logo

Information Security: Confidentiality, Integrity, Availability, Bio-metrics, Cipher Text

   

Added on  2023-06-14

6 Pages1672 Words339 Views
 | 
 | 
 | 
Running head: INFORMATION SECURITY
Information Security
Name of the Student
Name of the University
Author Note
Information Security: Confidentiality, Integrity, Availability, Bio-metrics, Cipher Text_1

1INFORMATION SECURITY
Table of Contents
Question1: Confidentiality, integrity and availability requirements..........................................2
Question 2: Maximum number of PINs entered by the thief before entering the correct PIN. .2
Question 3: Reasons for reluctance to use bio-metrics and possible measures.........................2
Question 4: Circumstances for seriousness of false negatives are more than false positives....3
Question 5: Transposition technique for a cypher text..............................................................3
References..................................................................................................................................5
Information Security: Confidentiality, Integrity, Availability, Bio-metrics, Cipher Text_2

2INFORMATION SECURITY
Question1: Confidentiality, integrity and availability requirements
Solution: The below points shows the examples of confidentiality, integrity and
availability requirements of ATM.
Confidentiality:
The example of entering PIN shows the confidentiality scenario. The customer
intends to use their card such as debit card or credit card by entering PIN to get access their
account through swiping the card into ATM system (Saxena & Patel, 2017). Thus, the
customer eventually expects that the PIN to be secure and confidential in the ATM system.
This expectation is not only while swiping but also during transactions through the
communication between the bank server and the ATM system.
The degree of importance for confidentiality is unsecure and unsafe PIN while the
transaction occurred may result in compromising of bank account. This shows that encryption
of PIN is necessary and should be done properly.
Integrity:
The example of withdrawing cash shows the integrity scenario. The customer
withdraws $350 from ATM and the account balance is $3350 (Ghafari, Arian & Analoui,
2015). The ATM if accidentally updates $2950 in the account of customer instead of showing
and updating $3350 then this causes unexpected havoc and loss of balance amount.
The degree of importance for integrity is the transaction performed in the system can
directly affect the account of customer. Hence, transaction should have integrity that is
without any accidental or malicious changes.
Availability:
The example of serving to all customers at all times shows the availability scenario.
The customer go to ATM system and wants to withdraw cash however, the system is out of
service (Salnitri, Dalpiaz & Giorgini, 2014). This can result into problems for the customer if
the customer has emergency for cash.
The degree of importance for availability is that ATM system should be available to
the customers at all times without any hassle. It can serve to all customers at all times.
Question 2: Maximum number of PINs entered by the thief before entering the correct
PIN
Solution: The thief tries to enter the correct pin however, before entering the correct
pin the thief has to try different number of PINs. The calculation for the maximum number of
PINs to be entered for getting the correct PIN number is given as follows.
The PIN is of 4 digit number and the thief has to enter between 0000 to 9999 because
0 and 9 are the lowest and highest number in the keypad of ATM. Thus the maximum
number of PINs to be entered by the thief is 5P4.
Question 3: Reasons for reluctance to use bio-metrics and possible measures
Solution: The below points provide reasons for reluctance in using bio-metrics for
people.
Information Security: Confidentiality, Integrity, Availability, Bio-metrics, Cipher Text_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ITC542 - Assessment Item 2: Security Fundamentals
|11
|1782
|367

Information Security: Examples of Confidentiality, Integrity and Availability Requirements Associated with ATM Machines
|6
|1854
|399

Security Fundamentals Assignment
|6
|1116
|216

Information Security: ATM Requirements, Biometric Authentication, Encryption Methods
|10
|1864
|148

Information Security: CIA Triad, ATM Security, Biometric Authentication, Cipher Text Decryption
|9
|1589
|359

Information Security: Confidentiality, Integrity, and Availability
|6
|2253
|395