logo

Information Security: CIA Triad, ATM Security, Biometric Authentication, Cipher Text Decryption

   

Added on  2023-06-14

9 Pages1589 Words359 Views
Running head: INFORMATION SECURITY
Information Security
Assessment No-
Assessment Title-
Student Name and ID-
Student name and Code-
Student Email Address-

1INFORMATION SECURITY
Answer to Question 1:
According to CIA triad, confidentiality, integrity, and availability are described as follows:
Confidentiality:
The main aim of confidentiality is to keep the information involved in the system secured
and protect the data from being breached or accessed by unauthorized person (Siponen,
Mahmood & Pahnila, 2014). The ATM cards contains many information that is to be kept
private from unauthorized access and the data in the ATM card consists of many important
information. The customers of the bank should keep the details of their ATM cards private so
that others do not access the bank details (Layton, 2016). The information confidentiality
involves encryption to keep all the data safe and the encryption process looks into the factor that
the right person gets the right access to the data.
Integrity:
The integrity security of ATM cards involves the fact that the content of the data should
not be changed or modified by invalid users and original message should reach to the authorized
person. According to the rules of integrity, the value of the AT should be kept original (Ab
Rahman & Choo, 2017). The data or the information that are transmitted over the network
should be tampered free. The data integrity of the system is secured by the encryption process
and contains hash functions for keeping the data safe.
Availability:

2INFORMATION SECURITY
The availability of data should be maintained by the security of the system. The
credentials that are needed for a successful transaction is to be available with the user while
transaction process is ongoing (Alaskar, Vodanovich & Shen, 2015). The security of the system
should ensure that the data is only available with the user and no other intruder gets the available
data of the ATM.
Answer to Question 2:
According to the scenario given, some security processes are involved with the ATM
machine security. The security system of the ATM allows a user to enter wrong pin to a
maximum of three times. After three wrong trials, the card of the user gets blocked. The card
gets unblocked only after 24 hours or so, or has to call the customer care to unblock the card
(Ciuffo & Weiss, 2017). According to the situation given, the thief has five keys left. With the
five keys, many four-digit ATM pin can be generated. The maximum number of four-digit ATM
pin that is possible in this case is:
5!/ (5-4)! = 5 * 4 * 3 * 2 = 120 times.
But, the security of the ATM will not allow the thief to enter the pin 120 times. The thief
will get a maximum of three trials and coincidently if the pins entered within the three trails get
correct, the transaction will be successful. Otherwise, the thief will not be able to withdraw
money and the card will get blocked.
Answer to Question 3:
The main reasons for which the users mainly depends on biometric authentication are:

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Technology - Assignment Solution
|5
|1474
|167

Information Security: Confidentiality, Integrity, and Availability
|6
|2253
|395

Factors for Protection of ATM Security, Biometric Authentication and Cryptography
|7
|1209
|292

Information Security Assignment Sample
|8
|1673
|45

Information System for Automated Teller Machines Name of Student-Name of University- Author's Note
|5
|1413
|122

The CIA Triad Model
|8
|1622
|352