Information Security: CIA Model, Biometric Advantages and Disadvantages, Transposition Cipher
VerifiedAdded on 2023/06/13
|8
|1397
|245
AI Summary
This article discusses the CIA model for ATM security, advantages and disadvantages of biometric, and transposition cipher. It also includes solved assignments, essays, and dissertations related to information security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: INFORMATION SECURITY
INFORMATION SECURITY
Name of the Student
Name of the University
Author Note:
INFORMATION SECURITY
Name of the Student
Name of the University
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1INFORMATION SECURITY
Table of Contents
Answer to Question 1:.....................................................................................................................2
Answer to Question 2:.....................................................................................................................2
Answer to Question 3:.....................................................................................................................3
Answer to Question 4:.....................................................................................................................3
Answer to Question 5:.....................................................................................................................4
References........................................................................................................................................7
Table of Contents
Answer to Question 1:.....................................................................................................................2
Answer to Question 2:.....................................................................................................................2
Answer to Question 3:.....................................................................................................................3
Answer to Question 4:.....................................................................................................................3
Answer to Question 5:.....................................................................................................................4
References........................................................................................................................................7
2INFORMATION SECURITY
Answer to Question 1:
CIA stands for confidentiality, Integrity and Availability is nothing but a well-known
security model for development of security policy in ATM machine. This particular model
consists of three concepts namely confidentiality, integrity and availability (Jebaline & Gomathi,
2015). Confidentiality in ATM machine generally ensures the fact that sensitive kind of
information are only accessed by authorized person and is generally kept away from various
persons who are not authorized to use it. Integrity in ATM machine is the information which is
provided in a particular format which is true and correct to original needs. The receiver of the
information generally ensures the fact that information can be accessed by any authorized person
only and it remains in the state of rest (Karovaliya et al. 2015). Availability in ATM machine
mainly checks the fact that information and resources are only accessed by people who need
them. Availability in ATM machine is generally implemented by making use of hardware
maintenance, patching of software, optimization of network.
Answer to Question 2:
The total keypad of an ATM machine generally consists of ten keys which is 0-9. A
situation is provided in question in which thief has broken five keys so more five number of keys
will available to him. The pin number of an ATM machine consist of four numbers. Therefore,
five keys available to for possible four-digit number are:
5P4 = 5! / (5-4)! = 5! /1! = 5*4*3*2*1/ 1 =120/1 =120.
Therefore, the total number of outcomes in the case provided is 120. On the contrary in ATM
security a user can easily enter pin numbers for three times only after that card will be blocked
by the system.
Answer to Question 1:
CIA stands for confidentiality, Integrity and Availability is nothing but a well-known
security model for development of security policy in ATM machine. This particular model
consists of three concepts namely confidentiality, integrity and availability (Jebaline & Gomathi,
2015). Confidentiality in ATM machine generally ensures the fact that sensitive kind of
information are only accessed by authorized person and is generally kept away from various
persons who are not authorized to use it. Integrity in ATM machine is the information which is
provided in a particular format which is true and correct to original needs. The receiver of the
information generally ensures the fact that information can be accessed by any authorized person
only and it remains in the state of rest (Karovaliya et al. 2015). Availability in ATM machine
mainly checks the fact that information and resources are only accessed by people who need
them. Availability in ATM machine is generally implemented by making use of hardware
maintenance, patching of software, optimization of network.
Answer to Question 2:
The total keypad of an ATM machine generally consists of ten keys which is 0-9. A
situation is provided in question in which thief has broken five keys so more five number of keys
will available to him. The pin number of an ATM machine consist of four numbers. Therefore,
five keys available to for possible four-digit number are:
5P4 = 5! / (5-4)! = 5! /1! = 5*4*3*2*1/ 1 =120/1 =120.
Therefore, the total number of outcomes in the case provided is 120. On the contrary in ATM
security a user can easily enter pin numbers for three times only after that card will be blocked
by the system.
3INFORMATION SECURITY
Answer to Question 3:
Various kinds of advantage and disadvantage can be obtained from the idea of biometric.
The three main reason which can reluctant the use of biometric are:
Security can be considered to be one of the key concept which can reluctant the
use of biometric (Koteswari & Paul, 2017). In biometric system information of a
person is generally stored in the database. But if anyhow database is hacked it can
easily result in leakage of personal information.
