logo

Information Security: Confidentiality, Integrity, Availability, Biometric Authentication, and Cipher

6 Pages1396 Words129 Views
   

Added on  2023-06-14

About This Document

This article discusses the importance of confidentiality, integrity, and availability in information security, factors that might be reluctant to use biometric for authentication, false negatives, and cipher.

Information Security: Confidentiality, Integrity, Availability, Biometric Authentication, and Cipher

   Added on 2023-06-14

ShareRelated Documents
Running head: INFORMATION SECURITY 1
Information Security
Name:
Institution Affiliation:
Information Security: Confidentiality, Integrity, Availability, Biometric Authentication, and Cipher_1
INFORMATION SECURITY 2
Question 1
Confidentiality
When a client uses card and a PIN – (personal identification number) to gain access to their
account using ATM, they expect the PIN to be confidential to the host system of the transactions
and communication channel between web host system and bank website server (Bulgurcu,
Cavusoglu & Benbasat, 2010).
Level of importance to confidentiality
In situation where a PIN is unsecure when carrying out a transaction, it could lead to
compromise of the account. Therefore, it needs to be encrypted well.
Integrity
The client expects t transaction data to remain the same without any detrimental or accidental
changes.
Degree of important on integrity
An example to illustrate this concept: Think about a client who withdraws $ 600 and the
balance expected on the account should be 5500 USD. Instead of the system showing a balance
5500 dollars to the account, it accidently updates 5200 USD. To the part of the client this is a
loss since more money has been deducted. It is important to note that as much as the transaction
impact on the customer account directly, the integrity of transactions should be protected.
Availability
ATM machine should be accessible to serve the customers’ needs the times.
Information Security: Confidentiality, Integrity, Availability, Biometric Authentication, and Cipher_2
INFORMATION SECURITY 3
Degree of importance of availability
It improves the financial progress of financial institution, thus, ATM should be functional and
efficient always (Hannan & Asif, 2017).
Question 2
Since the thief broke 5 different keys and Alice was able to enter her PIN, he should use the
remaining 5 keys. Hence, the total number of the possible keys is calculated as follows;
4- The pin is 4 digits
5- The remaining number of keys since the rest were broken
54 = 625
625 is the number of keys the thief may have to try in the worst case to gain an access to Alice
account.
Question 3
There are various factors which might be reluctant to use biometric for authentication they are as
follows;
Cost factor: The cost of biometric is very high compared to the authentication techniques
(Hannan & Asif, 2017). The biometric systems are costly when compared with the other security
measures for authentication, for example passwords and the personal identification numbers
(Whitman & Mattord, 2011). So whilst the biometrics could offer an extra security, the costs
currently has outweighed advantages in many of the cases.
Information Security: Confidentiality, Integrity, Availability, Biometric Authentication, and Cipher_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security Assignment 2022
|6
|1257
|31

Factors for Protection of ATM Security, Biometric Authentication and Cryptography
|7
|1209
|292

Information Security - Desklib
|6
|1617
|403

Security Fundamentals Assessment
|5
|1034
|81

Information System for Automated Teller Machines Name of Student-Name of University- Author's Note
|5
|1413
|122

Computing IT Security - Confidentiality, Integrity, Availability, Biometric Authentication, False Positive and False Negative
|7
|1683
|77