Security Fundamentals: ATM, Biometrics, and Cipher Analysis
VerifiedAdded on 2023/01/17
|9
|2105
|1
Homework Assignment
AI Summary
This assignment solution delves into the core concepts of security fundamentals, focusing on Automated Teller Machines (ATMs) and biometric authentication systems. The solution begins by examining the security requirements of ATMs, specifically confidentiality, integrity, and availability, and their relative importance. It then analyzes a scenario involving a compromised ATM, calculating the number of possible PIN combinations after keys are removed. The assignment further explores the challenges and limitations of biometric authentication, including accuracy problems, cost considerations, and potential points of failure. It presents two scenarios illustrating the implications of false negatives in biometric systems. Finally, the solution demonstrates the application of substitution cipher techniques to decode an encrypted message, providing step-by-step instructions for decryption.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Security fundamentals
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

SECURITY FUNDAMENTALS 1
Table of Contents
Question 1............................................................................................................................................2
Confidentiality..................................................................................................................................2
Integrity............................................................................................................................................2
Availability.......................................................................................................................................2
Question 2:...........................................................................................................................................3
Question 3............................................................................................................................................3
Accuracy problem:...........................................................................................................................3
Cost...................................................................................................................................................4
Points of failure................................................................................................................................4
Question 4............................................................................................................................................4
Scenario 1.........................................................................................................................................4
Scenario 2.........................................................................................................................................5
Question 5............................................................................................................................................5
References............................................................................................................................................7
Table of Contents
Question 1............................................................................................................................................2
Confidentiality..................................................................................................................................2
Integrity............................................................................................................................................2
Availability.......................................................................................................................................2
Question 2:...........................................................................................................................................3
Question 3............................................................................................................................................3
Accuracy problem:...........................................................................................................................3
Cost...................................................................................................................................................4
Points of failure................................................................................................................................4
Question 4............................................................................................................................................4
Scenario 1.........................................................................................................................................4
Scenario 2.........................................................................................................................................5
Question 5............................................................................................................................................5
References............................................................................................................................................7

SECURITY FUNDAMENTALS 2
Question 1
Automated teller machines is an advanced technology which is used in the field
of banking industries where it requires a personal identification number (PIN) and a
card to access bank accounts. The examples of confidentiality, integrity and availability
associated with this technology are described below:
Confidentiality
To access the automatic teller machine card consumer must enter a personal
identification number which is available for the authorized consumer. Such kind of PIN
is provided to consumers in order to improve the level of security and it is very
important for consumers to secure the password of their debit card. Banks also require
for ensuring security or privacy whenever communication is happening in between
ATM machine and bank server for reducing hacking related issues (Asgari, et al., 2017).
The complete transaction process requires a high level of a security system in order to
avoid a data breach or hacking related problems. However, proper encryption of the
personal identification number ensures that a large level of confidentiality is controlled
and maintained in an effective manner. It is observed that the conditions regarding
change PIN after regular time periods will help consumers for improving the security of
their bank accounts.
Integrity
Use of modern, effective information technology and proper optimization of the
automatic teller machine system is very important for ensuring their integrity is
controlled or managed. With the help of such kind of process, the security of consumer’s
data or information can be increased. However, in withdraw and deposit ATM system
must be updated only with authentic data and ensure that it does not affect the personal
details of consumers along with their bank details (Medhi, Bora, & Bezboruah, 2016). It
is suggested thata authority should be incorporated for controlling and managing
queries of individuals that are correlated with their bank accounts or utilization of ATM
cards.
Question 1
Automated teller machines is an advanced technology which is used in the field
of banking industries where it requires a personal identification number (PIN) and a
card to access bank accounts. The examples of confidentiality, integrity and availability
associated with this technology are described below:
Confidentiality
To access the automatic teller machine card consumer must enter a personal
identification number which is available for the authorized consumer. Such kind of PIN
is provided to consumers in order to improve the level of security and it is very
important for consumers to secure the password of their debit card. Banks also require
for ensuring security or privacy whenever communication is happening in between
ATM machine and bank server for reducing hacking related issues (Asgari, et al., 2017).
