logo

Information Technology - Assignment Solution

   

Added on  2021-04-24

5 Pages1474 Words167 Views
Running head: INFORMATION TECHNOLOGYINFORMATION TECHNOLOGYName of Student-Name of University-Author’s Note-
Information Technology - Assignment Solution_1
1INFORMATION TECHNOLOGYQuestion 1:Confidentiality:Confidentiality involves keeping the information secure and protected from some unauthorized person.The information involved in ATM cards has some important values and are to be kept confidential.The users of ATM must keep the credentials of their cards secret so that the information on the card and the security of theirbank details are kept safe (Tchernykh et al., 2016).The confidentiality of data can be done by applying encryption method on the information that is to be kept secured.The process of encryption ensures the right person to read the right information. Confidentiality ensures proper encryption and is used in every part of the security where the data is to be kept secured.The credentials of the ATM are to be kept secured so that any third person cannot get the details of the ATM pin.Integrity:From the term integrity, it can be ensured that the information of the ATM card is to be protected from being changed oraltered by some unauthorized parties. The information or the data that is in the ATM has values if the information stored in the system is correct. The information transmitting from one network to another should not be tampered (Sumra, Hasbullah & AbManan, 2015). With the encryption process, the data integrity is also kept secured. The methods that helps to keep the integrity of the data includes the hashing function.Availability:The data that are available includes that the information that is involved in the ATM transaction process should be availableonly with the authorized parties and the authenticate users can only access the data.If the right person accesses the information at right time, then only the information is considered to be valid.The availability of the data can also be hampered includes natural disasters and power outages. To ensure availability of data, the information is to be kept as a backup to keep secure from any type of security breach thatmay occur. Question 2:Several ways are there by which the thief can identify the pin of the ATM from the remaining pin that are good. The maximumnumber of possibility that the thief can attempt to get the pin is 5! / (5 - 4)! that is 120 set of pins. The thief can enter all total of 120times the secret pin.But keeping the security of the ATM, the system of ATM does not allow a user to enter the pin several times. The number oftime the pins that can be entered by a user is maximum of three times. After entering the wrong pin three times, the card will beblocked and the thief will not be able to withdraw money from the ATM machine.Question 3:Three advantages of biometric authentication because of which the users use them for security purpose are:
Information Technology - Assignment Solution_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information System for Automated Teller Machines Name of Student-Name of University- Author's Note
|5
|1413
|122

Information Security: CIA Triad, ATM Security, Biometric Authentication, Cipher Text Decryption
|9
|1589
|359

Factors for Protection of ATM Security, Biometric Authentication and Cryptography
|7
|1209
|292

Information Security Systems in ATM
|9
|1901
|332

ATM Information Security
|10
|2235
|261

Information Security
|6
|1196
|79