Various kinds of errors can be encountered in technology of biometric. In various
kinds of biometric an individual does not have idea regarding identification of a
person.
In mapping the concept of mapping is generally taken into consideration in case
of biometric system. Mapping in biometric is generally done by the information
usually the fingerprint (Koteswari & Paul, 2017). In the situation provided one
needs to have more accurate. In some cases, it is observed that system has failed
to recognize the person even if the identification of the user is generally stored in
the database.
Answer to Question 4:
A false negative is nothing but a situation in which the user does not get access to a
particular location where the biometric is claimed to be bounded (Onyesolu & Okpala, 2017). In
some of the cases it is observed that access to an individual is not given although the identity of
the person is stored in the database. The above situation can occur due to some of kinds of faults
in the system. There are many kinds of unethical activities are done due to evolution of biometric
Answer to Question 3:
Various kinds of advantage and disadvantage can be obtained from the idea of biometric.
The three main reason which can reluctant the use of biometric are:
Security can be considered to be one of the key concept which can reluctant the
use of biometric (Koteswari & Paul, 2017). In biometric system information of a
person is generally stored in the database. But if anyhow database is hacked it can
easily result in leakage of personal information.
Various kinds of errors can be encountered in technology of biometric. In various
kinds of biometric an individual does not have idea regarding identification of a
person.
In mapping the concept of mapping is generally taken into consideration in case
of biometric system. Mapping in biometric is generally done by the information
usually the fingerprint (Koteswari & Paul, 2017). In the situation provided one
needs to have more accurate. In some cases, it is observed that system has failed
to recognize the person even if the identification of the user is generally stored in
the database.
Answer to Question 4:
A false negative is nothing but a situation in which the user does not get access to a
particular location where the biometric is claimed to be bounded (Onyesolu & Okpala, 2017). In
some of the cases it is observed that access to an individual is not given although the identity of
the person is stored in the database. The above situation can occur due to some of kinds of faults
in the system. There are many kinds of unethical activities are done due to evolution of biometric
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4INFORMATION SECURITY
system (Pathak et al, 2015). First issue which is considered is that identity of a person is
unknown. Second situation is nothing but the loss of identity of a person.
Answer to Question 5:
Transposition cipher can be defined as a scheme in which simple machine in major of the
plaintext are shifted into some kind of regular patterns (Peltier, 2016). For many years round the
globe people are making use of simple distribution cipher. It is nothing but plain text character
which is considered to be different from cipher text.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
Encrypted Text N T J W K H X K
Corresponding
numeric value 14 20 10 23 11 8 24 11
Key 2 3 4 2 3 4 2 3
Decoded from the
substitution cipher 12 17 6 21 8 4 22 8
Caeser cipher shift 3 3 3 3 3 3 3 3
Decoded from the
caeser cipher 9 14 3 18 5 1 19 5
Decoded Text I N C R E A S E
Encrypted Text A M K
Corresponding numeric value 1 13
1
1
Key 4 2 3
Decoded from the substitution cipher 23 11 8
Caeser cipher shift 3 3 3
Decoded from the caeser cipher 20 8 5
Decoded Text T H E
system (Pathak et al, 2015). First issue which is considered is that identity of a person is
unknown. Second situation is nothing but the loss of identity of a person.
