Importance of CIA Triad in ATM Security
VerifiedAdded on  2023/06/14
|10
|2403
|74
AI Summary
This article discusses the importance of CIA Triad in ATM security and how it ensures the confidentiality, integrity, and availability of data. It also covers topics like keyboard of ATM system, biometric security, and encryption techniques. The article includes references and counter-objections to the discussed topics.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: ITC595
ITC595
Name of the Student
Name of the University
Author Note
ITC595
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2ITC595
Table of Contents
Question 1..................................................................................................................................3
Question 2..................................................................................................................................3
Question 3..................................................................................................................................4
Question 4..................................................................................................................................5
Question 5..................................................................................................................................5
References..................................................................................................................................7
Table of Contents
Question 1..................................................................................................................................3
Question 2..................................................................................................................................3
Question 3..................................................................................................................................4
Question 4..................................................................................................................................5
Question 5..................................................................................................................................5
References..................................................................................................................................7
3ITC595
Question 1
The concept of integrity, confidentiality and availability can be considered as a CIA
triad, which is nothing but a basic model that is designed for the purpose of guiding policies
related to information security within any organization. The concept of ATM in recent times
is a daily use technology for the common people and would be always playing a dominating
role. In this aspect the security of the technology also play a vital role. The PIN number can
be considered as a security aspect, which restricts unauthorized user from access the system.
Integrity can be considered more focused towards the concept of accuracy, maintaining and
trustworthiness relating to the data over the overall life cycle. Availability concept is the
maintaining of the data in all kind situation when the user needs it. The data should
safeguarded taking into consideration any event of fire or natural disaster. It can be stated
here that the data of the customer should be the upmost priority (Soomro, Shah & Ahmed,
2016). There always should be a backup, which would be helping to safe guard the data when
critical situation arises. There can be many situation where the card of the holder are lost and
any unauthorized person makes the access to the card. This is where the authentication of the
user would be playing a vital role. The PIN can be considered as a security number by which
people can directly have access to the bank account and involve in any kind of transaction.
Many a times it is seen that the safeguard of the data takes special kind of training for the
people who are involved into the concept, the concept may include technological
advancement and implementation of new security tools in the system. In recent times, most of
the technological aspects are so much advanced that people without training would not be
able to implement the system. The concept of data encryption can be considered as a method,
which is very common, which can be implemented to ensure the concept of the
confidentiality (Peltier, 2016). The confidentiality of the user or the customer is one of the
most crucial elements in the security of the user regarding the access to the system. In some
Question 1
The concept of integrity, confidentiality and availability can be considered as a CIA
triad, which is nothing but a basic model that is designed for the purpose of guiding policies
related to information security within any organization. The concept of ATM in recent times
is a daily use technology for the common people and would be always playing a dominating
role. In this aspect the security of the technology also play a vital role. The PIN number can
be considered as a security aspect, which restricts unauthorized user from access the system.
Integrity can be considered more focused towards the concept of accuracy, maintaining and
trustworthiness relating to the data over the overall life cycle. Availability concept is the
maintaining of the data in all kind situation when the user needs it. The data should
safeguarded taking into consideration any event of fire or natural disaster. It can be stated
here that the data of the customer should be the upmost priority (Soomro, Shah & Ahmed,
2016). There always should be a backup, which would be helping to safe guard the data when
critical situation arises. There can be many situation where the card of the holder are lost and
any unauthorized person makes the access to the card. This is where the authentication of the
user would be playing a vital role. The PIN can be considered as a security number by which
people can directly have access to the bank account and involve in any kind of transaction.
Many a times it is seen that the safeguard of the data takes special kind of training for the
people who are involved into the concept, the concept may include technological
advancement and implementation of new security tools in the system. In recent times, most of
the technological aspects are so much advanced that people without training would not be
able to implement the system. The concept of data encryption can be considered as a method,
which is very common, which can be implemented to ensure the concept of the
confidentiality (Peltier, 2016). The confidentiality of the user or the customer is one of the
most crucial elements in the security of the user regarding the access to the system. In some
4ITC595
situation, it can be stated that the security aspect is also the job for the customer or the user.
