logo

Information Security: ATMs, Biometric Authentication, Encryption Methodology

   

Added on  2023-06-13

10 Pages1408 Words56 Views
 | 
 | 
 | 
Running head: INFORMATION SECURITY
Information Security
Name of the Student
Name of the University
Author’s Note:
Information Security: ATMs, Biometric Authentication, Encryption Methodology_1

1
INFORMATION SECURITY
Table of Contents
Question 1..................................................................................................................................2
Question 2..................................................................................................................................3
Question 3..................................................................................................................................4
Question 4..................................................................................................................................5
Question 5..................................................................................................................................6
References..................................................................................................................................8
Information Security: ATMs, Biometric Authentication, Encryption Methodology_2

2
INFORMATION SECURITY
Question 1
ATMs are the most important and significant requirements in today’s world. It helps
in easy withdrawal of money. The bank staffs are not involved in this process. An ATM card
and the PIN are required (De Gramatica et al., 2015). The three requirements of ATM are
given below:
i) Confidentiality: It helps to maintain the privacy of the ATM card as well as the
PIN.
Two examples of confidentiality include:
a) Maintaining privacy of the card number and the personal identification number.
b) ATM card should be present while making a transaction.
ii) Integrity: It helps to maintain the integrity of data and so that the data is not
changed or altered.
Two examples of integrity include:
a) No changing of data of the ATM card and PIN (De Gramatica et al., 2015).
b) Unintentional deletion of data.
iii) Availability: Accurate information as well as hardware should be available while
making a transaction.
Two examples of availability include:
a) Accurate information is available.
b) ATM is available.
Information Security: ATMs, Biometric Authentication, Encryption Methodology_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information System for Automated Teller Machines Name of Student-Name of University- Author's Note
|5
|1413
|122

ATM Security: Maintaining Confidentiality, Integrity and Availability
|10
|2628
|282

Information Security: ATM Requirements, Biometric Authentication, Encryption Methods
|10
|1864
|148

Information Security: ATM, Biometric Authentication, and Transposition Cipher
|14
|2706
|261

Information Security Systems in ATM
|9
|1901
|332

Information Security for ATM: Confidentiality, Integrity, Availability, Biometric and Cypher Code
|9
|1921
|244