logo

Information Security Question Answer 2022

   

Added on  2022-09-18

14 Pages4556 Words34 Views
 | 
 | 
 | 
Running head: INFORMATION SECURITY
Information Security
Name of the Student:
Name of the University:
Information Security Question Answer 2022_1

1INFORMATION SECURITY
Answer to Question 1
Automated Teller Machine (ATM) is referred to as a banking machine that helps to
automate money transaction process where no bank representatives are required while
processing. Two different types of ATM are most installed by the banking industry to credit and
debit money regardless of time and location of the users. However, it is duty of the IT security
team working for the bank industry to make sure that all security aspects are properly followed
for the system and information (Yoon & Jain, 2015). The machines are designed so that users
can use their PIN as well as card to access the bank account with high level security.
Confidentiality, integrity and availability (CIA) model is a security triad which is developed and
modeled for designing guidance policies mainly for the information stored in the server.
Sometimes this model is also known as AIC triad. The model also helps to avoid potential
confusion by Central Intelligence Agency. In any system presence of these three factors
demonstrates the degree of significance for each of the requirement. Examples of three of the
factors are elaborate in the below section:
Confidentiality: In order to access credit and debit the users should go into a safety
password that is only available to the authorized users. This factor helps to improve security
level. Card reader is the input device which reads information as soon as the card is swiped. Card
reader is used as a part of identification of an accurate account number (Tome et al., 2015). In
order to make connection between the card and the machine a magnetic band is available in back
of the card. Then the card is passed to the server or the host server. As soon as the ATM
recognizes the card user identification number, withdrawal, mini statement etc options become
available. Then the users need to input the PIN (4 digit). The PIN numbers input in the keypad
are inserted in an encrypted form. However, in order to ensure financial security it is
responsibility of the users to use stronger PIN code (Smith, Wiliem & Lovell, 2015). Whenever
communication between bank server and the ATM card is processed it is responsibility of the
bank authority to ensure enough security to protect user information to get hacked by
unauthorized users. The process of money transaction is needed to be secured to avoid unwanted
harm, data hacking and data misuse by the unauthorized hackers. Encryption is the best suited
approach that helps to keep information protected from outside attackers. In order to keep
Information Security Question Answer 2022_2

2INFORMATION SECURITY
information tenable from outside attackers it is essential for the users to follow PIN changing
related policy and guidelines after periodic intervals. It also helps to boost up the information
security process.
Integrity: In order to make sure that consumers or user data are integrated, secured and
properly maintained advanced, efficient and effective technology for optimizing and
collaborating ATM are required. The system is needed to be chronologically updated using
authenticated information and PIN numbers both in while money will be debited and credited
(Larbi & Taleb, 2018). The process of money withdrawal is known as credit and fund deposit is
known as debited. However, each bank needs to have an inquiry department to deal with the
query coming from the users frequently. It is their responsibility to resolve those queries and
make sure that the process is completely integrated.
Availability: Based on demand and expectation of both customers others the frequency
of the ATM needs to be enhanced for accurate service delivery. The availability of any system is
ensured by appropriate maintenance of all available hardware. All crucial systems are needed to
keep well maintained and updated (Vazquez-Fernandez & Gonzalez-Jimenez, 2016). Issues of
failover, data redundancy, data hijack will be completely avoided if theses aspects are throughout
followed. The process must hold capabilities of disaster recovery, back and application
resilience. If any time an ATM is found to be not working accurately it will be a major issue for
the customers. Accuracy in ATM will help to grab more numbers of customers and provide
emergency services to the customers. The process of ATM improves the
Answer to Question 2
The working principle of an ATM is processed by two input devices and four numbers of
output devices. The input devices used in the ATM machines are card reader and a keypad and
the output activities are speaker, display screen, receipt printer and cash depositor. The control
unit of the machine operated the entire process to fulfill the customer requirements. One of the
major input devices that are available in the ATM is card reader. As soon as an ATM card is
inserted to the machine the machine starts reading the information the card. It mainly identifies
the information of the use who wants to either debit or credit money from the machine (Barbello,
2016). As the card reader reads needful information from the user’s card it requests for further
Information Security Question Answer 2022_3

3INFORMATION SECURITY
process like: cash withdrawal, mini statement, balance enquiry etc. Each card has different and
unique PIN numbers that is mainly sent in encrypted form. The key board is comprises of 16
keys and these are interfaced to the processor of Automated Teller Machine. Among the 16 keys,
from 0 to 9 total 10 numeric keys are available and some other keys are present in the keypad in
the form of ENTER, CLEAR, CANCEL etc. Then the speaker gives an audio feedback while
any specific key is pressed by the users who wants to either debit or credit money from the ATM
(Kursun et al., 2018). The display screen of ATM shows the transaction details that are the
money to be withdrawal, current value available in the account and some other details as well.
Details are shown in the display.
It has been identified that, an ATM machine is comprises of 0 to 9 numeric numbers and
certain other keys. If the user wants to cancel the transaction then a CANCEL numbers is
available similarly for further progress ENTER button is available (Novack et al., 2015). A thief
insolvent a machine in ATM using a device and successfully blocked the working principle of
the card reader so that it can stop read the information stored in a card. Not only this but also the
thief has also broke 5 keys of the keypad. Thief was aimed to stop running procedure of the
Automated Teller Machine (ATM), as a customer will approach for any amount credit or debit.
Immediately after that another customer came to debit money from his or her bank account. The
customer also successfully withdrawals some money from the financial account but unable to
withdraw the ATM card from the machine. Immediate after that the thief came back and tried to
discover the ATM PIN of the customer so that can steal some money from customer account. In
order to identify the exact PIN of the customer the thief needs to calculate some permutation
combination. As 5 of the keys were already broken therefore, the possible PIN combination
needs to be prepared by the thief are of rest of the 5 keys. ATM PINS are made up of 4 digits.
The possible PIN numbers will be in between 0000 and 9999, where the lower level digit is 0000
and the upper or maximum higher level possible number is 9999 (Smith, Wiliem & Lovell,
(2015). The formula used to identify the possible numbers of PIN that the thief can enter to
withdraw money from the ATM is = nP(n-1).
In the formula n is the numbers of possible digits available. 5 keys are already broken
thus only 5 keys are left. Thus, the combination will be formed considering the left 5 numbers
only.
Information Security Question Answer 2022_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Role of Confidentiality, Integrity, and Availability in ATM system
|8
|1687
|2617

ATM & Cyber-Security
|10
|3344
|141

Information Security: CIA Triad, ATM Security, Biometric Authentication, Cipher Text Decryption
|9
|1589
|359

Assessment 2 - Information Security - ITC595
|8
|2053
|297

Information Security Management - Assignment
|8
|2250
|44

Information Security for ATM, Biometric Sensors and Cipher
|10
|2100
|403