Confidentiality in this case involves the various information of the user, which is hidden and should not be shared with anyone. This is the confidential information of the user. The number of the ATM card and the CVV number of the card should not be shared with anyone as these are the confidential information (Morse & Coulehan, 2015). If anybody gets hold of these information then there might be stealing of the amount from the account of the user. The other confidential information involved may be PIN number of the account holder.
The integrity policies may revolve around the hackers who try and hack the system of the customers of the various banks for the purpose of stealing. The integrity policies also involve the various people trying to peep in the ATMs for knowing the pin of the person using the ATM machine (Margaria & Falletti, 2015). Many of the thieves and the cheaters call in the name of the bank and ask for the details concerning the details of the bank account. This is also a malicious practice and should be stopped in order to maintain the integrity policies.
The availability requirements involve the proper working of the ATM machines so that the transaction can be properly carried out. The other requirement is the proper interface of the machine in which the user is working and carrying out the procedure of the transaction. After the transaction is carried out the machine should be flexible enough to generate the bills or the slip carrying the information of the transaction that has taken place (Kisore & Koteswaraiah, 2017). The other basic requirements may be the maintaining a proper security both physical and technological. The systems from the banks should be protected in order to save the money of the customers. The security should be strong enough in order to protect the systems of the organization.
The thief was able to jam the card reader and break the five keys of the keypad. However, the customer was successful in entering the PIN and extract the amount that was required but could not take out the card as the card reader was jammed by the thief. As the five keypads have been broken the number of option left with the thief in order to operate is 4.
Therefore, the number of options left with the thief: 4
The maximum number of PIN that the customer has to enter or the maximum number of attempts that the thief has to make in order to successfully crack the PIN of the customer is 5!/ (5-4)!.
Thus after making 120 attempts the thief may successfully be able to crack the PIN of the customer.
The use of the biometric authentication is made at a number of places. The concept of bio- metric authentication involves the use of some of the part of the body of the user for gaining the characteristics and the information about the person. However, many are reluctant to the use of the bio- metric authentication due to various reasons.
The false positive means the situation when the situation should have resulted as negative but has turned out as positive. The various instance of this may be the case where a particular person is ill but the person does not have any major disease (Morton et al., 2016) Here, the result of the illness may have due to some of a major disease. Thus, the result here should have been negative. However, it is found that the result has turned to be a positive one as the person is just having a minor illness and it is not due to any of the major illness. This is the situation of false positive.
The false negative means the reverse of the false positive, which states that the result of a situation which should have been positive has turned out to be a negative one. An instance of the false negative can be the design of the software testing, which is designed to catch or detect a particular virus has failed (Kowalski et al., 2017). The case should have resulted as positive but has end up as a negative result. In this case the software testing device designed should have been able to detect the virus that is present. The software was specially designed in order to detect the virus. The use of the software has been made in order to detect the virus, which should have been a positive result. However as the software was unable to detect the virus, the result has turned out to be negative.
Encrypted Text |
N |
T |
J |
W |
K |
H |
X |
K |
|
Corresponding numeric value |
14 |
20 |
10 |
23 |
11 |
8 |
24 |
11 |
|
Key |
2 |
3 |
4 |
2 |
3 |
4 |
2 |
3 |
|
Decoded from the substitution cipher |
12 |
17 |
6 |
21 |
8 |
4 |
22 |
8 |
|
Caeser cipher shift |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
|
Decoded from the caeser cipher |
9 |
14 |
3 |
18 |
5 |
1 |
19 |
5 |
|
Decoded Text |
I |
N |
C |
R |
E |
A |
S |
E |
|
Encrypted Text |
A |
M |
K |
||||||
Corresponding numeric value |
1 |
13 |
11 |
||||||
Key |
4 |
2 |
3 |
||||||
Decoded from the substitution cipher |
23 |
11 |
8 |
||||||
Caeser cipher shift |
3 |
3 |
3 |
||||||
Decoded from the Caeser cipher |
20 |
8 |
5 |
||||||
Decoded Text |
T |
H |
E |
||||||
Encrypted Text |
W |
W |
U |
J |
J |
Y |
Z |
T |
X |
Corresponding numeric value |
23 |
23 |
21 |
10 |
10 |
25 |
26 |
20 |
24 |
Key |
4 |
2 |
3 |
4 |
2 |
3 |
4 |
2 |
3 |
Decoded from the substitution cipher |
19 |
21 |
21 |
6 |
8 |
22 |
22 |
18 |
21 |
Caeser cipher shift |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
Decoded from the Caesar cipher |
16 |
18 |
18 |
3 |
5 |
19 |
19 |
15 |
18 |
Decoded Text |
P |
R |
O |
C |
E |
S |
S |
O |
R |
Encrypted Text |
M |
W |
K |
X |
Z |
K |
U |
H |
E |
Corresponding numeric value |
13 |
23 |
11 |
24 |
26 |
11 |
21 |
8 |
5 |
Key |
4 |
2 |
3 |
4 |
2 |
3 |
4 |
2 |
3 |
Decoded from the substitution cipher |
9 |
21 |
8 |
20 |
24 |
8 |
17 |
6 |
2 |
Caeser cipher shift |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
Decoded from the Caesar cipher |
6 |
18 |
5 |
17 |
21 |
5 |
14 |
3 |
|
Decoded Text |
F |
R |
E |
Q |
U |
E |
N |
C |
Y |
References:
Alsaadi, I. M. (2015). Physiological Biometric Authentication Systems, Advantages, Disadvantages And Future Development: A Review. International Journal Of Scientific & Technology Research, 4(8), 285-289.
Haupt, G., & Mozer, T. (2015). Assessing biometric authentication: a holistic approach to accuracy. Biometric Technology Today, 2015(3), 5-8.
Kisore, N. R., & Koteswaraiah, C. B. (2017). Improving ATM coverage area using density based clustering algorithm and voronoi diagrams. Information Sciences, 376, 1-20.
Kowalski, T., Siddiqui, A., Loren, D., Mertz, H. R., Mallat, D., Haddad, N., … & Okoh, E. (2016). Management of patients with pancreatic cysts: analysis of possible false-negative cases of malignancy. Journal of clinical gastroenterology, 50(8), 649.
Margaria, D., & Falletti, E. (2015). Proof-of-concept of the local integrity approach: Prototype implementation and performance assessment in an urban context. In Localization and GNSS (ICL-GNSS), 2015 International Conference on(pp. 1-6). IEEE.
Morse, J. M., & Coulehan, J. (2015). Maintaining confidentiality in qualitative publications.
Morton, T. D., Bryson, S. T., Coughlin, J. L., Rowe, J. F., Ravichandran, G., Petigura, E. A., … & Batalha, N. M. (2016). False positive probabilities for all Kepler objects of interest: 1284 newly validated planets and 428 likely false positives. The Astrophysical Journal, 822(2), 86.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download