The complete transaction process requires a high level of a security system in order to
avoid a data breach or hacking related problems. However, proper encryption of the
personal identification number ensures that a large level of confidentiality is controlled
and maintained in an effective manner. It is observed that the conditions regarding
change PIN after regular time periods will help consumers for improving the security of
their bank accounts.
Integrity
Use of modern, effective information technology and proper optimization of the
automatic teller machine system is very important for ensuring their integrity is
controlled or managed. With the help of such kind of process, the security of consumer’s
data or information can be increased. However, in withdraw and deposit ATM system
must be updated only with authentic data and ensure that it does not affect the personal
details of consumers along with their bank details (Medhi, Bora, & Bezboruah, 2016). It
is suggested thata authority should be incorporated for controlling and managing
queries of individuals that are correlated with their bank accounts or utilization of ATM
cards.

SECURITY FUNDAMENTALS 3
Availability
The frequency of ATM should increase depending on the demand of consumers
and it should be frequently updated with cash in order to deliver effective services (Van
Anholt, Coelho, Laporte, & Vis, 2016). However, the unavailability of ATM systems can
increase the various problems of consumers and it also leads the issue of consumer
dissatisfaction. Therefore, the availability of ATM systems with more accuracy in terms
of services could communicate numbers of consumers (Ali, 2016).
Question 2:
As per the given question, there is a total of 10 number keys available in the ATM
machine such as 0,1,2,3,4,5,6,7,8 and 9. However, the thief took out from only 5 number
keys, so only 5 keys are left for accessing the bank account (Bik, et al., 2016). Therefore
the value of n equals to the 5 (n=5) and r equal to the 4 (r=4) because the value of
personal identification number (PIN) is 4 digits. According to the permutation formula
the numbers of permutations of n objects taken r at a time period is calculated by
following formula:
P (n, r) = 5P4
So, for the given question applying the concept of permutation formula:
The maximum numbers of pins to be entered are 624 since 1 of the possible
permutation is the correct PIN number of the ATM card which is not included in the
final answer.
Question 3
There are following reasons for using bio-metric authentication process:
Accuracy problem:
Authentication of the proper consumer is the main issue with the development
and implementation of biometrics. It is observed that bio-metric often becomes
inaccurate in terms of evaluating the body parts and must be authenticated in an
Availability
The frequency of ATM should increase depending on the demand of consumers
and it should be frequently updated with cash in order to deliver effective services (Van
Anholt, Coelho, Laporte, & Vis, 2016). However, the unavailability of ATM systems can
increase the various problems of consumers and it also leads the issue of consumer
dissatisfaction. Therefore, the availability of ATM systems with more accuracy in terms
of services could communicate numbers of consumers (Ali, 2016).
Question 2:
As per the given question, there is a total of 10 number keys available in the ATM
machine such as 0,1,2,3,4,5,6,7,8 and 9. However, the thief took out from only 5 number
keys, so only 5 keys are left for accessing the bank account (Bik, et al., 2016). Therefore
the value of n equals to the 5 (n=5) and r equal to the 4 (r=4) because the value of
personal identification number (PIN) is 4 digits. According to the permutation formula
the numbers of permutations of n objects taken r at a time period is calculated by
following formula:
P (n, r) = 5P4
So, for the given question applying the concept of permutation formula:
The maximum numbers of pins to be entered are 624 since 1 of the possible
permutation is the correct PIN number of the ATM card which is not included in the
final answer.
Question 3
There are following reasons for using bio-metric authentication process:
Accuracy problem:
Authentication of the proper consumer is the main issue with the development
and implementation of biometrics. It is observed that bio-metric often becomes
inaccurate in terms of evaluating the body parts and must be authenticated in an
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

SECURITY FUNDAMENTALS 4
effective manner for gathering proper outcomes (Srinivasan, & Raja, 2016). The lack of
attention is one of the common issues due to which the authentication of bio-metric
could damage the results of the bio-metric system.
Cost
It is observed that the bio-metric technique is more expensive and complex to
utilize which depend on the level of the company (Baraki, & Ramaswamy, 2016).
Therefore, the proper evaluation of location needs to be done before designing and
implement bio-metric technologies. However, assistance from financial institutions
could be availed for the generation and development of bio-metrics in an effective
manner.
