Tuesday, May 5, 2020

Information System for Automated Teller Machines-myassignmenthelp

Question: Discuss about theInformation System for Automated Teller Machines. Answer: Confidentiality- Confidentiality in ATM cards means keeping the credentials of the cards private and protects them from data breach. The sensitive information that is the security pin, card number, the CVV number are to be kept private. Confidentiality ensures that right person should have access to the right information and protects them to reach to wrong people (Chen, Pande Mohapatra, 2014). To keep the data confidential, the experts of information security system makes the system more secured. Integrity- The main purpose of integrity is to maintain the trustworthiness, consistency, and accuracy of the data throughout the life cycle of the system. The data that is available in the ATM card should not be changed or altered by some unauthorized people in case of data breach. Data integrity ensures user access control and file permission access to the users. Security should be established in case there is some alteration of data that are generally caused by human interruption. Availability- The availability of data ensures that the data should be available with the ATM user for the transaction to occur successful. Availability ensures that proper functioning of the system should be there with all the software on update. There should be proper safeguards to protect the available data that user has access (Luca et al., 2015). There should no denial-of-service attack for the available data. According to the question, the thief broke five keys of the ATM machine and also jammed the card reader of the machine. When the customer came to withdraw money, his transaction was successful, but he was not able to take out the card, as the reader was jammed. The customer went to seek help outside to take the card, at the mean while the thief thought of taking out some money from the ATM. As he has broken five keys, he was only left with five keys. With those five keys, he has a total possibility of 5! /(5-4)! = 120 ways by which the thief can get the pin of the ATM. But, the thief cannot enter 120 time the pin in the ATM because of the security purpose. The ATM machine security gives a maximum limit of three times to enter the pin of the ATM (Kim et al., 2015). After three times wrong pin, the card will be automatically blocked and the customer will get to know about that. There are many reasons for which the users depends on biometric authentication for their security of personal and official credentials. The advantages of biometric authentication are listed below: Biometric authentication provides convenience to the users. The level of convenience is generally increased with the biometric authentication. With all the practices that are involved in biometric authentication, there is no need to secure them with password. To remember passwords all the times they are changed are very difficult to remember. Biometric authentication does not need all such difficulties. The biometric is very easy to use as it only scans the physical parts of the body (Barbosa Silva, 2015). The installation process of biometric is also very easy and there is no headache of remembering the password for authentication. The fingerprint, voice scanning, face and retina are generally used for the biometric authentication. Another advantage of biometric authentication is that the parts that are scanned are actually non-transferable. The passwords and user ids can be transferable and consumes much time. But the biometric authentication consumes less amount of time of almost less than 5 seconds. The false positive authentication of biometric mainly happens when the data of an un-authenticated user seems to be similar to that of the authenticated one (Alsaadi, 2015). The database of the biometric thinks that the credentials of an authenticated user is similar to that of un-authenticated user and allows the unauthenticated user to access the system. Whereas, biometric authentication that is false negative generally happens when the authenticated user is rejected from the accessing the system. The system cannot detect the authenticate user. Decryption can be done by columnar transposition method to decrypt a plain text with transposition algorithm. The given plain text is NTJWKHXK AMK WWUJJYZTX MWKXZKUHE along with key 234 The decryption can be done by Caesar cipher and the substitution algorithm to decrypt the text. Encrypted Text N T J W K H X K The numeric value of alphabets 14 20 10 23 11 8 24 11 Key given is 234 2 3 4 2 3 4 2 3 Decoded code from substitution cipher 12 17 6 21 8 4 22 8 Shifting 3 in Caeser cipher 3 3 3 3 3 3 3 3 Decoded value from caeser cipher 9 14 3 18 5 1 19 5 Final Decrpyted Text I N C R E A S E Encrypted Text A M K The numeric value of alphabets 1 13 11 Key given is 234 4 2 3 Decoded code from substitution cipher 23 11 8 Shifting 3 in Caeser cipher 3 3 3 Decoded value from caeser cipher 20 8 5 Final Decrpyted Text T H E Encrypted Text W W U J J Y Z T X The numeric value of alphabets 23 23 21 10 10 25 26 20 24 Key given is 234 4 2 3 4 2 3 4 2 3 Decoded code from substitution cipher 19 21 18 6 8 22 22 18 21 Shifting 3 in Caeser cipher 3 3 3 3 3 3 3 3 3 Decoded value from caeser cipher 16 18 15 3 5 19 19 15 18 Final Decrpyted Text P R O C E S S O R Encrypted Text M W K X Z K U H E The numeric value of alphabets 13 23 11 24 26 11 21 8 5 Key given is 234 4 2 3 4 2 3 4 2 3 Decoded code from substitution cipher 9 21 8 20 24 8 17 6 2 Shifting 3 in Caeser cipher 3 3 3 3 3 3 3 3 3 Decoded value from caeser cipher 6 18 5 17 21 5 14 3 25 Final Decrpyted Text F R E Q U E N C Y The code decrypted is INCREASE THE PROCESSOR FREQUENCY References Alsaadi, I. M. (2015). Physiological Biometric Authentication Systems, Advantages, Disadvantages And Future Development: A Review.International Journal Of Scientific Technology Research,4(8), 285-289. Barbosa, F. G., Silva, W. L. S. (2015, November). Support vector machines, Mel-Frequency Cepstral Coefficients and the Discrete Cosine Transform applied on voice based biometric authentication. InSAI Intelligent Systems Conference (IntelliSys), 2015(pp. 1032-1039). IEEE. Chen, S., Pande, A., Mohapatra, P. (2014, June). Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones. InProceedings of the 12th annual international conference on Mobile systems, applications, and services(pp. 109-122). ACM. De Luca, A., Hang, A., Von Zezschwitz, E., Hussmann, H. (2015, April). I feel like I'm taking selfies all day!: towards understanding biometric authentication on smartphones. InProceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems(pp. 1411-1414). ACM. Kim, H., Park, J., Lee, J., Ryou, J. (2015). Biometric authentication technology trends in smart device environment. InMobile and Wireless Technology 2015(pp. 199-206). Springer, Berlin, Heidelberg.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.