Network Security Fundamentals Assignment
Added on 2021-02-19
7 Pages1366 Words45 Views
SECURITYFUNDAMENTALS
ABSTRACTThis report will lay emphasis on five research questions such as: Importance of availability,confidentiality and integrity requirements associated with ATM Machine. Calculation ofmaximum number of PIN that can be entered to discover correct PIN. Reasons due to whichpeople may be reluctant for using biometrics authentication and ways to counter suchobligations. Two circumstances in which false negatives are mostly considered more serious ascompared to false positives. Steps to decipher a text.
TABLE OF CONTENTSABSTRACT.....................................................................................................................................2TABLE OF CONTENTS.................................................................................................................3Question 1........................................................................................................................................1Importance of availability, confidentiality and integrity requirements associated with ATMMachine........................................................................................................................................1Question 2........................................................................................................................................1Calculation of maximum number of PIN that can be entered to discover correct PIN...............1Question 3........................................................................................................................................1Reasons due to which people may be reluctant for using biometrics authentication and ways tocounter such obligations..............................................................................................................1Question 4........................................................................................................................................2Two circumstances in which false negatives are mostly considered more serious as comparedto false positives...........................................................................................................................2Question 5........................................................................................................................................3Steps to decipher a text................................................................................................................3REFERENCES................................................................................................................................4
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Information Securitylg...
|5
|1368
|40
Information Securitylg...
|7
|1632
|87
Information Securitylg...
|5
|1290
|53
Information Technology - Assignment Solutionlg...
|5
|1474
|167
Information Security Assignment 2022lg...
|6
|1257
|31
Information Securitylg...
|6
|1196
|79