Points of failure
The complete system is interconnected with every other device and single failure
point can block the complete system. Moreover, automatic teller machines (ATM) are
not working properly which impact on consumer satisfaction and it could transfer the
accounts of consumers using the bio-metric systems (Holz, & Knaust, 2015). It is
evaluated that the fundamental functions of bio-metric systems are completely
depended on recognizing the face of the consumers and it enhances the problem of
disturbance which also leads to failure of the complete bio-metric system.
Question 4
There are various kinds of cases that show the presence of false negatives over
and above false positives which are described below:
Scenario 1
According to the above discussion, the main function of the bio-metric system is
completely based on the recognition of face, it would be treble the consumers of a
secure in case of an emergency condition. However, the urgent requirement of money
could not be processed by the key factors of the bio-metric system due to which
consumers can suffer from the false negative situation (Dasgupta, 2018). It is also
analysed that in the case of the negative process the bio-metric system allows
consumers for accessing the detail of location. Moreover, it has been suggested that due
to some technical problems identification and recognition of consumer can be
effective manner for gathering proper outcomes (Srinivasan, & Raja, 2016). The lack of
attention is one of the common issues due to which the authentication of bio-metric
could damage the results of the bio-metric system.
Cost
It is observed that the bio-metric technique is more expensive and complex to
utilize which depend on the level of the company (Baraki, & Ramaswamy, 2016).
Therefore, the proper evaluation of location needs to be done before designing and
implement bio-metric technologies. However, assistance from financial institutions
could be availed for the generation and development of bio-metrics in an effective
manner.
Points of failure
The complete system is interconnected with every other device and single failure
point can block the complete system. Moreover, automatic teller machines (ATM) are
not working properly which impact on consumer satisfaction and it could transfer the
accounts of consumers using the bio-metric systems (Holz, & Knaust, 2015). It is
evaluated that the fundamental functions of bio-metric systems are completely
depended on recognizing the face of the consumers and it enhances the problem of
disturbance which also leads to failure of the complete bio-metric system.
Question 4
There are various kinds of cases that show the presence of false negatives over
and above false positives which are described below:
Scenario 1
According to the above discussion, the main function of the bio-metric system is
completely based on the recognition of face, it would be treble the consumers of a
secure in case of an emergency condition. However, the urgent requirement of money
could not be processed by the key factors of the bio-metric system due to which
consumers can suffer from the false negative situation (Dasgupta, 2018). It is also
analysed that in the case of the negative process the bio-metric system allows
consumers for accessing the detail of location. Moreover, it has been suggested that due
to some technical problems identification and recognition of consumer can be

SECURITY FUNDAMENTALS 5
processed. Therefore, the initial problem that can be encountered is detecting the
location of a consumer is not known (Nurdiyanto, Rahim, & Wulan, 2017).
Scenario 2
Such kind of condition deals with consumer’s physical situations and produce
condition close to the death of an individual. It is identified that consumers who are
running with cardiac arrest system would not receive more assistance because the bio-
metric system could not detect the location of other colleagues. Such kind of problem
can increase more medical issues to primary individuals and can play with the personal
life of employees (Krishna, Reddy, Kiran, & Reddy, 2016). Such kind of problem falls into
the section of false negative and it can be a serious situation for complete organization
and workplace. Another major issue that can be identified is the loss of employee's
character and there are many illicit actions which can be implemented in the field of the
bio-metric system. Such type of problem comes up by re-establishing various
administrations which are needed for this particular idea.
Question 5
According to the given question, the value of cipher text is "LC DOMX IZY XVHP
XMJQSH AANW FIHABRT”. It is an encoded message which is transferred from one
employee to another (Jones, 2016). In order to decode the given message substitution
technique can be used and there are following steps involved in this technique:
First, find the value of key in order to encrypt or decrypt the message signal and
here the key is equal to 15. (k=15)
Apply cipher formula for decrypting the given message that is
Here, x is equal to cipher text value (Jain, & Lenka, 2015).
K is equal to the key value (15)
By putting cipher text values in the above formula, people can find the decoded
message or information which is transferred from sender to receiver.
Therefore, the given cipher text value is LC DOMX IZY XVHP XMJQSH AANW
FIHABRT and for which the value of plain text is given by:
processed. Therefore, the initial problem that can be encountered is detecting the
location of a consumer is not known (Nurdiyanto, Rahim, & Wulan, 2017).
