Sample Paper on Information Security

   

Added on  2021-04-17

5 Pages1759 Words126 Views
Running head: INFORMATION SECURITYInformation SecurityName of Student-Name of University-Author’s Note-
Sample Paper on Information Security_1
1INFORMATION SECURITYAnswer to Question 1Confidentiality:From the term confidentiality it can be stated that it gives protection to information of the ATM card from unauthorized users. For a successful transaction to occur, the ATM card is to be present with the user and the user has to know the ATM pin for atransaction to occur (Barbosa & Silva, 2015). The confidentiality feature is to be followed by the system that handles the ATM card by providing an good encryptingalgorithm to the pin of the card at transaction time.If confidentiality is not done properly with the ATM pin, then generally two types of breaches may take place (Chen, Pande &Mohapatra, 2014). Generally the first type of confidentiality data breach takes place when an outsider looks over the ATM pinand the details of the card when transaction is taking place. The second data breach takes place when the data of the user arestolen, from a company or an organization. The privacy of the people is to be maintained in the confidentiality of the ATM card. Example of Integrity:If the data that is related with the ATM is changed or altered, then the ATM is subjected to integrity. Without the access of theuser, the integrity is hampered. If the owner of the ATM purposely changes the content of some files and deletes some files deliberately, integrity regardingthe data occurs (Thomas, Vinod & Robinson, 2017). This can happen accidentally also. The errors that can come from the integrity are to be solved by the experts who have the responsibility to secure theinformation. Example of Availability:Availability means the data must be available with the user anytime and anywhere the user wants and the data should bepresent so that the transaction becomes successful. The systems needed for processing, storing the information are also to be kept secured and protected by the experts. The denial-of-attacks is a common attack, which is to be prevented for providing security to the ATM system. Answer to Question 2As per the given case in the question, in an ATM a thief broke in and by the help of a screwdriver, he jammed the card readerof the ATM. The thief also broke five keys from the keypad of the machine. While he was processing with the work, a customer camein for transaction (Luca et al., 2015). After his successful transaction with the five left good keys, he was not able to take out his card,as the thief jammed the card reader. When the customer went out to seek help, the thief thought of trying with the left pins so that hecan take out some money from the ATM. He was left only with five keys. With those five keys, he has many probabilities. Themaximum number of tries that the thief can do with five pins is:5!/(5-4)!= 5!/1!= 120 times.
Sample Paper on Information Security_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security: Confidentiality, Integrity, and Availability
|6
|2253
|395

Information System for Automated Teller Machines Name of Student-Name of University- Author's Note
|5
|1413
|122

ATM Information Security
|10
|2235
|261

Computing IT Security - Confidentiality, Integrity, Availability, Biometric Authentication, False Positive and False Negative
|7
|1683
|77

Information Security: ATMs, Biometric Authentication, Encryption Methodology
|10
|1408
|56

Information Security
|7
|1632
|87