logo

Information Security

   

Added on  2023-01-20

6 Pages1196 Words79 Views
Running head: INFORMATION SECURITY
Information Security
Name of Student-
Name of University-
Author’s Note-

1INFORMATION SECURITY
Question 1
ATM needs CIA triad that consists of confidentiality, Integrity as well as Authentication.
The ATM need to maintain all three aspects of CIA triad to satisfy the rules and regulations.
For confidentiality, the Communication channels of the ATM should be encrypted with
encryption algorithm and so that they network are secured from hackers (Thomas, Vinod &
Robinson, 2017). The pin that are generated by the user should also follow the encryption
technique.
For integrity, the ATM should maintain the data integrity in the system. The data should
not be changed or altered in the network channel.
To maintain availability, the ATM machine should be available all the time to the
customers as because the main objective of the ATM system is to provide service to its
customers all 24 hours a day.
Question 2
As per calculation, after breaking five keys of the ATM, the thief is only left with five
other keys the total number of possible four digit pins he can enter is 120 times.
But as the ATM has security policies, the thief will be able to enter the pin only three
time. The security of the ATM states that a user can enter wrong pin only three times in an ATM
and after the third wrong attempt, the card will be blocked for a day (Kim et al., 2015). So, as the
question, the thief will have only three chance to get the pin.
Question 3

2INFORMATION SECURITY
Three main reasons for people being reluctant to use the technology of biometrics are
stated below:
Reason 1: The data that are saved are not secured. The data that are stored in biometrics
database are personal data of the people about their eyes, fingers and face (Ciuffo, & Weiss,
2017). The data collected are to be saved securely and biometric does not ensure such data
security with the data stored in the system.
Reason 2: The data in biometrics can be hacked. Hackers have many ways to hacks and
account and the data stored in biometric are extremely personal data and there is a high risk of
account hacking in biometrics. Identity of the person is breached with the use of biometrics.
Reason 3: There remains a surveillance fear while dealing with biometrics. The
biometrics makes use of law enforcement in the system. The data that are collected by hacking
the system can be used for unethical purposes.
These risks stated above can be overcome by the increasing the user experience,
lessening the spoofing attacks implementing multi factor authentication in the biometric system.
Question 4
Two instances that states that false negative are more serious compared to false positive
are stated below:
Example One: In a pregnancy test, there may be false negative result and false positive
result. The testing system for testing pregnancy can be malfunctioned due to some technical
errors (Bhagavatula et al., 2015). Due to technical error of pregnancy test, a woman who is
pregnant might not be aware of her pregnancy and might not have health check-ups. As a result,

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security
|5
|1368
|40

Information Security: CIA Triad, ATM Security, Biometric Authentication, Cipher Text Decryption
|9
|1589
|359

Information Security
|5
|1290
|53

Information Technology - Assignment Solution
|5
|1474
|167

The CIA Triad Model
|8
|1622
|352

System Analysis and Design - Desklib
|7
|1398
|142