logo

Information Security: CIA Triad, Biometrics, and Deciphering Techniques

   

Added on  2024-05-21

7 Pages1541 Words307 Views
 | 
 | 
 | 
ITC 595- Information Security
1
Information Security: CIA Triad, Biometrics, and Deciphering Techniques_1

Table of Contents
Question 1........................................................................................................................................3
Question 2........................................................................................................................................3
Question 3........................................................................................................................................4
Question 4........................................................................................................................................4
Question 5........................................................................................................................................5
References........................................................................................................................................7
2
Information Security: CIA Triad, Biometrics, and Deciphering Techniques_2

Question 1
The CIA triad which stands for Confidentiality, Integrity and Availability acts as a guide for the
solutions of Information security. Information technologies are widely used everywhere which
means that all the companies are subjected to the issue of information security. It helps to protect
networks, technological assets and information systems.
Confidentiality: The CIA triad objective of confidentiality is the protection of facts and data
from unlicensed people. It takes measures for ensuring that only authorized people to get
information access (Henderson, 2017).
This is been implemented with security mechanisms like access control list, passwords,
usernames and encryption. It is common for the data to be categorized in accordance with the
degree of damage which could be fallen into unintended hands.
Integrity: The CIA triad objective of integrity is securing data from any activity of deletion or
modification by any unauthorized party. This information must not be made to inappropriately
modify as even a small change may lead to significant confidentiality breaches and service
interruptions (Perrin, 2008).
To ensure data integrity it is important to have the redundant system and backup procedure in
place. Also, security mechanisms like hashing and data encryption could be implemented.
Availability: Information availability means that licensed parties are capable of accessing
information when required. The users want to access information when they require and it must
be accessible anytime and anywhere. This failure comes because of DDoS attacks and this kind
of downtime can turn to be very costly.
For this, dedicated hardware devices can prove to be most effective. Processes like a RAID,
high-availability clusters, failover and redundancy (Chia, 2012).
The degree of Importance: The degree of prominence of this functionality is moderate and
tends to improvise bank ratings and boost the accessibility of ATM in an operational condition.
Question 2
The digits which are present on the keyboard are 0,1,2,3,4,5,6,7,8,9 whose total comes out to be
10 digits. For the PIN of ATM, the digits can be repetitive. It is also been told that robber
destroys 5 digits of the keyboard.
Instance 1: When button 0 is not broken
If button 0 was not broken by the robber then from the total options available only 1 option will
be reduced when all the digit of the PIN are 0.
The places here can also be repeated therefore total combination available for the Number of the
PIN is: 54-1 = 624
Instance 2: When button 0 is broken
3
Information Security: CIA Triad, Biometrics, and Deciphering Techniques_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assessment 2 - Information Security - ITC595
|8
|2053
|297

Information Security Fundamentals: Assessment 2
|9
|1655
|218

Importance of CIA Triad in ATM Security
|10
|2403
|74

Information Security Question Answer 2022
|14
|4556
|34

The CIA Triad Model
|8
|1622
|352

ATM & Cyber-Security
|10
|3344
|141