logo

Information Security

   

Added on  2023-01-18

17 Pages4456 Words84 Views
Theoretical Computer ScienceDisease and Disorders
 | 
 | 
 | 
Running head: INFORMATION SECURITY
Information Security
Name of Student-
Name of University-
Author’s Note-
Information Security_1

1INFORMATION SECURITY
Table of Contents
Answer to Question 1:.........................................................................................................1
Answer to Question 2:.........................................................................................................3
Answer to Question 3:.........................................................................................................4
Answer to Question 4:.........................................................................................................5
Answer to Question 5..........................................................................................................6
References............................................................................................................................6
Information Security_2

2INFORMATION SECURITY
The answer to Question 1:
Confidentiality, Authenticity, as well as Integrity, is known as the CIA Triadand those
are known as the most basic concept in the sector of security. The three sides of the CIA Triad is
secured and it very much important to secure a particular item with CIA Triad. The system of
Automated Teller Machine (ATM) in this case stores personal identification of all the numbers
that are confidential with the ATM in both host system as well as in the transmission of the
transaction. The system should protect the integrity of the records of the accounts that are stored
in the system,and they should have an individual transaction. Availability of recorded system is
very important to the well-being of the bank,and it is its responsibility to keep the data safe. The
ATM is less concern about the availability. The three CIA Triadis explained in the following
section below.
Confidentiality: When confidentiality is talked about, the information that is relatedto
the system are to be kept a secret so that no unauthorized user can use the data. Confidentiality
states about protecting all information from being disclosed to any unauthorized parties.
All the information that is related to a system has its value in the recent technology
(Ciuffo & Weiss, 2017). The statements that are related to a bank account, all other personal
information, trade secrets, the governmental documents, as well as a number of credit cards are
the important documents related to an account of the bank,and those are to be kept secret. All
individuals want to keep some information secret,and for that reason, confidentiality is required.
Protecting information is one of the main part related to information security.
The most common component that is used to protect the confidentiality of the
information is the process of encryption. The process of encryption mainly states that
authenticated people access the data at the time and can get information about the data. The
process of encryption is commonly used in most of the technologies nowadays as this process
uses secured protocol to keep the data secure. One of the most important examples of SSL/TLS,
which is a security protocol that is used for communication over the internet which is used as a
conjunction including internet protocols for ensuring security. There are many other ways to
ensure the confidentiality of information that includes enforcing all the file permissions as well
as control list that restricts the access of the sensitive information.
Information Security_3

3INFORMATION SECURITY
Integrity: Integrity is the term used for data that states the protection of data to get access
from unauthorized users. Information is only valid if the data has its value and the data that is
being accessed has the original value (Kim et al., 2015). The information that isbeing changedisa
very costly method to get back to get the original data. For example, if a user in an ATM is
sending $10 to some other users, if the information tampers, the amount will change to
$1000,and more money will be deducted from the user.
There is a method of maintaining the data confidentiality that is cryptography. The
cryptography is a process that helps to keep the data integrity of a data. This process ensures that
data integrity is being ensured. Another commonly used method that is used for data integrity is
hashing, that includes comparing the data that is received along with comparing the hash with the
original message that is received. The hash that was in the original message should be
donesecurely.
Availability: The process of availability mainly states that the authorized users of the
data have access to the information when they need the data. Information or data only has value
if the data is accessed by the right people at the right amount of time (Thomas, Vinod &
Robinson, 2017). Denying information access is a common attack that is performed by users in a
highly technological world. There isa DDoS attack that is performed by the users for hampering
the availability of data in the system. The downtime of these particular attack is very costly.
Confidentiality requirements related to ATM are:
The channel of communication that connects the bank and the ATM of the bank should
have encryption process to ensure confidentiality.
The PIN generated in ATM should also be encrypted.
Integrity requirements that are required for an ATM are:
The actions that are performed through ATM are connected to the particular account
connected with the card.
Availability requirements required by ATM:
The ATM system should have the availability to serve at least more than one user at a
time and the ATM should be available 24x7.
Information Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security: CIA Triad and Biometric Authentication
|12
|2669
|151

Information Security: CIA Triad and Biometric Authentication
|16
|4179
|385

Information Security: CIA Triad, ATM Security, Biometric Authentication, Caesar Cipher
|13
|2577
|292

Information Security: CIA Triad, ATM Security, Biometric Authentication, Cipher Text Decryption
|9
|1589
|359

Information Technology - Assignment Solution
|5
|1474
|167

Information Security Management - Assignment
|8
|2250
|44