Information Security Report: ATM Security and Encryption Methods

Verified

Added on  2023/01/18

|5
|1368
|40
Report
AI Summary
This report delves into various facets of information security. It begins by explaining the CIA triad (confidentiality, integrity, and availability) and its significance in data and information security, using ATM security as a practical example. The report then explores the permutation technique to calculate the number of attempts a thief has to guess an ATM PIN. Furthermore, it discusses the benefits and issues of biometric authentication systems, highlighting security concerns, such as potential attacks and false acceptance rates, along with countermeasures like multi-factor authentication. Finally, the report covers transposition and substitution encryption methods, illustrating the encryption and decryption process using a specific example and comparing transposition with substitution methods. The report concludes with a bibliography of relevant sources.
Document Page
Running head: INFORMATION SECURITY
Information Security
Name of the Student
Name of the University
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
INFORMATION SECURITY
1. CIA triad has been considered as a guide that has been including the concept of integrity,
confidentiality and availability has been used for taking proper measurement in context to data and
information security. The ATM has been using daily technology in which security has been playing an
important role. The pin number of the ATM card can be considered to be an important security aspect as
helping in restricting access to unauthorized users.
2. The maximum number of times the thief can enter pin before knowing the password of the ATM has
been calculated using permutation technique. It has been the total number of keypad within an ATM
machine ranging from 0 to 10. Therefore, for this situation, the thief has broken five keys and rets of the
five keys are available for providing input input the ATM machine. The ATM pin consist of four digits.
Therefore, after breaking five keys, the thief has option of any rest five keys to be entered out of which a
combination of four digit will be the correct pin. So, the permutation of the scenario has been given
below:
5P4 = 5! / (5-4)! = 5! /1! = 5*4*3*2*1/ 1 =120/1 =120.
This shows that that there has been total of 120 possible outcome. However, for security point of view,
only three times pin can be entered into the ATM machine. After three unsuccessful attempts, the ATM
card will be blocked. Therefore, it can be analyzed that the thief has only three attempts out of 120
possible outcomes to unlock the ATM card and after that ATM card will be automatically blocked.
3. There have been various benefits of biometric authentication system along with issues in the
technology. There have been various reasons due to which users might reluctant for using biometrics.
Some of these are mentioned below:
Security: This has been one of the critical reason due to which people have been using the biometric
systems. There have been successful attacks done on the biometrics. Users used to store various data and
Document Page
3
INFORMATION SECURITY
information over the biometric systems. This data include phone number, address and other personal
details. Data and information stored in the systems can be hacked by using various malwares and viruses.
Therefore, security has been main issue in biometrics.
False acceptance: There have been several technical errors occurring in the biometric systems. This error
might create a false entry into the biometric system. However, these failure rates have been high in the
market. The technical issues have been causing data loss from the systems.
Counter measures for these issues are as follows:
Multifactor authentication: There is a need of multifactor authentication elements installed in the system.
These factors include iris recognition, fingerprint recognition and other types of passwords.
Gradient biometric mean: It has been necessary to include at least three concepts of context in biometric
systems that helps in increasing mean value of security level.
4. A false negative occurs in a situation that the user of biometric have no access to location of biometric.
It has been found that the identity of first person has not been lout in many cases. False negative has been
decoding in a situation in which owners are not allowed for accessing information. If the biometric
system does not recognize the individual then it loses a large amount of money and reputation of
organization.
Document Page
4
INFORMATION SECURITY
5. Transposition has been an encryption method in which the positions units of plaintext have been
shifted according to a regular system. Therefore, cipher text constitute a permutation of the plaintext.
However, in substitution method, it replaces characters and therefore, it is simpler and easy to break.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
1 2 3 4 5 6 7 8 9 10 1
1
12 13 14 15 1
6
17 18 19 20 2
1
22 23 24 25 26
Encryp
ted
Text L C D O M X I Z Y X V H P X M J Q S H A A N W F I H A B R T
Corres
pondin
g
numeri
c value
1
2 3 4
1
5
1
3
2
4 9
2
6
2
5
2
4
2
2 8
1
6
2
4
1
3
1
0
1
7
1
9 8 1 1
1
4
2
3 6 9 8 1 2
1
8
2
0
Paddin
g layer 7
1
5
1
2 6 8 9 4 2 1
1
3
1
2 5 3 1 8
1
5 6 4 8
1
2 8
1
0 9
1
4 6
1
1
1
3 2 4 6
Decode
after
paddin
g 5
-
1
2 0
-
8 9 5
1
5 5
2
4
2
4
1
1
1
0 3
1
3
2
3 5
-
5
1
1
1
5 0
-
1
1
-
7 4
1
4
-
8 3
-
3
-
1
2 0
1
4
1
4
Transp
osition
Key 5 6 7 5 6 7 5 6 7 5 6 7 5 6 7 5 6 7 5 6 7 5 6 7 5 6 7 5 6 7
Decode
d from
the
substit
ution
cipher 0
-
1
8 0
-
1
5 4
-
1 8 0
1
8
1
7 6 4
-
4 8
1
7
-
2
-
1
0 5 8
-
5
-
1
7
-
1
4
-
1 8
-
1
5
-
2
-
9
-
1
9
-
5 8 7
Caesar
cipher
shift 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
Decode
d from
the
Caesar
cipher
2
3 5 0 8 1
2
2 5
2
3
1
5
1
4 3 1
1
9 5
1
4
2
1
1
3 2 5
1
8 6 9
2
2 5 8
2
1
1
4 4
1
8 5 4
Decode
d Text W E H A V E W O N C A S E N U M B E R F I V E H U N D R E D
Therefore, the plain text is “We have won case number five hundred”.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5
INFORMATION SECURITY
Bibliography
Chen, L., Chen, L., Jordan, S., Liu, Y. K., Moody, D., Peralta, R., ... & Smith-Tone, D. (2016). Report on
post-quantum cryptography. US Department of Commerce, National Institute of Standards and
Technology.
Dantcheva, A., Elia, P., & Ross, A. (2016). What else does your biometric data reveal? A survey on soft
biometrics. IEEE Transactions on Information Forensics and Security, 11(3), 441-467.
Jain, A. K., Nandakumar, K., & Ross, A. (2016). 50 years of biometric research: Accomplishments,
challenges, and opportunities. Pattern Recognition Letters, 79, 80-105.
Muralidharan, K., Niehaus, P., & Sukhtankar, S. (2016). Building state capacity: Evidence from
biometric smartcards in India. American Economic Review, 106(10), 2895-2929.
Peikert, C. (2016). A decade of lattice cryptography. Foundations and Trends® in Theoretical Computer
Science, 10(4), 283-424.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]