Information Security: CIA Triad and Biometric Authentication
Verified
Added on  2023/06/13
|12
|2669
|151
AI Summary
This article discusses the CIA triad and biometric authentication in information security. It explains the concepts of confidentiality, integrity, and availability, and the advantages and disadvantages of biometric authentication. It also covers encryption processes and error types in biometric authentication.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: INFORMATION SECURITY INFORMATION SECURITY Name of Student- Name of University- Author’s Note-
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1INFORMATION SECURITY Answer to Question 1: The CIA, also known as Confidentiality, Integrity, and Availability is the guiding policies that are involved in the maintaining the security of data. The policies that are involved in the CIA triad helps to increase the security process of the organization or a system. Confidentiality: ï‚·Ensure mainly the confidentiality of data that are transmitting from the sender to the receiver (Bhagavatula et al., 2015). ï‚·Confidentiality helps in increasing the security of the data that are involved in the network. ï‚·Example of confidentiality involves the security of data while a ATM transaction is being taken place. ï‚·The data involved in a ATM transaction should be confidential and the user should have all the data available for the transaction to be successful. ï‚·The data that are carried out with the transaction should be present only with the authenticated user, and no unauthorized user can access it. ï‚·The credentials that are to be kept secret and private generally consist of number on the card, the secret pin number, and the CVV number present on the card (Kim et al., 2015). ï‚·The confidentiality of the data is required to keep the bank details of the customer secret. ï‚·Many processes are available that helps to keep the data confidential. ï‚·Data encryption is one of such processes that can implemented to encrypt the data, and other processes includes to keep a backup for the data that are already present in the network.
2INFORMATION SECURITY Integrity: ï‚·Integrity involves to keep data with the same accuracy with which it was built, the consistency should also be maintained (He & Wang, 2015). ï‚·The data should maintain the integrity to maintain the trustworthiness of the data. ï‚·Data integrity means keeping the data same throughout its life,so that the any transformation of data does not take place. ï‚·The data that are transmitted should be same as that is transmitted by the sender and should receive as the original one when it reaches the receiver (Layton, 2016). ï‚·The permission of the file access should be only available with the user and no other will have permission to access the file. ï‚·Example of data integrity is that the data of the ATM involved should remain same and is not changed by any other accidentally or deliberately. ï‚·There are many redundancy algorithms that helps to keep the data integrated. Availability: ï‚·The availability of data ensures the data availability with the user. ï‚·The data available with the user should be secured be kept private. ï‚·The data availability also involves in keeping all the hardware and software of the system available with user. ï‚·The system available should be always updated and there should be a backup storage for the data in the system (Chen, Pande & Mohapatra, 2014). ï‚·Firewalls are to be connected as proxy server with the available data.
3INFORMATION SECURITY ï‚·The availability of data should be available only with the authenticated user and any other intruder should not get the access of data. ï‚·Biometric authentication is a process by which the data availability can be ensured. Answer to Question 2: There is a security in the ATM system that the pin that is to be entered by a user is maximum of three times (Alaskar, Vodanovich & Shen, 2015). A particular user cannot input the secret pin code of the card more than three times deliberately or accidentally. It is not possible to give the pin more than three times. But in the given question, the thief has already broken five keys of the keypad, and he is only left with five more keys to find out the four digit number. So, the maximum possibilities that the thief has is 5!/ (5-4)! = 120 times. But the security process does not allow the thief to do so. The thief only can enter the pin three times, and if the pin coincidently matches the original pin within three trials, he will be successful in doing the transaction. But, after three wrong trials, he will not be able to withdraw any cash from the card and the card will be blocked (De Luca et al., 2015). There are some security measures also for the situation if the card gets blocked. The user has to call the customer care or will have to wait for maximum of I day to make the card working Answer to Question 3: Many reasons are included in the system of biometric due to which people cannot depends on the biometric fully (Ghosh et al., 2017). Along with many advantages that are provided by the system of biometric authentication, there are many disadvantages as well that the system provides. The risks of carrying out the biometric authentication process involves-
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4INFORMATION SECURITY 1) Providing Security- The first and foremost advantage that the biometric system promises to keep is the security of data (Memon, 2017). But, the biometric system is not capable of doing so. There are, many security breaches that occurs on system that deals with biometric system. The system included with the biometric is to provide a data that is convenient, is to provide data accountability, and demands that the data are very difficult to copy. But, the system does not provide security to all the data that are present in the system. Many data breach case are there that happens because of data leak from biometric system. The system of biometric provides other errors as well. The system of biometric provides errors that have false acceptance and false rejection. These rates denotes the wrong detection that the system does (Layton, 2016). The system cannot detect an authorized person, or can give access even to an unauthorized person as a authorized one. The system cannot match the database with that of the user. 2) The system of biometric says that the scans of fingerprints, iris, or retina cannot be made duplicate (Brakerski & Vaikuntanathan, 2015). Actually the scenario is not so. There can be duplicate fingerprints made by the attackers and even the iris or retina can be forged. These are the difficulties that the user faces while dealing with the biometric system. 3) The passwords or the user IDs that are used by the user in traditional methods are very easy to make and are not at all difficult to change. On the other hand, changing the prints of the biometric is a very hectic process. Even though, the biometric system is very easy to handle, maintaining is very difficult and time taking. If user forgets the password or the ID, it is usually very easy to recover them, but this is not possible for the system involved in biometric authentication (Farooq et al., 2015). The ID, passwords can be changed remotely, but to change the scanning in biometric, there should be all the scanning hardware present as well as the user