They should be more concerned with the activity, which they are performing over the concept
of the ATM (Jebaline, G. R & Gomathi, 2015).
Question 2
The keyboard of an ATM system mainly contains ten keys ranging from 0 to 9 and
some other functional keys which have specific task assigned to it. . In the event the thief has
already broken five keys in the keyboard so more five key are available to the thief for
breaking (Ray, Das & Sen, 2015). The pin number relating to the ATM usually consist of
four digits, which has to be selected form a set of five keys using the concept of combination.
There can be different methods, which can be used to find the different combinations, which
can be implemented to find out the exact password of the card. In this situation we are using
the concept if combination and permutation to calculate the number of actions in a particular
situation.
5P4 = 5! / (5-4)! = 5! /1! = 5*4*3*2*1/ 1 =120/1 =120.
From the above statement, it can be stated that the thief can make five attempts taking
into consideration the situation. The answer is obtained from the concept of combination
technique.
Question 3
There are different types of advantage, which can be achieved from the concept of the
biometric, but on the other hand, it can be stated that there are various types of problem,
which are faced. The three reason for the reluctant use of the biometric are as following:
situation, it can be stated that the security aspect is also the job for the customer or the user.
They should be more concerned with the activity, which they are performing over the concept
of the ATM (Jebaline, G. R & Gomathi, 2015).
Question 2
The keyboard of an ATM system mainly contains ten keys ranging from 0 to 9 and
some other functional keys which have specific task assigned to it. . In the event the thief has
already broken five keys in the keyboard so more five key are available to the thief for
breaking (Ray, Das & Sen, 2015). The pin number relating to the ATM usually consist of
four digits, which has to be selected form a set of five keys using the concept of combination.
There can be different methods, which can be used to find the different combinations, which
can be implemented to find out the exact password of the card. In this situation we are using
the concept if combination and permutation to calculate the number of actions in a particular
situation.
5P4 = 5! / (5-4)! = 5! /1! = 5*4*3*2*1/ 1 =120/1 =120.
From the above statement, it can be stated that the thief can make five attempts taking
into consideration the situation. The answer is obtained from the concept of combination
technique.
Question 3
There are different types of advantage, which can be achieved from the concept of the
biometric, but on the other hand, it can be stated that there are various types of problem,
which are faced. The three reason for the reluctant use of the biometric are as following:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
5ITC595
ï‚· One of the reason, which can be related to the reluctant use of biometric, is the concept of
security. In the concept of the biometric, the information regarding a particular person is
stored in the database. The information may include address, phone number and other
personal details. If the database of the system were hacked, it would be directly affecting
the individual. It may result in the leak of all the personal information. Sometimes the
hacker by taking the identity of other person indulge into illegal activity, which can be
termed as an unethical event.
ï‚· There can be different types of error in the technology of the biometric. The main aspect,
which can be taken into consideration, is the aspect of false rejection and false entry. The
biometric system does not have any type of idea relating to the identity of any particular
person. It can be sometimes seen that there is a false detection of person and the access to
a particular area is given to the person.
ï‚· One of the most important sector, which should be taken care in the concept of the
biometric, is the mapping system. The mapping in this type of system is done relating to
the information and usually the fingerprint. The system in such a situation has to be very
much accurate. In some cases, it can be seen that the user’s identification is stored in the
system but the system is not able to recognize the person. It may result in the delay of the
entry of the person, which can have some sort of effect on the functionality (Tu & Yuan,
2014).
Counter of Objections
The method, which can be used, for countering the problem is the implementation of
the process, which is known as the multi factor authentication. The multifactor authentication
can be considered as a system, which requires one method of authentication from the
different category of authentication (Karovaliya et al., 2015). This process is beneficial in a
way of identify the user by the means of a user name, password or fingerprint. Each user
ï‚· One of the reason, which can be related to the reluctant use of biometric, is the concept of
security. In the concept of the biometric, the information regarding a particular person is
stored in the database. The information may include address, phone number and other
personal details. If the database of the system were hacked, it would be directly affecting
the individual. It may result in the leak of all the personal information. Sometimes the
hacker by taking the identity of other person indulge into illegal activity, which can be
termed as an unethical event.
ï‚· There can be different types of error in the technology of the biometric. The main aspect,
which can be taken into consideration, is the aspect of false rejection and false entry. The
biometric system does not have any type of idea relating to the identity of any particular
person. It can be sometimes seen that there is a false detection of person and the access to
a particular area is given to the person.
ï‚· One of the most important sector, which should be taken care in the concept of the
biometric, is the mapping system. The mapping in this type of system is done relating to
the information and usually the fingerprint. The system in such a situation has to be very
much accurate. In some cases, it can be seen that the user’s identification is stored in the
system but the system is not able to recognize the person. It may result in the delay of the
entry of the person, which can have some sort of effect on the functionality (Tu & Yuan,
2014).
Counter of Objections
The method, which can be used, for countering the problem is the implementation of
the process, which is known as the multi factor authentication. The multifactor authentication
can be considered as a system, which requires one method of authentication from the
different category of authentication (Karovaliya et al., 2015). This process is beneficial in a
way of identify the user by the means of a user name, password or fingerprint. Each user
6ITC595
would be having a particular user name and password, which would be only available to the
concerned user and should not be disclosed to other person. This aspect would be directly
increasing the security, which is achieved from the concept (Safa, Von Solms and Furnell,
2016).
The Gradient biometric team is in the field of the biometric for more than 10 years
and has directly achieved a lot of success in this field. According to the company the three
aspects, which should be included in the concept of security in the system of biometric, is the
application of comfort, safety and availability. These three concept should be included in one
point in order to achieve the desired standard of security. The access to the database of the
customer should be always available and can be delivered to the users end when they actually
need to access the information. In most of the cases, the network and the linkage between the
information and the access permission fail which does not allow the patch, which is required
to the access permission, which is needed in the concept of biometric (Onyesolu & Okpala,
2017).
Question 4
A false negative can be considered an approach in the process of biometric were the
user cannot get access to the location which is biometric bounded. There can be a situation
where the person’s identity is stored in the database but still the access is not given to the
person due to some type of technical issues in the system. In some of the cases it can be
noticed that false identity person get the access in the identity of some other person which can
lead to the concept of miss identity. The first circumstance, which can be taken into
importance, is when the identity of the person is not known. In most of the cases, it can be
very much problematic due to the factor that it can restrict the person from different types of
activity. The second situation, which can be taken into consideration, is the aspect of loss of
would be having a particular user name and password, which would be only available to the
concerned user and should not be disclosed to other person. This aspect would be directly
increasing the security, which is achieved from the concept (Safa, Von Solms and Furnell,
2016).
The Gradient biometric team is in the field of the biometric for more than 10 years
and has directly achieved a lot of success in this field. According to the company the three
aspects, which should be included in the concept of security in the system of biometric, is the
application of comfort, safety and availability. These three concept should be included in one
point in order to achieve the desired standard of security. The access to the database of the
customer should be always available and can be delivered to the users end when they actually
need to access the information. In most of the cases, the network and the linkage between the
information and the access permission fail which does not allow the patch, which is required
to the access permission, which is needed in the concept of biometric (Onyesolu & Okpala,
2017).
