This document discusses the examples of confidentiality, integrity, and availability of ATM machines. It also explores the key aspects of utilizing biometric authentication and the presence of false negatives in biometric systems. Additionally, it provides a step-by-step process to decode a given cipher text using a substitution technique.