logo

Information Security: ATM Requirements, Biometric Authentication, Encryption Methods

   

Added on  2023-06-14

10 Pages1864 Words148 Views
Theoretical Computer Science
 | 
 | 
 | 
Running head: INFORMATION SECURITY
Information Security
Name of the Student
Name of the University
Author’s Note:
Information Security: ATM Requirements, Biometric Authentication, Encryption Methods_1

1
INFORMATION SECURITY
Table of Contents
Question 1..................................................................................................................................2
Question 2..................................................................................................................................4
Question 3..................................................................................................................................5
Question 4..................................................................................................................................6
Question 5..................................................................................................................................7
References..................................................................................................................................9
Information Security: ATM Requirements, Biometric Authentication, Encryption Methods_2

2
INFORMATION SECURITY
Question 1
Automated Teller Machine or an ATM is used for the purpose of withdrawing cash
without even visiting to the bank or without interacting with the bank staff members. Three
important requirements are present for the ATM card and the PIN. They are as follows:
i) Confidentiality: It is the other name for privacy and it helps to maintain the privacy
of the ATM card. Under no circumstances, the confidentiality of the card should be lost. The
user would major losses if this type of situation arrives (Peltier, 2013).
The degree of importance of confidentiality is high since, unsecured PIN during the
transactions can lead to the compromise of the bank account and therefore, encryption must
be present.
The examples of confidentiality in ATM system are as follows:
a) The details of the ATM card and PIN are extremely confidential and should not be
lost.
b) Presence of the ATM card while making a transaction is mandatory.
ii) Integrity: The data integrity is the next important requirement in ATM. The PIN
could be changed by the hackers and the users should ensure that this type of situation does
not arrive.
The degree of importance of integrity is high as if any hacker or thief gets hold of the
ATM card or PIN; they might change the data for the purpose of withdrawing money. Hence,
data integrity should be maintained properly.
The examples are as follows:
Information Security: ATM Requirements, Biometric Authentication, Encryption Methods_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ATM Security: Maintaining Confidentiality, Integrity and Availability
|10
|2628
|282

Information Security: ATM, Biometric Authentication, and Transposition Cipher
|14
|2706
|261

Information Security: ATMs, Biometric Authentication, Encryption Methodology
|10
|1408
|56

Information Security: ATM, Biometric Authentication, Transposition Cipher
|10
|3198
|200

Information Security: Confidentiality, Integrity, Availability, Bio-metrics, Cipher Text
|6
|1672
|339

Information Security: CIA Triad, ATM Security, Biometric Authentication, Cipher Text Decryption
|9
|1589
|359