logo

Information Security Questions 2022

   

Added on  2022-09-17

5 Pages2158 Words34 Views
INFORMATION SECURITY
1
Information Security
Student's Name
Institutional Affiliation
Information Security Questions 2022_1
INFORMATION SECURITY
2
Q1. Automated Teller Machine (ATM) is referred to as an electrical banking outlet that
makes it easier for the customers to carry out transactions using a debit or credit card without
getting assistance or direct interaction with the teller or bank staff (Kobres & Mouden, 2018).
Several confidentiality requirements examples are connected to Automated Teller Machine. One
of the examples is that the Personal Identification Card commonly known as PIN has to be
encrypted whenever stored. This is usually made possible when the hash property is used in
saving these PINs in the database of a particular financial company. By so doing, the PIN is
hidden and can only be seen as an unreadable text and can only be made readable by decrypting
using the correct code. Another example of confidentiality requirements is that there must be an
encryption of the channel of communication that links the Automated teller Machine and the
financial institution. This is mainly to ensure that the customers’ communication history is
safeguarded from both internal and external access.
Integrity is another requirement that is related to the Automated Teller Machine. An
example of integrity requirement is that the accomplishment of any activity via the Automated
Teller Machine must be connected to the financial bank account which is in turn linked up with
the customers’ debit cards or credit cards. Through this, ethical values of truthfulness and
honesty are adhered to by parties involved.
Availability is yet another requirement associated with the Automated Teller Machine.
With availability, almost a hundred percent availability of time of the Automated Teller Machine
system must be provided. This is for the bank customers to be able to access their accounts at
any given time without any restrictions in terms of time. The other example of availability
requirement is that the ATM must be able to serve a particular number of bank users
simultaneously at any particular time (Casares, & Murrone, 2016).
Q2. The maximum number of 4-digit PINs that the thief may have to enter is easily
computed by use of the permutation method (Li, Wang, & Chen, 2017). From ten distinct
numbers, those are, numbers zero to nine 4-digit permutation (PINs) can be made.
Number: 4-digit PIN
Ten distinct numbers used to create the PIN: 0,1,2,3,4,5,6,7,8 and 9
=> 10.10.10.10= 10^4
= 10,000 PINs
Below is a step by step formula of achieving this permutation.
For the first digit the number of choices I have is 10. After choosing the first digit, the
second digit will have 10 choices this will be 10*10=100. For every two digits choice, there are
10 choices for the third digit. This gives us 10*10*10=1000. Eventually, for the fourth and last
digit, we have 10 choices which give us 10*10*10*10*10=10000. Therefore, the maximum
number of PINs the thief will have to enter into the Automated Teller Machine before
discovering the correct PIN of the customer is ten thousand (10,000).
Q3. Biometric authentication is one that depends on the uncommon physical features or
unique characteristics of a person to make a verification that they are who they claim to be.
Information Security Questions 2022_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Fundamental
|6
|1721
|52

ATM & Cyber-Security
|10
|3344
|141

Information Security for ATM, Biometric Sensors and Cipher
|10
|2100
|403

Information Security: Examples of Confidentiality, Integrity and Availability Requirements Associated with ATM Machines
|6
|1854
|399

Information Security: ATM Requirements, Biometric Authentication, Encryption Methods
|10
|1864
|148

Info Security
|8
|1776
|71