Assessment Item 1: Security Fundamentals of ATM and Biometric Report
VerifiedAdded on 2020/07/23
|6
|1164
|59
Report
AI Summary
This report delves into the critical aspects of security fundamentals, focusing on the protection of sensitive information in modern systems. It begins by addressing ATM security, emphasizing the importance of maintaining PIN confidentiality and implementing robust security features to safeguard customer data. The report then explores the advantages of biometric systems, such as cost-effectiveness, ease of use, and enhanced security through fingerprint scanners. It also addresses potential drawbacks, like false negatives. Furthermore, the report explains encryption and decryption processes, including algorithms and hashing methods, highlighting their role in securing data transmission over networks. The conclusion summarizes the key findings, reinforcing the significance of these security measures in protecting against unauthorized access and data breaches. The report references several academic sources to support its findings.

Assessment item 1 Security
fundamentals
fundamentals
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................1
Question 1...............................................................................................................................1
Question 2...............................................................................................................................1
Question 3...............................................................................................................................2
Question 4...............................................................................................................................2
Question 5...............................................................................................................................2
CONCLUSION:...............................................................................................................................3
REFERNECES:...............................................................................................................................4
INTRODUCTION...........................................................................................................................1
Question 1...............................................................................................................................1
Question 2...............................................................................................................................1
Question 3...............................................................................................................................2
Question 4...............................................................................................................................2
Question 5...............................................................................................................................2
CONCLUSION:...............................................................................................................................3
REFERNECES:...............................................................................................................................4

INTRODUCTION
Computer systems are installed with various security measures. These helps in providing
integrity, confidentiality of information and data. With this it becomes easy for customers to do
financial transactions Chari, (2015). In today's technological world, automated teller machines
are used by banks to make it easy for people to do banking transactions. This assessment will
show how ATM are secured and reasons for using biometric systems. Also, how encryption and
decryption of data is done in a network is described.
Question 1
The ATM must keep personal identification number confidential while doing transaction
and in database. This will protect the account details of customer and transactions. For this it is
important that ATM must consists of features that protect and secure data of customers. It should
have following features :-
Confidentiality – For this ATM must be designed by installing effective server and database.
They must be protected with high security measures so that it becomes difficult to get access of
data. Nepal, (2016)
Integrity- For integrity ATM should have some policies and procedures must be designed in
such a way that it provides quality service to people. Also, these policies should be same and
implemented in every ATM. If there is any change made then it must be applied in all ATM.
Availability – ATM must be designed with specific software so that it can be easily understood
by people while doing transactions.
Question 2
In order to correctly discover the ATM PIN of customer the thief have to must calculate
it. Then, thief have to enter it three times to find out the correct one. After three times the ATM
card will automatically get blocked Conklin and et..al (2015). Then thief will not be able to enter
any PIN and therefore cash can not be withdrawn. Also, a message will be sent to customer
mobile number regarding the blocking of card. This will make aware customer about his ATM
card.
1
Computer systems are installed with various security measures. These helps in providing
integrity, confidentiality of information and data. With this it becomes easy for customers to do
financial transactions Chari, (2015). In today's technological world, automated teller machines
are used by banks to make it easy for people to do banking transactions. This assessment will
show how ATM are secured and reasons for using biometric systems. Also, how encryption and
decryption of data is done in a network is described.
Question 1
The ATM must keep personal identification number confidential while doing transaction
and in database. This will protect the account details of customer and transactions. For this it is
important that ATM must consists of features that protect and secure data of customers. It should
have following features :-
Confidentiality – For this ATM must be designed by installing effective server and database.
They must be protected with high security measures so that it becomes difficult to get access of
data. Nepal, (2016)
Integrity- For integrity ATM should have some policies and procedures must be designed in
such a way that it provides quality service to people. Also, these policies should be same and
implemented in every ATM. If there is any change made then it must be applied in all ATM.
Availability – ATM must be designed with specific software so that it can be easily understood
by people while doing transactions.
Question 2
In order to correctly discover the ATM PIN of customer the thief have to must calculate
it. Then, thief have to enter it three times to find out the correct one. After three times the ATM
card will automatically get blocked Conklin and et..al (2015). Then thief will not be able to enter
any PIN and therefore cash can not be withdrawn. Also, a message will be sent to customer
mobile number regarding the blocking of card. This will make aware customer about his ATM
card.
1
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Question 3
There are three reasons of using the biometric machine system. It has provided ease to
business for maintaining attendance and protecting the data of employees.
Cost factor- Biometrics are very easy to install and manage. Also, the cost of resources that are
required in this is minimum. Thus, it saves the expenses of enterprise by implementing biometric
systems. There is no use of paperwork in this Pao, Lee, & Huang, (2015). It also adds to its
advantage.
Fingerprint scanners- These systems easily scan the fingerprint of each individual. Moreover,
very less storage space is required for biometric template. So there is no need to install large
database for biometric systems.
Security- It provides a unique identification number or identity of each individual. This is useful
when there are large number of employees working. Also, it provides a 100% accuracy in
attendance Graham, Olson & Howard, (2016). Therefore, it is impossible to forge any employee
identity.
Question 4
A false negative in biometric occurs when the system fails tom recognise the individual
identity. This is not a worry of concern as it will not lead to anything. But there are various
consequences of it that is as follows:-
When biometric are utilised for employees to enter into the premises. This can hinder the
assets of organisation as any employee can use it in wrong means. Cassidy, (2016).
At times the system may recognise fingerprints as a proof for employees who have broke
the laws. This may result in false or negative for charging individual in wring way.
Question 5
Encryption is a process through which information is transformed in such a way that it
becomes unreadable. The basic function of encryption is translate data from normal to cipher
text. With this it is ensured that data does not go to wrong people. Data is encrypted by using
different techniques. It helps in making the data secured and transfer it over the network. There
are three methods of decrypting the text Nepal, (2016). These are described below:-
2
There are three reasons of using the biometric machine system. It has provided ease to
business for maintaining attendance and protecting the data of employees.
Cost factor- Biometrics are very easy to install and manage. Also, the cost of resources that are
required in this is minimum. Thus, it saves the expenses of enterprise by implementing biometric
systems. There is no use of paperwork in this Pao, Lee, & Huang, (2015). It also adds to its
advantage.
Fingerprint scanners- These systems easily scan the fingerprint of each individual. Moreover,
very less storage space is required for biometric template. So there is no need to install large
database for biometric systems.
Security- It provides a unique identification number or identity of each individual. This is useful
when there are large number of employees working. Also, it provides a 100% accuracy in
attendance Graham, Olson & Howard, (2016). Therefore, it is impossible to forge any employee
identity.
Question 4
A false negative in biometric occurs when the system fails tom recognise the individual
identity. This is not a worry of concern as it will not lead to anything. But there are various
consequences of it that is as follows:-
When biometric are utilised for employees to enter into the premises. This can hinder the
assets of organisation as any employee can use it in wrong means. Cassidy, (2016).
At times the system may recognise fingerprints as a proof for employees who have broke
the laws. This may result in false or negative for charging individual in wring way.
Question 5
Encryption is a process through which information is transformed in such a way that it
becomes unreadable. The basic function of encryption is translate data from normal to cipher
text. With this it is ensured that data does not go to wrong people. Data is encrypted by using
different techniques. It helps in making the data secured and transfer it over the network. There
are three methods of decrypting the text Nepal, (2016). These are described below:-
2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Using algorithms- It is the most commonly used methods for decrypting the cipher text into
normal text. It uses both body content and signature. Also, it contains specific algorithm uniform
resource identifier (URI). These algorithms can be used for both encrypting and decrypting the
information or data.
Hashing- It is function in which message is converted from string to variables. It is usually a
fixed length value or key. It is also used in algorithms.
CONCLUSION:
From this assessment it is concluded that ATM must keep personal identification number
confidential while doing transaction and in database. There are three reasons of using the
biometric machine system such as cost factor, fingerprint scanners and security. A false negative
in biometric occurs when the system fails tom recognise the individual identity. Encryption is a
process through which information is transformed in such a way that it becomes unreadable.
There are many methods that can be used in decrypting cipher text into normal text.
3
normal text. It uses both body content and signature. Also, it contains specific algorithm uniform
resource identifier (URI). These algorithms can be used for both encrypting and decrypting the
information or data.
Hashing- It is function in which message is converted from string to variables. It is usually a
fixed length value or key. It is also used in algorithms.
CONCLUSION:
From this assessment it is concluded that ATM must keep personal identification number
confidential while doing transaction and in database. There are three reasons of using the
biometric machine system such as cost factor, fingerprint scanners and security. A false negative
in biometric occurs when the system fails tom recognise the individual identity. Encryption is a
process through which information is transformed in such a way that it becomes unreadable.
There are many methods that can be used in decrypting cipher text into normal text.
3

