Information Security

   

Added on  2023-01-18

5 Pages1368 Words40 Views
Running head: INFORMATION SECURITY
Information Security
Name of the Student
Name of the University
Information Security_1
2
INFORMATION SECURITY
1. CIA triad has been considered as a guide that has been including the concept of integrity,
confidentiality and availability has been used for taking proper measurement in context to data and
information security. The ATM has been using daily technology in which security has been playing an
important role. The pin number of the ATM card can be considered to be an important security aspect as
helping in restricting access to unauthorized users.
2. The maximum number of times the thief can enter pin before knowing the password of the ATM has
been calculated using permutation technique. It has been the total number of keypad within an ATM
machine ranging from 0 to 10. Therefore, for this situation, the thief has broken five keys and rets of the
five keys are available for providing input input the ATM machine. The ATM pin consist of four digits.
Therefore, after breaking five keys, the thief has option of any rest five keys to be entered out of which a
combination of four digit will be the correct pin. So, the permutation of the scenario has been given
below:
5P4 = 5! / (5-4)! = 5! /1! = 5*4*3*2*1/ 1 =120/1 =120.
This shows that that there has been total of 120 possible outcome. However, for security point of view,
only three times pin can be entered into the ATM machine. After three unsuccessful attempts, the ATM
card will be blocked. Therefore, it can be analyzed that the thief has only three attempts out of 120
possible outcomes to unlock the ATM card and after that ATM card will be automatically blocked.
3. There have been various benefits of biometric authentication system along with issues in the
technology. There have been various reasons due to which users might reluctant for using biometrics.
Some of these are mentioned below:
Security: This has been one of the critical reason due to which people have been using the biometric
systems. There have been successful attacks done on the biometrics. Users used to store various data and
Information Security_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security
|5
|1290
|53

Information System for Automated Teller Machines Name of Student-Name of University- Author's Note
|5
|1413
|122

Information Security: CIA Trait, PIN Security, Biometric Issues, False Positive and Negative, Decoding Techniques
|9
|1640
|444

Information Security
|6
|1196
|79

Information Security: ATMs, Biometric Authentication, Encryption Methodology
|10
|1408
|56

Information Security Assignment 2022
|6
|1257
|31