The confidentiality, integrity, and the availability of the data is also by CIA traid, which is a model mainly designed to maintain the laws and policies of information security in the system. Confidentiality involves some set of rules that generally limits the access of the information. Integrity ensures assurance of accuracy and trustworthy, that is to be provided with the information that is available. And availability in the security triad guarantees the true access of the information that is available is with the authorized person only. The details of the triad are detailed below:
Confidentiality:
Integrity:
Availability:
The security that is provided by the ATM machine ensures security to the data that in included with the system (Farooq et al., 2015). The security that is provided by automated teller machines is that if the user enters the pin wrong three times consecutively, either deliberately or accidentally, then the card gets locked and the customer will not be able to proceed with the transaction. Once the card gets locked, a security alert is send to the registered phone number or email id of the customer. The customer will not able to proceed with the transaction if the card is blocked. Once two-time wrong pin is input in a transaction, then the machine shows an alert about only a single attempt is left with the user to put the pin correctly. Even if the customer is not able input the pin correctly, then the card gets locked. Once the card gets locked, the user can call the customer care of the bank to unlock the card immediately or another way is to wait for 24 hours till the card gets unlocked. Only after 24 hours, any kind of transaction is possible with that card.
In the case that is stated in the question states that a thief broke in an ATM machine and was successful in spoiling five keys of the keypad. The ATM keypad is used for entering the security pin of the account associated with the ATM card. In the question, the thief broke down the card reader, and also broke down five keys of the ATM machine. While he was continuing with this work of breaking down other keys as well, a customer stopped at the ATM for transaction (Cooper & Zywicki, 2017). The customer was able to collect cash successfully from the ATM machine. But, as the card reader was jammed, the customer could not take out the ATM card from the card reader. The customer went out to fetch some help from someone outside, in the meanwhile the thief thought of giving some attempts for the pin of the card so that he can take out some amount of cash from the ATM. With the five digits on the keypad working, the thief can find out many combination of four-digit number. The total possible outcomes are:
5P4 = 5 * 4 * 3 * 2 = 120 total possible outcome the thief attempt. But, as discussed earlier, the security associated with the ATM does not allow the user to give 120 tries to find out the pin. Maximum of three times, the thief can try the pin number to make the transaction successful. Otherwise, the card will be locked and will only get unlocked on the approval from the client. And if the thief is lucky enough to coincidently match the ATM pin within the three attempts, then he will be able to successfully collect the cash from the ATM.
Many disavantages that are provided by biometric authentication system. The disadvantages of biometric system for authentication for which people find this process of security as a reluctant one are as follows:
False positive or false acceptance basically happens when the system of authentication mistakenly identifies one to be someone else (French et al., 2015). This is considered as a error of authentication. When a system of biometric authentication cannot recognize the difference between an authenticated user and an unauthorized user, it is generally known to be a false positive error. False negative or false rejection is an error occurred in biometric system of authentication is basically when a system rejects the authentication of an authorized user (Yuan, Sun & Lv, 2016). The biometric system cannot detect the person is an authenticated one, and simple rejects its access. The data of that person is stored in the database, but still the system is unable to detect it. The system is gives wrong result, which is a negative match with the result. People generally get confused about this authentication process (Karabina, K., & Robinson, 2016). From the organization instances, it can be said that false negative rate is much higher than the false positive rate. Two instances show how the false negative rate is higher than false positive rate.
An example of false rejection error is that, in 2011 October, the Microsoft Security Essentials made false acceptance error of thinking the Chrome Browser as a Zbot malware and then the company deleted the whole browser (Holz, Buthpitiya & Knaust, 2015). When employees of the company tried to install Google Chrome on their systems, the system would totally delete the application as the company detected it as a false accepted site. Another instance, which shows that false positive case, is that there are high percentages of vulnerabilities that are discovered that are actually false positive. An emerging technique for securing the software development is done by static code analysis that are analyzed by larger software code.
There are many ways that can detect the cipher text. Similar to transportation method, other methods that are used to encrypt and decrypt a cipher text are Baconian method, Caesarian shifting method, substitution method, Double transportation method, columnar transposition method, Affine method and many more (Hadid et al., 2015).
The text that is given to decrypt is NTJWKHXK AMK WWUJJYZTX MWKXZKUHE
The methods that are used to decrypt the key is substitution method and Caesar cipher method (Jain, Dedhia & Patil, 2015). The first step is calculated by calculating the numeric value of the text. The step is shown as follows.
