Information Security

   

Added on  2023-01-19

7 Pages1632 Words87 Views
Running Head: INFORMATION SECURITY
0
IT Write Up
Information Security
(Student details :)
4/14/2019
Information Security_1
Information Security
1
Contents
Information Security..................................................................................................................2
Answer 1....................................................................................................................................2
Answer 2....................................................................................................................................2
Answer 3....................................................................................................................................3
Answer 4....................................................................................................................................4
Answer 5....................................................................................................................................4
References..................................................................................................................................5
Information Security_2
Information Security
2
Information Security
Answer 1
Within ATMs systems, admin needs to keep personal identification numbers (herein
after referred as PINs) confidential, within the host system and while executing transmissions
during a transaction. Moreover, system like ATMs must preserve the integrity of an account
records related to the individual ATM transactions. Additionally, the ATM PINs must be
encrypted due to the major confidentiality requirement. In addition, info integrity within
ATM systems requires protecting info from being altered from illegal parties (Tiwana &
Konsynski, 2010). Hence, integrity requirements significantly suggest that the ATM related
actions must be linked to the bank accounts directly associated with the ATM cards. Besides,
availability of information in ATM machines means to assure that each and every authorized
party is capable to retrieve the correct and suitable info whenever required (Vacca, 2012).
Thus, availability requirements of ATMs suggest that ATM system need to be able to serve a
minimum of X concurrent consumers at a specific time. Finally, information within ATM
systems carries value only when it is correct as well as usable (Peffers, Tuunanen,
Rothenberger, & Chatterjee, 2009).
Answer 2
According to the scenario, a thief broke an ATM machine through a screwdriver
while also jammed the card reader and broke five keys from ATM keypad. During attempting
stealing money from ATM, thief had to halt the process of break-in and as one ATM
customer reached for withdrawing money from the ATM and hence he hides himself.
Hence, calculation over the maximum attempt of ATM PINs that thief might need to
enter before correctly revealing the customer’s PIN for stealing the money is as follows:
Total number of keys in the keypad of ATM = 10 (0,1,2,3,4,5,6,7,8,9).
Now, it has provided that the thief already broke out 5 keys, hence left number of
keys in keypad of the ATM= 5.
Number of digits in an ATM PIN; p=4 (because 4 digits are there in an ATM PIN)
Information Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Info Security: IT Write Up
|8
|2208
|366

Info Security
|8
|1776
|71

Computing IT Security - Confidentiality, Integrity, Availability, Biometric Authentication, False Positive and False Negative
|7
|1683
|77

Sample Paper on Information Security
|5
|1759
|126

Information Security: ATM Requirements, Biometric Authentication, Encryption Methods
|10
|1864
|148

Role of Confidentiality, Integrity, and Availability in ATM system
|8
|1687
|2617