logo

IT Security

   

Added on  2023-01-19

5 Pages1162 Words73 Views
 | 
 | 
 | 
Running Head: IT MANAGEMENT 0
IT SECURITY
IT Security_1

IT MANAGEMENT 1
1) Below are presented various extensive range of example –
Confidentiality
With the help of ATM (Automated teller machine), the account can access use the
card and PIN (personal identification number).
This will help the user to believe that host system will keep the PIN confidential
and during the transaction including the channel of communication between the
server of bank and host system.
Degree of significance of confidentiality – It may be called a compromise to the
account when the PIN is unsecured during the transaction. Therefore, it needs to
ensure that PIN should be clearly encrypted.
Integrity
Generally, while doing transactions, a user expects that those records related to
transaction with no accidental or malicious change. Hence, the actions performed
via the ATM must be linked to the account connected with the card.
Degree of significance of integrity – Think that $400 is withdrawn by user and
now $5600 the balance left in the customer. Instead of updating $5600 in the
account of user, unintentionally if it updated as $5000, it will lead to unexpected
amount loss. Hence, the integrity of the transactions should be secured as the
transactions performed directly impact the customer account.
Availability
It is very important that ATM machine needs to be available to serve the customer
whenever there is a requirement and at any given time (Narman et al, 2014).
Degree of significance of availability – It raises the economic growth of a bank,
therefore the ATM should be serviceable and operational almost all the time i.e.
99.98%.
2) The reasons where individuals might not prefer biometric authentic may include
various objectives. Biometrics is the authentication which offers security on the basis of
common characteristics of human body (Khan & Zhang, 2008). Biometric may be the
security measure for the future but this is not the time for the user to disregard their password
(Li & Hwang, 2010). Biometric offers another level of security; however, it is not foolproof.
The three reasons which cause as barriers in using biometric authentication includes –
IT Security_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents