logo

Information Security: CIA Trait, PIN Security, Biometric Issues, False Positive and Negative, Decoding Techniques

   

Added on  2023-06-14

9 Pages1640 Words444 Views
Running head: INFORMATION SECURITY
INFORMATION SECURITY
Name of the Student
Name of the University
Authors Note:

1INFORMATION SECURITY
Table of Contents
Answer to Question 1:.........................................................................................................2
Answer to Question 2:.........................................................................................................2
Answer to Question 3:.........................................................................................................3
Answer to Question 4:.........................................................................................................4
Answer to Question 5:.........................................................................................................4
References............................................................................................................................7

2INFORMATION SECURITY
Answer to Question 1:
The CIA trait can be considered as a basic guideline, which is related to ensuring the
security of data. The concept deals with how data can be secured saved without any third party
involving into the data. In this scenario, it can be stated that the PIN can act as a security aspect
in the framework of working which is involved into the ATM. The PIN can be considered as an
identification number, which can be used for conducting transaction over the system. In order to
achieve the desired standard of security the personal who are involved into the process should
achieve adequate amount of training so that they would be helpful in the concept of mitigation of
the problem when it occurs (Prasanthi et al., 2014)
Answer to Question 2:
In this question a situation is given in which a theft broke into the ATM by means of a
screwdriver. He was able to jam the card reader and eventually break five keys of the machine.
The thief in the process had to halt due to the factor a user was approaching to use the machine.
The customer entered the card but was not able to do any type of transaction. Therefore, he went
out to get help. In the meanwhile, the theft again entered the room and started to hint the
password or the PIN. In this question, we are to undertake the maximum amount of number the
PIN can be entered by means of using the permutation technique of the mathematics. The total
number of keys, which are present in the system, is ten out of which five keys were broken.
Therefore the number of keys which would be available for guesswork is five keys so that they
four digit password can be achieved.
5P4 = 5! / (5-4)! = 5! /1! = 5*4*3*2*1/ 1 =120/1 =120.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security
|5
|1368
|40

Information System for Automated Teller Machines Name of Student-Name of University- Author's Note
|5
|1413
|122

Information Security: CIA Model, Biometric Advantages and Disadvantages, Transposition Cipher
|8
|1397
|245

System Analysis and Design - Desklib
|7
|1398
|142

Information Security: ATMs, Biometric Authentication, Encryption Methodology
|10
|1408
|56

Information Security
|6
|1196
|79