Scenario 2
Such kind of condition deals with consumer’s physical situations and produce
condition close to the death of an individual. It is identified that consumers who are
running with cardiac arrest system would not receive more assistance because the bio-
metric system could not detect the location of other colleagues. Such kind of problem
can increase more medical issues to primary individuals and can play with the personal
life of employees (Krishna, Reddy, Kiran, & Reddy, 2016). Such kind of problem falls into
the section of false negative and it can be a serious situation for complete organization
and workplace. Another major issue that can be identified is the loss of employee's
character and there are many illicit actions which can be implemented in the field of the
bio-metric system. Such type of problem comes up by re-establishing various
administrations which are needed for this particular idea.
Question 5
According to the given question, the value of cipher text is "LC DOMX IZY XVHP
XMJQSH AANW FIHABRT”. It is an encoded message which is transferred from one
employee to another (Jones, 2016). In order to decode the given message substitution
technique can be used and there are following steps involved in this technique:
First, find the value of key in order to encrypt or decrypt the message signal and
here the key is equal to 15. (k=15)
Apply cipher formula for decrypting the given message that is
Here, x is equal to cipher text value (Jain, & Lenka, 2015).
K is equal to the key value (15)
By putting cipher text values in the above formula, people can find the decoded
message or information which is transferred from sender to receiver.
Therefore, the given cipher text value is LC DOMX IZY XVHP XMJQSH AANW
FIHABRT and for which the value of plain text is given by:

SECURITY FUNDAMENTALS 6
WN ONXI TKJ IGSA IXUBDS LLYH QTSLMCE which is the original message
transferred by an employee to another employee.
Cipher text: LC DOMX IZY XVHP XMJQSH AANW FIHABRT
Plain text: WN ONXI TKJ IGSA IXUBDS LLYH QTSLMCE
WN ONXI TKJ IGSA IXUBDS LLYH QTSLMCE which is the original message
transferred by an employee to another employee.
Cipher text: LC DOMX IZY XVHP XMJQSH AANW FIHABRT
Plain text: WN ONXI TKJ IGSA IXUBDS LLYH QTSLMCE
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

SECURITY FUNDAMENTALS 7
References
Ali, P. I. (2016). Impact of automated teller machine on banking services delivery in
Nigeria: a stakeholder analysis. Brazilian Journal of Education, Technology and
Society, 9(1), 64-72.
Asgari, H., Stelkens-Kobsch, T. H., Montefusco, P., Abhaya, L., Koelle, R., Markarian, G., &
D'Auria, G. (2017). Provisioning for a distributed ATM security management: The
GAMMA approach. IEEE Aerospace and Electronic Systems Magazine, 32(11), 5-
21.
Baraki, P., & Ramaswamy, V. (2016). Bio-Metric Authentication of a User using Hand
Gesture Recognition. International Journal of Applied Engineering
Research, 11(6), 4118-4123.
Bik, H. M., Maritz, J. M., Luong, A., Shin, H., Dominguez-Bello, M. G., & Carlton, J. M.
(2016). Microbial community patterns associated with automated teller machine
keypads in New York City. mSphere, 1(6), e00226-16.
Dasgupta, D. (2018). Thermal Vein Signatures, DNA and EEG Brainprint in Biometric
User Authentication. Applied Computer Sciences in Engineering, 915, 30.
Holz, C., & Knaust, M. (2015). Biometric touch sensing: Seamlessly augmenting each
touch with continuous authentication. In Proceedings of the 28th Annual ACM
Symposium on User Interface Software & Technology, 12(2), 303-312.
Jain, M., & Lenka, S. K. (2015). Secret data transmission using vital image steganography
over transposition cipher. In 2015 International Conference on Green Computing
and Internet of Things (ICGCIoT), 6(5), 1026-1029.
Jones, J. (2016). A Columnar Transposition cipher in a contemporary setting. IACR
Cryptology ePrint Archive, 2016, 5.
Krishna, B. H., Reddy, I. R. S., Kiran, S., & Reddy, R. P. K. (2016). Multiple text encryption,
key entrenched, distributed cipher using pairing functions and transposition
ciphers. In 2016 International Conference on Wireless Communications, Signal
Processing and Networking (WiSPNET), 12(2), 1059-1061.
