logo

Information Security Systems in ATM

   

Added on  2023-06-13

9 Pages1901 Words332 Views
Running head: INFORMATION SECURITY SYSTEMS IN ATM
INFORMATION SECURITY SYSTEMS IN ATM
Name of the Student
Name of the University
Author’s note:

1INFORMATION SECURITY SYSTEMS IN ATM
Question 1: Importance of Confidentiality, Availability and Integrity within ATM Systems
The security in the network of ATMs is extremely important. The security specification,
which is included in the security services are in much need and they are highly needed for the
users who are trying to protect their ATM cards from misuse by unauthorized users. The
confidentiality, availability and integrity of data should be the major area of concern.
Confidentiality The network of ATM should be capable of supporting the
confidentiality of the data of the user. The confidentiality of the data means that the vital
information should not be disclosed from unauthorized parties. The statements of the bank
accounts, personal information of an individual, secrets of trade, government documents and
credit/debit card numbers should remain confidential. Encryption is highly necessary to
implement this strategy. SSL/TLS is one example of encryption, which is used to ensure the
confidentiality of data (De Gramatica et al., 2015).
Availability – The data availability refers to ensure that the accredited parties are able to
gain information of the ATM systems when they would require. Access denial has become a
common attack in the ATM network. The main aim of DDoS attacks is meant to deny users of
accessing the private information that is contained in the ATM cards (Narman et al., 2014).
Integrity of Data – The integrity of data refers to the ways in which users of the ATM
systems can protect their information from any kind of modification by unofficial parties. The
most common methods of protecting the integrity of data is to hash the received data and thus
compare it to the hash of the original message that was sent (Ramasamy & Sabatini, 2015).

2INFORMATION SECURITY SYSTEMS IN ATM
Question 2:
The thief would be able to find out different possibilities of entering the keys with the
help of four functional keys. The total number of possibilities, which could be entered by the
thief are:
5P4 = 5!/(5 - 4)! = 5!/4! = 120 ways by which the thief can detect the pin of the card.
Question 3: Bio-Metric Authentication
The three possible reasons for which users are reluctant towards using bio-metrics are:
1. The biometric technology is complicated and costly to implement in various
organizations. The entire system of the deployment of biometrics would require the installation
of their personal application serves and hardware.
2. There are many situations in which there are some major problems of accuracy in
biometrics. There are many situations in which the biometric system cannot recognize the
identification of the user.
3. The users of the biometric system might have a notion that attackers might manipulate
the biometric system and thus they would gain access to their unique fingerprints. This would
lead to the loss of their personal identity as once the biometric of an individual is stolen, it cannot
be changed (Bolle et al., 2013).
The different ways of countering the issues related to biometrics are:
1. The biometric systems should be installed in such workplaces where there is a high
level of concern for the security and in disciplined workplaces. The cost benefit ratio should be
calculated before installation of the machine.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Technology - Assignment Solution
|5
|1474
|167

Factors for Protection of ATM Security, Biometric Authentication and Cryptography
|7
|1209
|292

Information Security: CIA Triad, ATM Security, Biometric Authentication, Cipher Text Decryption
|9
|1589
|359

Information System for Automated Teller Machines Name of Student-Name of University- Author's Note
|5
|1413
|122

Information Security for ATM, Biometric Sensors and Cipher
|10
|2100
|403

Information Security: Confidentiality, Integrity, and Availability
|6
|2253
|395