logo

Information Security Answer 2022

   

Added on  2022-09-15

10 Pages2475 Words18 Views
Informatio
n Security

INFORMATION SECURITY 1
Answer 1
The term ATM is defined as an automatic teller machine which is able
to provide telecommunication systems to the consumers and enables users
to perform financial transactions including transfer funds. It is mainly
involved in the banking industry where it uses PIN code for accessing the
personal accounts of the consumers. There are major three elements
involves in the ATM system for example confidentiality, availability and
integrity which are described below:
Confidentiality
It is observed that for accessing the ATM card, the users require four-
digit PIN codes which are provided to the authorized users. Mainly, these
types of PIN numbers are given to the consumers for enhancing the privacy
of sensitive data and accounts (Marotta, Carrozza, Battaglia, Montefusco, &
Manetti, 2013). In this generation numbers of banks are providing the
banking-related services to the consumers along with the ATM cards but it
is very important for users to private their ATM pins and card details.
A recent study examined that the entire ATM process needs advanced
privacy systems for reducing the problems of hacking and security threats.
Therefore, it is stated that encryption between the PIN codes and bank
details ensure the confidentiality of the data and also manage the privacy of
data effectively. Confidentiality in ATM is very important which can be done
with the help of IT systems and encryption technique and changing PIN
numbers on regular basis is the best process for reducing the security
attacks and hacking related issues.
Integrity
It is stated that the utilization of information and communication
technology along with the ATM optimization techniques are very significant

INFORMATION SECURITY 2
in order to ensure the integrity of data. In the case of ATM machines,
integrity is a major factor that can be used for improving the security of
data along with the bank details (Pant, Prakash, & Asthana, 2015).
Moreover, the involvement of authentic networks in the ATM machines can
integrate the communication process appropriately and provide a way
where the users can access their accounts using ATM cards. Therefore, it is
reported that privacy must be incorporated in order to control and handle
problems of the consumers which are relevant to the bank details and ATM
cards.
Availability
The utilizations of ATM cards are growing rapidly where the
consumers can easily access their bank details and withdraw cash from any
location. It is observed that the availability of ATM cards and systems
depends on the demands of consumers and help the users for reducing
complexity and difficulties from the banking systems (Wilson, 2012).
Moreover, the unavailability of ATM machines may produce problems in the
consumers and leads dissatisfaction related issues in the workplace.
Therefore, it is stated that the availability of ATM machines may interact
with many consumers and provide better services to customers.
Answer 2
After reviewing the given information it is observed that there are 10
numeric digitals available in the ATM machine starting from 0 to 9.
Moreover, the thief took out from only 5 numeric digits for which only 5
keys are used by the consumers in order to access the bank details.
Therefore, permutation formula can be used in order to determine the
maximum numbers of PIN keys which the thief may enter before the correct
PIN. The permutation formula involves two factors such as n and r and in
the given question n= 5 and r= 4 which are highlighted below:
P (n, r) = 5P4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Fundamentals: Confidentiality, Integrity, Availability
|9
|2105
|1

Security Fundamental
|6
|1721
|52

Information Security Question Answer 2022
|14
|4556
|34

Role of Confidentiality, Integrity, and Availability in ATM system
|8
|1687
|2617

Information Security: ATM Requirements, Biometric Authentication, Encryption Methods
|10
|1864
|148

Information Security: ATM, Biometric Authentication, and Transposition Cipher
|14
|2706
|261