Text given |
N |
T |
J |
W |
K |
H |
X |
K |
Numeric value from the alphabets |
14 |
20 |
10 |
23 |
11 |
8 |
24 |
11 |
Text given |
A |
M |
K |
||||||
Numeric value from the alphabets |
1 |
13 |
11 |
||||||
Text given |
W |
W |
U |
J |
J |
Y |
Z |
T |
X |
Numeric value from the alphabets |
23 |
23 |
21 |
10 |
10 |
25 |
26 |
20 |
24 |
Text given |
M |
W |
K |
X |
Z |
K |
U |
H |
E |
Numeric value from the alphabets |
13 |
23 |
11 |
24 |
26 |
11 |
21 |
8 |
5 |
In second step, the key is applied to the full text in a continuous way. And then the substitution process is done by subtracting the key value from numeric value (Oktaviana & Siahaan, 2016).
Text given |
N |
T |
J |
W |
K |
H |
X |
K |
Numeric value from the alphabets |
14 |
20 |
10 |
23 |
11 |
8 |
24 |
11 |
Key given in the question |
2 |
3 |
4 |
2 |
3 |
4 |
2 |
3 |
Text decoded |
12 |
17 |
6 |
21 |
8 |
4 |
22 |
8 |
Text given |
A |
M |
K |
Numeric value from the alphabets |
1 |
13 |
11 |
Key given in the question |
4 |
2 |
3 |
Text decoded |
23 |
11 |
8 |
Text given |
W |
W |
U |
J |
J |
Y |
Z |
T |
X |
Numeric value from the alphabets |
23 |
23 |
21 |
10 |
10 |
25 |
26 |
20 |
24 |
Key given in the question |
4 |
2 |
3 |
4 |
2 |
3 |
4 |
2 |
3 |
Text decoded |
19 |
21 |
18 |
6 |
8 |
22 |
22 |
18 |
21 |
Text given |
M |
W |
K |
X |
Z |
K |
U |
H |
E |
Numeric value from the alphabets |
13 |
23 |
11 |
24 |
26 |
11 |
21 |
8 |
5 |
Key given in the question |
4 |
2 |
3 |
4 |
2 |
3 |
4 |
2 |
3 |
Text decoded |
9 |
21 |
8 |
20 |
24 |
8 |
17 |
6 |
2 |
After substitution process, the Caesar cipher shift by 3 shift is done and the numeric value is achieved by subtracting three digits from the decoded substituted text (Purnama & Rohayani, 2015).
Text given |
N |
T |
J |
W |
K |
H |
X |
K |
Numeric value from the alphabets |
14 |
20 |
10 |
23 |
11 |
8 |
24 |
11 |
Key given in the question |
2 |
3 |
4 |
2 |
3 |
4 |
2 |
3 |
Text decoded |
12 |
17 |
6 |
21 |
8 |
4 |
22 |
8 |
Shift by 3 by Caesar Cipher |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
Decoded numeric number |
9 |
14 |
3 |
18 |
5 |
1 |
19 |
5 |
Result |
I |
N |
C |
R |
E |
A |
S |
E |
Text given |
A |
M |
K |
Numeric value from the alphabets |
1 |
13 |
11 |
Key given in the question |
4 |
2 |
3 |
Text decoded |
23 |
11 |
8 |
Shift by 3 by Caesar Cipher |
3 |
3 |
3 |
Decoded numeric number |
20 |
8 |
5 |
Result |
T |
H |
E |
Text given |
W |
W |
U |
J |
J |
Y |
Z |
T |
X |
Numeric value from the alphabets |
23 |
23 |
21 |
10 |
10 |
25 |
26 |
20 |
24 |
Key given in the question |
4 |
2 |
3 |
4 |
2 |
3 |
4 |
2 |
3 |
Text decoded |
19 |
21 |
18 |
6 |
8 |
22 |
22 |
18 |
21 |
Shift by 3 by Caesar Cipher |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
Decoded numeric number |
16 |
18 |
15 |
3 |
5 |
19 |
19 |
15 |
18 |
Result |
P |
R |
O |
C |
E |
S |
S |
O |
R |
Text given |
M |
W |
K |
X |
Z |
K |
U |
H |
E |
Numeric value from the alphabets |
13 |
23 |
11 |
24 |
26 |
11 |
21 |
8 |
5 |
Key given in the question |
4 |
2 |
3 |
4 |
2 |
3 |
4 |
2 |
3 |
Text decoded |
9 |
21 |
8 |
20 |
24 |
8 |
17 |
6 |
2 |
Shift by 3 by Caesar Cipher |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
Decoded numeric number |
6 |
18 |
5 |
17 |
21 |
5 |
14 |
3 |
25 |
Result |
F |
R |
E |
Q |
U |
E |
N |
C |
Y |
The result is Increase The Processor Frequency
References
Alsaadi, I. M. (2015). Physiological Biometric Authentication Systems, Advantages, Disadvantages And Future Development: A Review. International Journal Of Scientific & Technology Research, 4(8), 285-289.