5INFORMATION SECURITY will have to be physically present while changing the system.The time to scan is usually high when compared to other authentication system. Answer to Question 4: The biometric system provides false positive, as well false negative rate that are error types provided by the system of biometric used for authentication. False positive error generally occurs if the biometric system allows an unauthorized user to be an authorized one. This happen when the system depicts that data of an authenticated user similar to that of an unauthenticated one and allows the invalid user to access the data (Kubbo, Jayabalan & Rana, 2016). The false positive rate or the false acceptance rate is calculated by the total number of false positive identification divided by the total number of identification done. False negative is an error that are caused by the biometric system when the system cannot identify a valid user and rejects them as being invalid. The system cannot match the database of the system with the data of the authenticated user. The false negative or the false rejection rate is therefore calculated as the total number of false negative identification divided by the total number of identification (Mosenia & Jha, 2017). Example of false negative is that a company named Microsoft Security Essentials rated a false negative error of thinking that the Chrome Browser is a Zbot malware disabling its employees to download and install the chrome in their systems. From this example, it can be cleared that the false negative rate is basically higher than false positive rate. Answer to Question 5: There are many encryption processes that are involved for encryption process. Processes that are similar to that of the transportation process are Baconian algorithm, Caesar cipher
6INFORMATION SECURITY algorithm, columnar transportation, Affine process, and many more (Wolfe, Graham & Simon, 2018). The question given in this is to decrypt the encrypted cipher text to the original text. The algorithms that are used in this process are substitution method and the Caesar cipher method. The following shows the step of converting the encrypted text to decrypted one. Given TextNTJWKHXK Numeric value142010231182411 Key23423423 Decoded text121762184228 Shift by 333333333 Decoded text91431851195 Final textINCREASE Given TextAMK Numeric value11311 Key423 Decoded text23118 Shift by 3333
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7INFORMATION SECURITY Decoded text2085 Final textTHE Given TextWWUJJYZTX Numeric value232321101025262024 Key423423423 Decoded text1921186822221821 Shift by 3333333333 Decoded text1618153519191518 Final textPROCESSOR Given TextMWKXZKUHE Numeric value1323112426112185 Key423423423 Decoded text9218202481762 Shift by 3333333333 Decoded text61851721514325
8INFORMATION SECURITY Final textFREQUENCY The final text is INCREASE THE PROCESSOR FREQUENCY
9INFORMATION SECURITY References Alaskar, M., Vodanovich, S., & Shen, K. N. (2015, January). Evolvement of Information Security Research on Employees' Behavior: A Systematic Review and Future Direction. InSystem Sciences (HICSS), 2015 48th Hawaii International Conference on(pp. 4241- 4250). IEEE. Bhagavatula, C., Ur, B., Iacovino, K., Kywe, S. M., Cranor, L. F., & Savvides, M. (2015). Biometric authentication on iphone and android: Usability, perceptions, and influences on adoption.Proc. USEC, 1-2. Brakerski, Z., & Vaikuntanathan, V. (2014). Efficient fully homomorphic encryption from (standard) LWE.SIAM Journal on Computing,43(2), 831-871. Chen, S., Pande, A., & Mohapatra, P. (2014, June). Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones. InProceedings of the 12th annual international conference on Mobile systems, applications, and services(pp. 109- 122). ACM. De Luca, A., Hang, A., Von Zezschwitz, E., & Hussmann, H. (2015, April). I feel like I'm taking selfiesallday!:towardsunderstandingbiometricauthenticationonsmartphones. InProceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems(pp. 1411-1414). ACM. Farooq, M. U., Waseem, M., Khairi, A., & Mazhar, S. (2015). A critical analysis on the security concernsofinternetofthings(IoT).InternationalJournalofComputer Applications,111(7).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10INFORMATION SECURITY Ghosh, S., Majumder, A., Goswami, J., Kumar, A., Mohanty, S. P., & Bhattacharyya, B. K. (2017). Swing-Pay: One Card Meets All User Payment and Identity Needs: A Digital Card Module using NFC and Biometric Authentication for Peer-to-Peer Payment.IEEE Consumer Electronics Magazine,6(1), 82-93. He, D., & Wang, D. (2015). Robust biometrics-based authentication scheme for multiserver environment.IEEE Systems Journal,9(3), 816-823. Kim, H., Park, J., Lee, J., & Ryou, J. (2015). Biometric authentication technology trends in smart device environment. InMobile and Wireless Technology 2015(pp. 199-206). Springer, Berlin, Heidelberg. Kubbo, M., Jayabalan, M., & Rana, M. E. (2016, September). Privacy and Security Challenges in Cloud Based Electronic Health Record: Towards Access Control Model. InThe Third International Conference on Digital Security and Forensics (DigitalSec2016)(p. 113). Layton,T.P.(2016).InformationSecurity:Design,implementation,measurement,and compliance. CRC Press. Layton,T.P.(2016).InformationSecurity:Design,implementation,measurement,and compliance. CRC Press. Memon, N. (2017). How Biometric Authentication Poses New Challenges to Our Security and Privacy [In the Spotlight].IEEE Signal Processing Magazine,34(4), 196-194. Mosenia, A., & Jha, N. K. (2017). A comprehensive study of security of internet-of-things.IEEE Transactions on Emerging Topics in Computing,5(4), 586-602.
11INFORMATION SECURITY Wolfe, C., Graham, S., & Simon, P. (2018). Securing Data in Transit Using Tunable two ChannelCommunication.InInternationalConferenceonCyberWarfareand Security(pp. 627-XVI). Academic Conferences International Limited.