logo

ITC542 - Assessment Item 2: Security Fundamentals

   

Added on  2024-05-21

11 Pages1782 Words367 Views
 | 
 | 
 | 
ITC542 - Assessment item 2
Security Fundamentals
Student Name: Muzakir Mohammed
Student ID: 11597897
Student E-mail Address: mmoham77@postoffice.csu.edu.au
1
ITC542 - Assessment Item 2: Security Fundamentals_1

Table of Contents
Introduction.............................................................................................................................. 3
Question1................................................................................................................................. 4
Question2................................................................................................................................. 5
Question3................................................................................................................................. 6
Question4................................................................................................................................. 7
Question5................................................................................................................................. 8
Conclusion............................................................................................................................. 10
References.............................................................................................................................. 11
2
ITC542 - Assessment Item 2: Security Fundamentals_2

Introduction
This is an assessment based on fundamental security. The aim of this assessment is to
develop and gauge understandings of learner about the security of different machines. In
order to complete this assessment, I have to describe the degree of importance for
requirements like confidentiality, integrity and availability. I also have to perform calculation
work to define number attempt to identify correct pin. There is a requirement to identify
reasons why people reluctant to use biometrics. I also have to reveal circumstance where
false negatives are more significant than false positive.
3
ITC542 - Assessment Item 2: Security Fundamentals_3

Question1
Examples are as follows:
Confidentiality
To use ATM service, a customer has to use the card and their personal identification
number called pin to access their account using ATM
So the customer should have to keep their PIN confidential
The customer has to keep their PIN confidential during transaction operation done on
bank server.
Degree of Importance of Confidentiality
Using of unsecured pin during the transaction by ATM or bank server may lead
disclose account
So, confidentiality of PIN should be maintained properly and should be encrypted
properly.
Integrity
The customer expected that the transaction record is done without any malicious
activities or accidents
Degree of Importance of Integrity
On specific time, when a customer withdraws the amount of 500 USD and the rest
balance is 6690. Instead of updating 6690 it updated as 6200 USD, cause unexpected
loss of amount.
Transaction performed directly affect account of the customer so transactional
integrity should be maintained and secured.
Availability
The Automated Tailored Machine should be available 24*7 to serve customers.
Degree of Importance of availability
The availability of ATM services eventually boosts the economic growth of the bank.
So the ATM machine should have 99.99% availability
Maximum availability increase customers loyalty
(Chia, 2018)
4
ITC542 - Assessment Item 2: Security Fundamentals_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security: Confidentiality, Integrity, Availability, Bio-metrics, Cipher Text
|6
|1672
|339

Information Security
|7
|1632
|87

Information Security: Confidentiality, Integrity, Availability, Biometric Authentication, and Cipher
|6
|1396
|129

Information Security: ATM Requirements, Biometric Authentication, Encryption Methods
|10
|1864
|148

Information Security: Examples of Confidentiality, Integrity and Availability Requirements Associated with ATM Machines
|6
|1854
|399

Info Security
|8
|1776
|71