Question 4
A false negative can be considered an approach in the process of biometric were the
user cannot get access to the location which is biometric bounded. There can be a situation
where the person’s identity is stored in the database but still the access is not given to the
person due to some type of technical issues in the system. In some of the cases it can be
noticed that false identity person get the access in the identity of some other person which can
lead to the concept of miss identity. The first circumstance, which can be taken into
importance, is when the identity of the person is not known. In most of the cases, it can be
very much problematic due to the factor that it can restrict the person from different types of
activity. The second situation, which can be taken into consideration, is the aspect of loss of
7ITC595
identity. Other people may use the identity of some other person and involve themselves into
illegal activity taking the other person’s identity. There are different types of illegal activity,
which are performed in recent times by this use of the system of biometric. This concept can
be considered as few of the aspects, which involve high amount of concern so that it can be
taken into consideration and the system can be more security-based aspect with high level of
service associated with the technology. Taking into consideration the level of the
organization it can be very easily shut down the overall infrastructure, the various kinds of
things, which are needed, will be the stored in the data center, and restoring can be done to
the various service, which are attached to the concept (Koteswari & Paul, 2017).
Question 5
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
1 2 3 4 5 6 7 8 9 1
0
1
1
1
2
1
3
1
4
1
5
1
6
1
7
1
8
1
9
2
0
2
1
2
2
2
3
2
4
2
5
2
6
Encrypted Text A M K
Corresponding numeric value 1 13
1
1
Key 4 2 3
Decoded from the substitution cipher 23 11 8
Caeser cipher shift 3 3 3
Decoded from the caeser cipher 20 8 5
Decoded Text T H E
Encrypted Text W W U J J Y Z T X
Corresponding numeric value
2
3 23 21
1
0 10 25
2
6 20 24
Key 4 2 3 4 2 3 4 2 3
Decoded from the substitution cipher
1
9 21 18 6 8 22
2
2 18 21
Caeser cipher shift 3 3 3 3 3 3 3 3 3
Decoded from the caeser cipher 1 18 15 3 5 19 1 15 18
identity. Other people may use the identity of some other person and involve themselves into
illegal activity taking the other person’s identity. There are different types of illegal activity,
which are performed in recent times by this use of the system of biometric. This concept can
be considered as few of the aspects, which involve high amount of concern so that it can be
taken into consideration and the system can be more security-based aspect with high level of
service associated with the technology. Taking into consideration the level of the
organization it can be very easily shut down the overall infrastructure, the various kinds of
things, which are needed, will be the stored in the data center, and restoring can be done to
the various service, which are attached to the concept (Koteswari & Paul, 2017).
Question 5
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
1 2 3 4 5 6 7 8 9 1
0
1
1
1
2
1
3
1
4
1
5
1
6
1
7
1
8
1
9
2
0
2
1
2
2
2
3
2
4
2
5
2
6
Encrypted Text A M K
Corresponding numeric value 1 13
1
1
Key 4 2 3
Decoded from the substitution cipher 23 11 8
Caeser cipher shift 3 3 3
Decoded from the caeser cipher 20 8 5
Decoded Text T H E
Encrypted Text W W U J J Y Z T X
Corresponding numeric value
2
3 23 21
1
0 10 25
2
6 20 24
Key 4 2 3 4 2 3 4 2 3
Decoded from the substitution cipher
1
9 21 18 6 8 22
2
2 18 21
Caeser cipher shift 3 3 3 3 3 3 3 3 3
Decoded from the caeser cipher 1 18 15 3 5 19 1 15 18
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
8ITC595
6 9
Decoded Text P R O C E S S O R
Encrypted Text M W K X Z K U H E
Corresponding numeric value 13 23 11 24 26
1
1 21 8 5
Key 4 2 3 4 2 3 4 2 3
Decoded from the substitution cipher 9 21 8 20 24 8 17 6 2
Caeser cipher shift 3 3 3 3 3 3 3 3 3
Decoded from the caeser cipher 6 18 5 17 21 5 14 3 25
Decoded Text F R E Q U E N C Y
Therefore, the decoded text for the cypher text for employees will increases the
processor speed.