References
Ali, P. I. (2016). Impact of automated teller machine on banking services delivery in
Nigeria: a stakeholder analysis. Brazilian Journal of Education, Technology and
Society, 9(1), 64-72.
Asgari, H., Stelkens-Kobsch, T. H., Montefusco, P., Abhaya, L., Koelle, R., Markarian, G., &
D'Auria, G. (2017). Provisioning for a distributed ATM security management: The
GAMMA approach. IEEE Aerospace and Electronic Systems Magazine, 32(11), 5-
21.
Baraki, P., & Ramaswamy, V. (2016). Bio-Metric Authentication of a User using Hand
Gesture Recognition. International Journal of Applied Engineering
Research, 11(6), 4118-4123.
Bik, H. M., Maritz, J. M., Luong, A., Shin, H., Dominguez-Bello, M. G., & Carlton, J. M.
(2016). Microbial community patterns associated with automated teller machine
keypads in New York City. mSphere, 1(6), e00226-16.
Dasgupta, D. (2018). Thermal Vein Signatures, DNA and EEG Brainprint in Biometric
User Authentication. Applied Computer Sciences in Engineering, 915, 30.
Holz, C., & Knaust, M. (2015). Biometric touch sensing: Seamlessly augmenting each
touch with continuous authentication. In Proceedings of the 28th Annual ACM
Symposium on User Interface Software & Technology, 12(2), 303-312.
Jain, M., & Lenka, S. K. (2015). Secret data transmission using vital image steganography
over transposition cipher. In 2015 International Conference on Green Computing
and Internet of Things (ICGCIoT), 6(5), 1026-1029.
Jones, J. (2016). A Columnar Transposition cipher in a contemporary setting. IACR
Cryptology ePrint Archive, 2016, 5.
Krishna, B. H., Reddy, I. R. S., Kiran, S., & Reddy, R. P. K. (2016). Multiple text encryption,
key entrenched, distributed cipher using pairing functions and transposition
ciphers. In 2016 International Conference on Wireless Communications, Signal
Processing and Networking (WiSPNET), 12(2), 1059-1061.

SECURITY FUNDAMENTALS 8
Medhi, S., Bora, A., & Bezboruah, T. (2016). Security Impact on e-ATM Windows
Communication Foundation Services using Certificate based Authentication and
Protection: An implementation of Message Level Security based on. NET
Technique. International Journal of Information Retrieval Research (IJIRR), 6(3),
37-51.
Nurdiyanto, H., Rahim, R., & Wulan, N. (2017). Symmetric Stream Cipher using Triple
Transposition Key Method and Base64 Algorithm for Security Improvement.
In Journal of Physics: Conference Series, 930(1), 012005.
Srinivasan, S., & Raja, K. (2016). Preventing Cloud Attacks using Bio-Metric
Authentication in Cloud Computing. Indian Journal of Science and Technology, 9,
23.
Van Anholt, R. G., Coelho, L. C., Laporte, G., & Vis, I. F. (2016). An inventory-routing
problem with pickups and deliveries arising in the replenishment of automated
teller machines. Transportation Science, 50(3), 1077-1091.
Medhi, S., Bora, A., & Bezboruah, T. (2016). Security Impact on e-ATM Windows
Communication Foundation Services using Certificate based Authentication and
Protection: An implementation of Message Level Security based on. NET
Technique. International Journal of Information Retrieval Research (IJIRR), 6(3),
37-51.
Nurdiyanto, H., Rahim, R., & Wulan, N. (2017). Symmetric Stream Cipher using Triple
Transposition Key Method and Base64 Algorithm for Security Improvement.
In Journal of Physics: Conference Series, 930(1), 012005.
Srinivasan, S., & Raja, K. (2016). Preventing Cloud Attacks using Bio-Metric
Authentication in Cloud Computing. Indian Journal of Science and Technology, 9,
23.
Van Anholt, R. G., Coelho, L. C., Laporte, G., & Vis, I. F. (2016). An inventory-routing
problem with pickups and deliveries arising in the replenishment of automated
teller machines. Transportation Science, 50(3), 1077-1091.
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.