Computing IT Security - Confidentiality, Integrity, Availability, Biometric Authentication, False Positive and False Negative

   

Added on  2023-06-14

7 Pages1683 Words77 Views
Running head: COMPUTING IT SECURITY
Computing IT security
Name of the student
Name of the University
Author Note:
Computing IT Security - Confidentiality, Integrity, Availability, Biometric Authentication, False Positive and False Negative_1
1
COMPUTING IT SECURITY
Answer 1:
Confidentiality in this case involves the various information of the user, which is hidden
and should not be shared with anyone. This is the confidential information of the user. The
number of the ATM card and the CVV number of the card should not be shared with anyone as
these are the confidential information (Morse & Coulehan, 2015). If anybody gets hold of these
information then there might be stealing of the amount from the account of the user. The other
confidential information involved may be PIN number of the account holder.
The integrity policies may revolve around the hackers who try and hack the system of the
customers of the various banks for the purpose of stealing. The integrity policies also involve the
various people trying to peep in the ATMs for knowing the pin of the person using the ATM
machine (Margaria & Falletti, 2015). Many of the thieves and the cheaters call in the name of the
bank and ask for the details concerning the details of the bank account. This is also a malicious
practice and should be stopped in order to maintain the integrity policies.
The availability requirements involve the proper working of the ATM machines so that
the transaction can be properly carried out. The other requirement is the proper interface of the
machine in which the user is working and carrying out the procedure of the transaction. After the
transaction is carried out the machine should be flexible enough to generate the bills or the slip
carrying the information of the transaction that has taken place (Kisore & Koteswaraiah, 2017).
The other basic requirements may be the maintaining a proper security both physical and
technological. The systems from the banks should be protected in order to save the money of the
customers. The security should be strong enough in order to protect the systems of the
organization.
Computing IT Security - Confidentiality, Integrity, Availability, Biometric Authentication, False Positive and False Negative_2
2
COMPUTING IT SECURITY
Answer 2:
The thief was able to jam the card reader and break the five keys of the keypad. However,
the customer was successful in entering the PIN and extract the amount that was required but
could not take out the card as the card reader was jammed by the thief. As the five keypads have
been broken the number of option left with the thief in order to operate is 4.
Therefore, the number of options left with the thief: 4
The maximum number of PIN that the customer has to enter or the maximum number of attempts
that the thief has to make in order to successfully crack the PIN of the customer is 5!/ (5-4)!.
Thus after making 120 attempts the thief may successfully be able to crack the PIN of the
customer.
Answer 3:
The use of the biometric authentication is made at a number of places. The concept of
bio- metric authentication involves the use of some of the part of the body of the user for gaining
the characteristics and the information about the person. However, many are reluctant to the use
of the bio- metric authentication due to various reasons.
The bio- metrics cannot be recovered in case it is destroyed or some problem occurs
(Haupt & Mozer, 2015). For instance, in case of a mail id it can be recovered with the use
of any of the secondary devices. The manipulation in the bio- metrics however cannot be
recovered or retrieved.
The passwords can be changed in case any activity occurs such as anyone comes to know
about the password or if anyone tries to get into the account unethically (Alsaadi, 2015).
Computing IT Security - Confidentiality, Integrity, Availability, Biometric Authentication, False Positive and False Negative_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security
|7
|1632
|87

Role of Confidentiality, Integrity, and Availability in ATM system
|8
|1687
|2617

Information Security: Confidentiality, Integrity, and Availability
|6
|2253
|395

Sample Paper on Information Security
|5
|1759
|126

ATM Information Security
|10
|2235
|261

Information Security: CIA Triad, Biometric Authentication, False Negative, Encryption
|14
|3843
|70