Answer to Question 5:
Transposition cipher can be defined as a scheme in which simple machine in major of the
plaintext are shifted into some kind of regular patterns (Peltier, 2016). For many years round the
globe people are making use of simple distribution cipher. It is nothing but plain text character
which is considered to be different from cipher text.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
Encrypted Text N T J W K H X K
Corresponding
numeric value 14 20 10 23 11 8 24 11
Key 2 3 4 2 3 4 2 3
Decoded from the
substitution cipher 12 17 6 21 8 4 22 8
Caeser cipher shift 3 3 3 3 3 3 3 3
Decoded from the
caeser cipher 9 14 3 18 5 1 19 5
Decoded Text I N C R E A S E
Encrypted Text A M K
Corresponding numeric value 1 13
1
1
Key 4 2 3
Decoded from the substitution cipher 23 11 8
Caeser cipher shift 3 3 3
Decoded from the caeser cipher 20 8 5
Decoded Text T H E
5INFORMATION SECURITY
Encrypted
Text W W U J J Y Z T X
Correspondi
ng numeric
value 23 23 21 10 10 25 26 20 24
Key 4 2 3 4 2 3 4 2 3
Decoded
from the
substitution
cipher 19 21 18 6 8 22 22 18 21
Caeser
cipher shift 3 3 3 3 3 3 3 3 3
Decoded
from the
caeser
cipher 16 18 15 3 5 19 19 15 18
Decoded
Text P R O C E S S O R
Encrypted
Text M W K X Z K U H E
Correspondi
ng numeric
value 13 23 11 24 26 11 21 8 5
Key 4 2 3 4 2 3 4 2 3
Decoded
from the
substitution
cipher 9 21 8 20 24 8 17 6 2
Caeser
cipher shift 3 3 3 3 3 3 3 3 3
Decoded
from the
caeser
cipher 6 18 5 17 21 5 14 3 25
Decoded
Text F R E Q U E N C Y
So, the decoded text for the cypher text will be
“INCREASE THE PROCESSOR FREQUENCY”
Encrypted
Text W W U J J Y Z T X
Correspondi
ng numeric
value 23 23 21 10 10 25 26 20 24
Key 4 2 3 4 2 3 4 2 3
Decoded
from the
substitution
cipher 19 21 18 6 8 22 22 18 21
Caeser
cipher shift 3 3 3 3 3 3 3 3 3
Decoded
from the
caeser
cipher 16 18 15 3 5 19 19 15 18
Decoded
Text P R O C E S S O R
Encrypted
Text M W K X Z K U H E
Correspondi
ng numeric
value 13 23 11 24 26 11 21 8 5
Key 4 2 3 4 2 3 4 2 3
Decoded
from the
substitution
cipher 9 21 8 20 24 8 17 6 2
Caeser
cipher shift 3 3 3 3 3 3 3 3 3
Decoded
from the
caeser
cipher 6 18 5 17 21 5 14 3 25
Decoded
Text F R E Q U E N C Y
So, the decoded text for the cypher text will be
“INCREASE THE PROCESSOR FREQUENCY”
6INFORMATION SECURITY
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7INFORMATION SECURITY
References
Jebaline, G. R., & Gomathi, S. (2015, March). A novel method to enhance the security of ATM
using biometrics. In Circuit, Power and Computing Technologies (ICCPCT), 2015
International Conference on (pp. 1-4). IEEE.
Karovaliya, M., Karedia, S., Oza, S., & Kalbande, D. R. (2015). Enhanced security for ATM
machine with OTP and Facial recognition features. Procedia Computer Science, 45, 390-
396.
Koteswari, S., & Paul, P. J. (2017). A Survey: Fusion of Fingerprint and Iris for ATM services.
Onyesolu, M. O., & Okpala, A. C. (2017). Improving Security Using a Three-Tier
Authentication for Automated Teller Machine (ATM). International Journal of
Computer Network and Information Security, 9(10), 50.
Pathak, S. K., Pathak, S. K., Mishra, M. K., Kesharwani, L., & Gupta, A. K. (2015). Automated
Teller Machine (ATM) Frauds and Security. EDITORIAL BOARD, 192.
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for
effective information security management. CRC Press.
References
Jebaline, G. R., & Gomathi, S. (2015, March). A novel method to enhance the security of ATM
using biometrics. In Circuit, Power and Computing Technologies (ICCPCT), 2015
International Conference on (pp. 1-4). IEEE.
Karovaliya, M., Karedia, S., Oza, S., & Kalbande, D. R. (2015). Enhanced security for ATM
machine with OTP and Facial recognition features. Procedia Computer Science, 45, 390-
396.
Koteswari, S., & Paul, P. J. (2017). A Survey: Fusion of Fingerprint and Iris for ATM services.
Onyesolu, M. O., & Okpala, A. C. (2017). Improving Security Using a Three-Tier
Authentication for Automated Teller Machine (ATM). International Journal of
Computer Network and Information Security, 9(10), 50.
Pathak, S. K., Pathak, S. K., Mishra, M. K., Kesharwani, L., & Gupta, A. K. (2015). Automated
Teller Machine (ATM) Frauds and Security. EDITORIAL BOARD, 192.
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for
effective information security management. CRC Press.
1 out of 8
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.