logo

Information Security: ATM, Biometric Authentication, and Caesar Cipher

   

Added on  2023-06-13

10 Pages3304 Words496 Views
Theoretical Computer Science
 | 
 | 
 | 
Running head: INFORMATION SECURITY
Information Security
Name of the Student
Name of the University
Author’s Note:
Information Security: ATM, Biometric Authentication, and Caesar Cipher_1

1
INFORMATION SECURITY
Table of Contents
Question 1..................................................................................................................................2
Question 2..................................................................................................................................3
Question 3..................................................................................................................................4
Question 4..................................................................................................................................5
Question 5..................................................................................................................................6
References..................................................................................................................................8
Information Security: ATM, Biometric Authentication, and Caesar Cipher_2

2
INFORMATION SECURITY
Question 1
The electronic telecommunication device involved for the purpose of cash
withdrawal or checking balance of the existing bank account of any particular authorized user
is known as an ATM or Automated Teller Machine. All types of financial transactions could
be easily executed with the help of this Automated Teller Machine (De Gramatica et al.,
2015). The financial institutions utilize this typical electronic device for the successful
execution of the financial transactions like cash deposits, getting information regarding bank
accounts, cash withdrawals, transferring funds irrespective of the time or place without
requiring any type of interaction or help from the bank executives. The ATM machines are
utilized and installed in each and every country or city or village in the world.
The users, utilizing the ATM systems are given a card and a PIN number. The card is
referred to as an ATM card and the PIN or the personal identification number is referred to a
four digits code that is absolutely unique for each and every card. With the joint operation of
the ATM card and the four digits PIN number, the user becomes an authorized user and thus
he is able to utilize his card for withdrawing some money from his existing bank account.
Three specific requirements are needed in every specific ATM card (Grama, 2014).
They are termed as the CIA or the confidentiality, integrity and the availability. These three
requirements are being explained in the following paragraphs:
i) Confidentiality: This is the other name of privacy. Confidentiality helps to keep the
privacy and security of the ATM card of any authorized user. This confidentiality is
extremely important for each and every ATM card as it helps in maintaining the details of the
user private as well as secret (Peltier, 2013). The two examples of confidentiality in ATM
card are as follows:
a) The PIN and the card number should be stolen or lost at any cost.
b) The confidentiality of the ATM also deals with the fact the ATM card must be
present with the user while executing a transaction.
ii) Integrity: The next requirement in the CIA is the integrity. This basically refers to
the consistency of the data of the ATM card or the PIN number. Data integrity is the most
important and significant factor in ATM (Siponen, Mahmood & Pahnila, 2014). The
examples of integrity within an ATM card are as follows:
a) No alteration in the data of the ATM card without the consent of the user.
b) Accidental or deliberate data removal solely affects integrity of data.
iii) Availability: The final requirement in the CIA category is the availability. This
refers to the availability of the hardware or the important information that is required for
executing any transaction. The examples of availability within an ATM card are as follows:
a) The information systems used for the ATM machines (Xu, Zhou & Lyu, 2014).
b) The confidential information should be maintained properly.
Information Security: ATM, Biometric Authentication, and Caesar Cipher_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security: ATM, Biometric Authentication, Transposition Cipher
|10
|3198
|200

Information Security: ATM, Biometric Authentication, Encryption
|9
|3313
|419

ATM Security: Maintaining Confidentiality, Integrity and Availability
|10
|2628
|282

Information Security: ATM, Biometric Authentication, and Transposition Cipher
|14
|2706
|261

Information Security: Importance of CIA Requirements in ATM Systems
|13
|3715
|129

ATM & Cyber-Security
|10
|3344
|141