6 9
Decoded Text P R O C E S S O R
Encrypted Text M W K X Z K U H E
Corresponding numeric value 13 23 11 24 26
1
1 21 8 5
Key 4 2 3 4 2 3 4 2 3
Decoded from the substitution cipher 9 21 8 20 24 8 17 6 2
Caeser cipher shift 3 3 3 3 3 3 3 3 3
Decoded from the caeser cipher 6 18 5 17 21 5 14 3 25
Decoded Text F R E Q U E N C Y
Therefore, the decoded text for the cypher text for employees will increases the
processor speed.
9ITC595
References
Jebaline, G. R., & Gomathi, S. (2015, March). A novel method to enhance the security of
ATM using biometrics. In Circuit, Power and Computing Technologies (ICCPCT),
2015 International Conference on (pp. 1-4). IEEE.
Karovaliya, M., Karedia, S., Oza, S., & Kalbande, D. R. (2015). Enhanced security for ATM
machine with OTP and Facial recognition features. Procedia Computer Science, 45,
390-396.
Koteswari, S., & Paul, P. J. (2017). A Survey: Fusion of Fingerprint and Iris for ATM
services.
Onyesolu, M. O., & Okpala, A. C. (2017). Improving Security Using a Three-Tier
Authentication for Automated Teller Machine (ATM). International Journal of
Computer Network and Information Security, 9(10), 50.
Pathak, S. K., Pathak, S. K., Mishra, M. K., Kesharwani, L., & Gupta, A. K. (2015).
Automated Teller Machine (ATM) Frauds and Security. EDITORIAL BOARD, 192.
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for
effective information security management. CRC Press.
Ray, S., Das, S., & Sen, A. (2015, December). An intelligent vision system for monitoring
security and surveillance of ATM. In India Conference (INDICON), 2015 Annual
IEEE (pp. 1-5). IEEE.
Singh, S., & Kaur, S. (2016). Enhancing ATM Security Using Fusion of Biometric
Techniques. IITM Journal of Management and IT, 7(1), 79-82.
References
Jebaline, G. R., & Gomathi, S. (2015, March). A novel method to enhance the security of
ATM using biometrics. In Circuit, Power and Computing Technologies (ICCPCT),
2015 International Conference on (pp. 1-4). IEEE.
Karovaliya, M., Karedia, S., Oza, S., & Kalbande, D. R. (2015). Enhanced security for ATM
machine with OTP and Facial recognition features. Procedia Computer Science, 45,
390-396.
Koteswari, S., & Paul, P. J. (2017). A Survey: Fusion of Fingerprint and Iris for ATM
services.
Onyesolu, M. O., & Okpala, A. C. (2017). Improving Security Using a Three-Tier
Authentication for Automated Teller Machine (ATM). International Journal of
Computer Network and Information Security, 9(10), 50.
Pathak, S. K., Pathak, S. K., Mishra, M. K., Kesharwani, L., & Gupta, A. K. (2015).
Automated Teller Machine (ATM) Frauds and Security. EDITORIAL BOARD, 192.
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for
effective information security management. CRC Press.
Ray, S., Das, S., & Sen, A. (2015, December). An intelligent vision system for monitoring
security and surveillance of ATM. In India Conference (INDICON), 2015 Annual
IEEE (pp. 1-5). IEEE.
Singh, S., & Kaur, S. (2016). Enhancing ATM Security Using Fusion of Biometric
Techniques. IITM Journal of Management and IT, 7(1), 79-82.
10ITC595
Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs
more holistic approach: A literature review. International Journal of Information
Management, 36(2), 215-225.
Tu, Z., & Yuan, Y. (2014). Critical success factors analysis on effective information security
management: A literature review.
Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs
more holistic approach: A literature review. International Journal of Information
Management, 36(2), 215-225.
Tu, Z., & Yuan, Y. (2014). Critical success factors analysis on effective information security
management: A literature review.
1 out of 10
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.