric. Based on the validation process, the biometric would be able to identify the authentic person. 3. The biometric system should be able to recognize a person based on a feature vector that would be derived from a precise behavioral or physiological characteristic that is mainly possessed by the person. Hence, the loss of personal identity should not be considered as biometric systems are highly efficient in nature (Smith, 2013) Question 4: Circumstances in which False Negatives are Serious than False Positives False positive rate is the kind of solution when the identity of an unauthenticated user is accepted that should had been rejected. The false negative is a kind of situation when there is a rejection by an unauthenticated user instead of an acceptation. A false negative situation in a biometric system occurs when the system would fail to recognize the authenticity of an individual. This would lead to something, which might not happen. The false negative and the false positive are such complimentary situations, which share an inverse relation. As the rate of the authentication of the false positive increases, the rate of the authentication of the false negative decreases and this process occurs vice-versa. The two situations in which the false negatives are serious than false positives are: 1.Personal:The owner of a safe would be prevented from accessing the safe. This might lead the person being unable to access a particular necessary resource. 2.Institutions:If a situation occurs when the entire infrastructure of the server would be down and the user needs to access the data center for the service of restoration of the data. In
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4INFORMATION SECURITY SYSTEMS IN ATM such a situation, if the biometric system does not recognize the user then the organization could lose a lot of money and reputation of the organization. Question 5: Transposition In cryptography techniques, a transposition cipher is one kind of method of encryption in which the positions, which are held by plaintext units would be shifted based on a regular system. In this method, the cipher text creates a permutation of the plain text. In this permutation the order of the units are altered. With respect to the theory of mathematics, a bijective function is used on the positioning of the characters that are meant to encrypt them and an inverse function is used to decrypt the positioning of the characters (Mishra, 2013). The one way in which a piece of cipher text could be determined quickly as a result of transposition is Rail Fence Cipher. This is a kind of cipher transposition in which the plaintext is written in a downwards format on the successive rails of an imaginary fence and then it shifts upwards. The message of this plaintext is then read in rows. The provided encrypted text is: NTJWKHXK AMK WWUJJYZTX MWKXZKUHE The key, which is provided is: 234 With the help of the algorithm of Caesar Cipher and the method of substitution, the encrypted text would be decrypted as follows: ABCDEFGHIJKLMNOPQRSTUVWXYZ 1234567891011121314151617181920212223242526
5INFORMATION SECURITY SYSTEMS IN ATM Encrypted TextNTJWKHXK TheCorrespondingNumeric value 142010231182411 The Provided Key23423423 DeductedValuefrom Substitution Cipher 121762184228 The Shifted Value as per the Caesar Cipher 33333333 TheDecodedValuefrom Caesar Cipher 91431851195 Decoded TextINCREASE Encrypted TextAMK The Corresponding Numeric Value11311 The Provided Key423 Deducted Value from Substitution Cipher23118 The Shifted Value as per the Caesar Cipher333
6INFORMATION SECURITY SYSTEMS IN ATM TheDecodedValuefromCaesar Cipher2085 Decoded TextTHE Encrypted TextWWUJJYZTX The Corresponding Numeric Value232321101025262024 The Provided Key423423423 Deducted Value from Substitution Cipher1921186822221821 The Shifted Value as per the Caesar Cipher333333333 TheDecodedValuefromCaesar Cipher1618153519191518 Decoded TextPROCESSOR Encrypted TextMWKXZKUHE The Corresponding Numeric Value1323112426112185 The Provided Key423423423 DeductedValuefromSubstitution Cipher9218202481762
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7INFORMATION SECURITY SYSTEMS IN ATM The Shifted Value as per the Caesar Cipher333333333 Decoded from the caeser The Decoded Value from Caesar Cipher61851721514325 Decoded TextFREQUENCY Hence,thefinaltextthatisdecryptedforNTJWKHXKAMKWWUJJYZTX MWKXZKUHE is: INCREASE THE PROCESSOR FREQUENCY
8INFORMATION SECURITY SYSTEMS IN ATM References Bolle, R. M., Connell, J. H., Pankanti, S., Ratha, N. K., & Senior, A. W. (2013).Guide to biometrics. Springer Science & Business Media. De Gramatica, M., Labunets, K., Massacci, F., Paci, F., & Tedeschi, A. (2015, March). The role of catalogues of threats and security controls in security risk assessment: an empirical study with ATM professionals. InInternational Working Conference on Requirements Engineering: Foundation for Software Quality(pp. 98-114). Springer, Cham. Mishra, A. (2013). Enhancing security of caesar cipher using different methods.International Journal of Research in Engineering and Technology,2(09), 327-332. Närman, P., Franke, U., König, J., Buschle, M., & Ekstedt, M. (2014). Enterprise architecture availability analysis using fault trees and stakeholder interviews.Enterprise Information Systems,8(1), 1-25. Ramasamy, S., & Sabatini, R. (2015). Communication, navigation and surveillance performance criteriaforsafety-criticalavionicsandATMsystems.InAIAC16:Multinatioinal Aerospace Programs-Benefits and Challenges(pp. 1-12). Engineers Australia. Smith, R. G. (2013). Biometric solutions to identity-related cybercrime. InCrime online(pp. 54- 69). Willan.