logo

Information Security: ATM, Biometric Authentication, Transposition Cipher

   

Added on  2023-06-13

10 Pages3198 Words200 Views
 | 
 | 
 | 
Running head: INFORMATION SECURITY
Information Security
Name of the Student
Name of the University
Author’s Note:
Information Security: ATM, Biometric Authentication, Transposition Cipher_1

1
INFORMATION SECURITY
Table of Contents
Question 1..................................................................................................................................2
Question 2..................................................................................................................................3
Question 3..................................................................................................................................4
Question 4..................................................................................................................................5
Question 5..................................................................................................................................6
References..................................................................................................................................8
Information Security: ATM, Biometric Authentication, Transposition Cipher_2

2
INFORMATION SECURITY
Question 1
Automated Teller Machine or ATM is the electronic telecommunication device,
which are utilized for the proper and successful withdrawal of money without even visiting to
the bank. This cash withdrawal is done from the existing bank account of the customer. The
customer is extremely benefitted from the service (Peltier, 2016). The most significant
advantage of an Automated Teller Machine is that no time is restricted for it and the customer
can withdraw cash any time. However, the only restriction is that the customer should have a
valid bank account for withdrawal of cash.
The users of the Automated Teller Machine are provided with an ATM card and a
specific and distinct PIN or the personal identification number by the bank. Both of these
ATM card and PIN are extremely important for the user to make any type of transaction. The
PIN of the customer is four digit number, which is absolutely different for each and every
ATM card. Moreover, the ATM card and the PIN should be kept absolutely private and
confidential to avoid any type of problem in confidentiality.Three major requirements are
present in the ATM card. They are the confidentiality, integrity and availability or CIA in
short. All these three requirements help the system of ATM or Automated Teller Machine to
be extremely popular and unique with respect to others. Each one of these is explained below:
i) Confidentiality: this is the other name of privacy. It is known as the most
significant criterion of ATM systems. Only the authenticated and authorized users are
allowed to use this particular card and its personal identification number (Andress, 2014).
The degree of importance is very high as unsecured PIN can lead to the loss of money and
confidentiality.
The examples of confidentiality in an Automated Teller Machine are given below:
a) Loss of ATM card and the PIN of an authorized user.
b) Presence of the ATM card while making any transaction.
ii) Integrity: This is the second important requirement where the data integrity is
highly maintained. This data integration does turn out the most significant feature in an
Automated Teller Machine. If the data is changed or altered, the user would be in grave
danger. The degree of importance of the integrity is very high in comparison to other as the
user might face major losses if his data would be changed or altered.
The examples of integrity in an Automated Teller Machine are given below:
a) Change or alteration in the confidential data (De Gramatica et al., 2015).
b) Intentional removal of confidential data.
iii) Availability: the third requirement is the availability of information and hardware.
If both of these will not be available, it is nearly impossible to make any transaction. The
degree of importance of the availability is very high as if the information and hardware will
not be present; it is evident that the transactions will not be done.
The examples of availability in an Automated Teller Machine are given below:
a) Lack of accurate information elated to ATM card and PIN.
Information Security: ATM, Biometric Authentication, Transposition Cipher_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ATM Security: Maintaining Confidentiality, Integrity and Availability
|10
|2628
|282

Information Security: ATM, Biometric Authentication, Encryption
|9
|3313
|419

Information Security: ATM, Biometric Authentication, and Caesar Cipher
|10
|3304
|496

Information Security: ATM, Biometric Authentication, and Transposition Cipher
|14
|2706
|261

Information Security: ATM Requirements, Biometric Authentication, Encryption Methods
|10
|1864
|148

Information Security: Examples of Confidentiality, Integrity and Availability Requirements Associated with ATM Machines
|6
|1854
|399