REFERNECES:
Books and Journals:
Cassidy, A. (2016). A practical guide to information systems strategic planning. CRC press.
Chari, S. (2015). Discussion of ‘Statistical learning methods for information security:
fundamentals and case studies’. Applied Stochastic Models in Business and Industry.31(2).
116-118.
Conklin and et..al (2015). Principles of computer security. McGraw-Hill Education Group.
Graham, J., Olson, R., & Howard, R. (Eds.). (2016). Cyber security essentials. CRC Press.
Nepal, S. (2016). Security, privacy and trust in cloud systems. M. Pathan (Ed.). Springer.
Pao, H. K., Lee, Y. J., & Huang, C. Y. (2015). Rejoinder to ‘Statistical learning methods for
information security: fundamentals and case studies’. Applied Stochastic Models in Business
and Industry.31(2). 119-121.
Online:
Advantage of using biometrics, 2014. [Online] Available Through:
<http://www.m2sys.com/blog/workforce-management/the-top-seven-advantages-of-a-
biometric-identification-management-system/>
4
Books and Journals:
Cassidy, A. (2016). A practical guide to information systems strategic planning. CRC press.
Chari, S. (2015). Discussion of ‘Statistical learning methods for information security:
fundamentals and case studies’. Applied Stochastic Models in Business and Industry.31(2).
116-118.
Conklin and et..al (2015). Principles of computer security. McGraw-Hill Education Group.
Graham, J., Olson, R., & Howard, R. (Eds.). (2016). Cyber security essentials. CRC Press.
Nepal, S. (2016). Security, privacy and trust in cloud systems. M. Pathan (Ed.). Springer.
Pao, H. K., Lee, Y. J., & Huang, C. Y. (2015). Rejoinder to ‘Statistical learning methods for
information security: fundamentals and case studies’. Applied Stochastic Models in Business
and Industry.31(2). 119-121.
Online:
Advantage of using biometrics, 2014. [Online] Available Through:
<http://www.m2sys.com/blog/workforce-management/the-top-seven-advantages-of-a-
biometric-identification-management-system/>
4
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.