Information Security: CIA Model, Biometric Advantages and Disadvantages, Transposition Cipher
Verified
Added on 2023/06/13
|8
|1397
|245
AI Summary
This article discusses the CIA model for ATM security, advantages and disadvantages of biometric, and transposition cipher. It also includes solved assignments, essays, and dissertations related to information security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: INFORMATION SECURITY INFORMATION SECURITY Name of the Student Name of the University Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1INFORMATION SECURITY Table of Contents Answer to Question 1:.....................................................................................................................2 Answer to Question 2:.....................................................................................................................2 Answer to Question 3:.....................................................................................................................3 Answer to Question 4:.....................................................................................................................3 Answer to Question 5:.....................................................................................................................4 References........................................................................................................................................7
2INFORMATION SECURITY Answer to Question 1: CIA stands for confidentiality, Integrity and Availability is nothing but a well-known security model for development of security policy in ATM machine. This particular model consists of three concepts namely confidentiality, integrity and availability (Jebaline & Gomathi, 2015). Confidentiality in ATM machine generally ensures the fact that sensitive kind of information are only accessed by authorized person and is generally kept away from various persons who are not authorized to use it. Integrity in ATM machine is the information which is provided in a particular format which is true and correct to original needs. The receiver of the information generally ensures the fact that information can be accessed by any authorized person only and it remains in the state of rest (Karovaliya et al. 2015). Availability in ATM machine mainly checks the fact that information and resources are only accessed by people who need them. Availability in ATM machine is generally implemented by making use of hardware maintenance, patching of software, optimization of network. Answer to Question 2: The total keypad of an ATM machine generally consists of ten keys which is 0-9. A situation is provided in question in which thief has broken five keys so more five number of keys will available to him. The pin number of an ATM machine consist of four numbers. Therefore, five keys available to for possible four-digit number are: 5P4= 5! / (5-4)! = 5! /1! = 5*4*3*2*1/ 1 =120/1 =120. Therefore, the total number of outcomes in the case provided is 120. On the contrary in ATM security a user can easily enter pin numbers for three times only after that card will be blocked by the system.
3INFORMATION SECURITY Answer to Question 3: Various kinds of advantage and disadvantage can be obtained from the idea of biometric. The three main reason which can reluctant the use of biometric are: Security can be considered to be one of the key concept which can reluctant the use of biometric (Koteswari & Paul, 2017). In biometric system information of a person is generally stored in the database. But if anyhow database is hacked it can easily result in leakage of personal information. Various kinds of errors can be encountered in technology of biometric. In various kinds of biometric an individual does not have idea regarding identification of a person. In mapping the concept of mapping is generally taken into consideration in case of biometric system. Mapping in biometric is generally done by the information usually the fingerprint (Koteswari & Paul, 2017). In the situation provided one needs to have more accurate. In some cases, it is observed that system has failed to recognize the person even if the identification of the user is generally stored in the database. Answer to Question 4: A false negative is nothing but a situation in which the user does not get access to a particular location where the biometric is claimed to be bounded (Onyesolu & Okpala, 2017). In some of the cases it is observed that access to an individual is not given although the identity of the person is stored in the database. The above situation can occur due to some of kinds of faults in the system. There are many kinds of unethical activities are done due to evolution of biometric
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4INFORMATION SECURITY system (Pathak et al, 2015). First issue which is considered is that identity of a person is unknown. Second situation is nothing but the loss of identity of a person. Answer to Question 5: Transposition cipher can be defined as a scheme in which simple machine in major of the plaintext are shifted into some kind of regular patterns (Peltier, 2016). For many years round the globe people are making use of simple distribution cipher. It is nothing but plain text character which is considered to be different from cipher text. ABCDEFGHIJKLMNOPQRSTUVWXYZ 1234567891011121314151617181920212223242526 Encrypted TextNTJWKHXK Corresponding numeric value142010231182411 Key23423423 Decodedfromthe substitution cipher121762184228 Caeser cipher shift33333333 Decodedfromthe caeser cipher91431851195 Decoded TextINCREASE Encrypted TextAMK Corresponding numeric value113 1 1 Key423 Decoded from the substitution cipher23118 Caeser cipher shift333 Decoded from the caeser cipher2085 Decoded TextTHE
5INFORMATION SECURITY Encrypted TextWWUJJYZTX Correspondi ngnumeric value232321101025262024 Key423423423 Decoded fromthe substitution cipher1921186822221821 Caeser cipher shift333333333 Decoded fromthe caeser cipher1618153519191518 Decoded TextPROCESSOR Encrypted TextMWKXZKUHE Correspondi ngnumeric value1323112426112185 Key423423423 Decoded fromthe substitution cipher9218202481762 Caeser cipher shift333333333 Decoded fromthe caeser cipher61851721514325 Decoded TextFREQUENCY So, the decoded text for the cypher text will be “INCREASE THE PROCESSOR FREQUENCY”
6INFORMATION SECURITY
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7INFORMATION SECURITY References Jebaline, G. R., & Gomathi, S. (2015, March). A novel method to enhance the security of ATM using biometrics. InCircuit, Power and Computing Technologies (ICCPCT), 2015 International Conference on(pp. 1-4). IEEE. Karovaliya, M., Karedia, S., Oza, S., & Kalbande, D. R. (2015). Enhanced security for ATM machine with OTP and Facial recognition features.Procedia Computer Science,45, 390- 396. Koteswari, S., & Paul, P. J. (2017). A Survey: Fusion of Fingerprint and Iris for ATM services. Onyesolu,M.O.,&Okpala,A.C.(2017).ImprovingSecurityUsingaThree-Tier AuthenticationforAutomatedTellerMachine(ATM).InternationalJournalof Computer Network and Information Security,9(10), 50. Pathak, S. K., Pathak, S. K., Mishra, M. K., Kesharwani, L., & Gupta, A. K. (2015). Automated Teller Machine (ATM) Frauds and Security.EDITORIAL BOARD, 192. Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press.