Beng, T. C., Hijazi, M. H. A., Lim, Y., & Gani, A. (2018). A survey on Proof of Retrievability for cloud data integrity and availability: Cloud storage state-of-the-art, issues, solutions and future trends. Journal of Network and Computer Applications.
Bhagavatula, C., Ur, B., Iacovino, K., Kywe, S. M., Cranor, L. F., & Savvides, M. (2015). Biometric authentication on iphone and android: Usability, perceptions, and influences on adoption. Proc. USEC, 1-2.
Cooper, J. C., & Zywicki, T. J. (2017). A Chip Off the Old Block or a New Direction for Payment Cards Security? The Chip & PIN Debate, Apple Pay, and the Law & Economics of Preventing Payment Card Fraud.
Farooq, M. U., Waseem, M., Khairi, A., & Mazhar, S. (2015). A critical analysis on the security concerns of internet of things (IoT). International Journal of Computer Applications, 111(7).
French, P., Foulkes, P., Harrison, P., Hughes, V., San Segundo, E., & Stevens, L. (2015). The vocal tract as a biometric: output measures, interrelationships, and efficacy. In Proceedings of the 18th International Congress of Phonetic Sciences (ICPhS).
Hadid, A. (2014). Face biometrics under spoofing attacks: Vulnerabilities, countermeasures, open issues, and research directions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops (pp. 113-118).
Hadid, A., Evans, N., Marcel, S., & Fierrez, J. (2015). Biometrics systems under spoofing attack: an evaluation methodology and lessons learned. IEEE Signal Processing Magazine, 32(5), 20-30.
Hajare, U., Mahajan, R., Jadhav, S., Pingale, N., & Salunke, S. (2018). Efficient Cash Withdrawal from ATM machine using Mobile Banking.
Haupt, G., & Mozer, T. (2015). Assessing biometric authentication: a holistic approach to accuracy. Biometric Technology Today, 2015(3), 5-8.
Holz, C., Buthpitiya, S., & Knaust, M. (2015, April). Bodyprint: Biometric user identification on mobile devices using the capacitive touchscreen to scan body parts. In Proceedings of the 33rd annual ACM conference on human factors in computing systems (pp. 3011-3014). ACM.
Jain, A., Dedhia, R., & Patil, A. (2015). Enhancing the security of caesar cipher substitution method using a randomized approach for more secure communication. arXiv preprint arXiv:1512.05483.
Karabina, K., & Robinson, A. (2016, August). Revisiting the False Acceptance Rate Attack on Biometric Visual Cryptographic Schemes. In International Conference on Information Theoretic Security (pp. 114-125). Springer, Cham.
Kim, H., Park, J., Lee, J., & Ryou, J. (2015). Biometric authentication technology trends in smart device environment. In Mobile and Wireless Technology 2015 (pp. 199-206). Springer, Berlin, Heidelberg.
Kubbo, M., Jayabalan, M., & Rana, M. E. (2016, September). Privacy and Security Challenges in Cloud Based Electronic Health Record: Towards Access Control Model. In The Third International Conference on Digital Security and Forensics (DigitalSec2016) (p. 113).
Meng, W., Wong, D. S., Furnell, S., & Zhou, J. (2015). Surveying the development of biometric user authentication on mobile phones. IEEE Communications Surveys & Tutorials, 17(3), 1268-1293.
Oktaviana, B., & Siahaan, A. P. U. (2016). Three-Pass Protocol Implementation in Caesar Cipher Classic Cryptography. IOSR Journal of Computer Engineering (IOSR-JCE), 18(4), 26-29.
Purnama, B., & Rohayani, A. H. (2015). A New Modified Caesar Cipher Cryptography Method with LegibleCiphertext From a Message to Be Encrypted. Procedia Computer Science, 59, 195-204.
Rahim, M. R. (2016). Implementation of biometric authentication methods for home based systems (Doctoral dissertation, Cardiff Metropolitan University).
Rao, U. H., & Nayak, U. (2014). Physical Security and Biometrics. In The InfoSec Handbook (pp. 293-306). Apress, Berkeley, CA.
Raspotnig, C., Karpati, P., & Opdahl, A. L. (2017). Addendum to:” Combined Assessment of Software Safety and Security Requirements-An Industrial Evaluation of the CHASSIS Method”.
Risodkar, Y. R., Pawar, A. B., Chavanke, S. N., & Pawar, A. S. (2017). ATM Authentication with Enhance Security Using GSM. Journal of Science and Technology (JST), 2(5), 01-05.
Salnitri, M., Dalpiaz, F., & Giorgini, P. (2017). Designing secure business processes with SecBPMN. Software & Systems Modeling, 16(3), 737-757.
Yuan, C., Sun, X., & Lv, R. (2016). Fingerprint liveness detection based on multi-scale LPQ and PCA. China Communications, 13(7), 60-65.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download