Information System for Automated Teller Machines Name of Student-Name of University- Author's Note

   

Added on  2021-04-21

5 Pages1413 Words122 Views
Running head: INFORMATION SYSTEMInformation System for Automated Teller MachinesName of Student-Name of University-Author’s Note-
Information System for Automated Teller Machines Name of Student-Name of University- Author's Note_1
1INFORMATION SYSTEMQuestion 1:Confidentiality-Confidentiality in ATM cards means keeping the credentials of the cards private and protects them from data breach.The sensitive information that is the security pin, card number, the CVV number are to be kept private.Confidentiality ensures that right person should have access to the right information and protects them to reach to wrongpeople (Chen, Pande & Mohapatra, 2014). To keep the data confidential, the experts of information security system makes the system more secured.Integrity-The main purpose of integrity is to maintain the trustworthiness, consistency, and accuracy of the data throughout the life cycleof the system.The data that is available in the ATM card should not be changed or altered by some unauthorized people in case of databreach.Data integrity ensures user access control and file permission access to the users.Security should be established in case there is some alteration of data that are generally caused by human interruption.Availability-The availability of data ensures that the data should be available with the ATM user for the transaction to occur successful.Availability ensures that proper functioning of the system should be there with all the software on update.There should be proper safeguards to protect the available data that user has access (Luca et al., 2015).There should no denial-of-service attack for the available data.Question 2:According to the question, the thief broke five keys of the ATM machine and also jammed the card reader of the machine.When the customer came to withdraw money, his transaction was successful, but he was not able to take out the card, as the readerwas jammed. The customer went to seek help outside to take the card, at the mean while the thief thought of taking out some moneyfrom the ATM. As he has broken five keys, he was only left with five keys. With those five keys, he has a total possibility of 5! /(5-4)! = 120 ways by which the thief can get the pin of the ATM.But, the thief cannot enter 120 time the pin in the ATM because of the security purpose. The ATM machine security gives amaximum limit of three times to enter the pin of the ATM (Kim et al., 2015). After three times wrong pin, the card will beautomatically blocked and the customer will get to know about that.Question 3:There are many reasons for which the users depends on biometric authentication for their security of personal and officialcredentials. The advantages of biometric authentication are listed below:Biometric authentication provides convenience to the users. The level of convenience is generally increased with the biometricauthentication. With all the practices that are involved in biometric authentication, there is no need to secure them with
Information System for Automated Teller Machines Name of Student-Name of University- Author's Note_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Technology - Assignment Solution
|5
|1474
|167

Factors for Protection of ATM Security, Biometric Authentication and Cryptography
|7
|1209
|292

Information Security: Confidentiality, Integrity, and Availability
|6
|2253
|395

Information Security: ATMs, Biometric Authentication, Encryption Methodology
|10
|1408
|56

Information Security
|5
|1368
|40

Computing IT Security - Confidentiality, Integrity, Availability, Biometric Authentication, False Positive and False Negative
|7
|1683
|77