Examples of confidentiality related to the ATM (Automated Teller Machines) are listed below;
As the PIN of the Customer is used by the banks information system and server, thus the transmission of data from the ATM to the server and Vice versa should be done through the secured transmission channel (Such as using SSL or secured socket layer).
As the it is possible for the network intruders to intercept the SSL channel, thus in order to secure the data of the user or the customers it is important to transmit the transaction data in an encrypted form.
Degree of importance of Confidentiality
As the PIN works as a digital identity of a customer to the information system of the Banks, thus unsecured data transmission of data through an unsecured channel can lead to the compromise of the user data to the unintended users of hackers (Hajare et al., 2018). Thus degree of importance is high.
Integrity
Integrity of the data is also important for the users to maintain the integrity in the complete life cycle of data transaction from the ATM to the server of the bank.
Thus changes in the mid of the transmission of the data may lead to the financial loss of the customer.
As the financial transactions completed using the ATM reflects as well as impacts on the customer’s account thus the integrity of the data should be maintained and checked.
Availability
As the ATM is required by the customers in order to get their required money at anytime from anywhere. Therefore, as a part of the information system component it should have minimal downtime.
2.As the thief had managed to break 5 of the total 10 keys on the key pad of the ATM, thus it is evident that the customer used the remaining five keys to enter his/her PIN to the ATM. Therefor the thief now has to try to get the 4 Digit PIN from the remaining 5 keys on the board.
Thus the chances for the thief to get the correct PIN of the Customer will be given by,
5P4 = 5! / (5-4)! =120 times.
3.For the biometric authentication, people hesitate to use this due to its strict nature to recognise people. In case of the ordinary authentication process, passwords of the users can be managed and reset to get access. On the contrary, the biometric authentication process cannot be adjusted in case user losses his/her fingers, or eyes through which the biometric components recognises them.
In addition to that, potential misuse of the biometric data also makes the people reluctant from using the biometric authentication solutions. once any users face, DNA or iris related data/ profile are converted into a digital file, it becomes difficult to protect the users data from fraudsters. Identity theft and financial fraud using the stolen biometrics data also makes the users to hesitate to use the biometrics devices.
Another reason that makes people reluctant to use the biometric is the breach of privacy as the stored data by the government organizations can be breached by the hackers to get the private details of different users (Hajare et al., 2018).
As the biometric data is related to the privacy of the users, thus the data should be protected from any kind of breach so that confidence grows among the people to use and share the data.
The above objections of the users can be countered by storing the user biometric data using some kind of encryption format. So that, even if the database of the users gets breached, the data cannot be intercepted by the hacker.
4.In case of using biometrics, the false positive is related to the situation where biometric system erroneously accepts a biometric data sample as being a match with the data stored in the database this is also denoted by false accept by the system (Onyesolu & Okpala, 2017).
On the other hand, false negative is about the situation when some valid biometric data of a user is provided but the system rejects it as false one or one that is not in the database which is again noted as false reject.
In case of hospital for an emergency case if the biometric system does not allow a surgeon due to false negative leads to their inability to access the hospital premises. Again for an economic institution, some security personnel may not be able to access the office premises in any emergency situation like robbery.
5.In case of using transposition for encrypting and decrypting texts, the given text or the plaint text is written using an array and then assembling the elements in the different columns of this array according to some predefined and given permutation process. In case some of the cells of the columns are empty those are filed with a neutral letter
For the given text the key is given by 234. Now in order to solve the problem we need to get the numeric positions of English letters. This is given by,
A=1, B=2, C=3, D=4, E=5, F =6, G=7, H=8, I =9, J = 10
K = 11, L = 12, M = 13, N = 14, O = 15, P = 16, Q = 17, R = 18, S = 19, T = 20,
U = 21, V = 22, W = 23, X = 24, Y = 25, Z = 26.
For the given sentence in the encrypted form,
NTJWKHXK AMK WWUJJYZTX MWKXZKUHE
There are mainly three parts, we will proceed with each part separately. For first part,
Encrypted Text |
N |
T |
J |
W |
K |
H |
X |
K |
Corresponding numeric value |
14 |
20 |
10 |
23 |
11 |
8 |
24 |
11 |
Using the given key the above one changes to,
N |
T |
J |
W |
K |
H |
X |
K |
|
2 |
3 |
4 |
2 |
3 |
4 |
2 |
3 |
|
12 |
17 |
6 |
21 |
8 |
4 |
22 |
8 |
After using the cease cipher text default shift which is 3, we get,
N |
T |
J |
W |
K |
H |
X |
K |
|
9 |
14 |
3 |
18 |
5 |
1 |
19 |
5 |
Now the changed word will be
I =9, N = 14, C=3, R = 18, E=5, A=1, S = 19, E=5;
Thus the word becomes, INCREASE
In the similar way the second encrypted word (AMK) changes in the following
A |
M |
K |
23 |
11 |
8 |
20 |
8 |
5 |
The new word is THE.
For the last two encrypted words WWUJJYZTX MWKXZKUHE,
Given encryption |
W |
W |
U |
J |
J |
Y |
Z |
T |
X |
Numeric value as per the position |
23 |
23 |
21 |
10 |
10 |
25 |
26 |
20 |
24 |
Given Key |
4 |
2 |
3 |
4 |
2 |
3 |
4 |
2 |
3 |
Resultant after substitution |
19 |
21 |
18 |
6 |
8 |
22 |
22 |
18 |
21 |
Shift using default ceaser cipher technique |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
Resultant value |
16 |
18 |
15 |
3 |
5 |
19 |
19 |
15 |
18 |
Decrypted Text |
P |
R |
O |
C |
E |
S |
S |
O |
R |
Thus the decrypted text Becomes PROCESSOR. |
|||||||||
Encrypted value |
M |
W |
K |
X |
Z |
K |
U |
H |
E |
Corresponding numeric value |
13 |
23 |
11 |
24 |
26 |
11 |
21 |
8 |
5 |
Given Key |
4 |
2 |
3 |
4 |
2 |
3 |
4 |
2 |
3 |
Decoded from the substitution cipher |
9 |
21 |
8 |
20 |
24 |
8 |
17 |
6 |
2 |
Shifting using Ceaser cipher |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
Decoded from the caeser cipher |
6 |
18 |
5 |
17 |
21 |
5 |
14 |
3 |
25 |
Decrypted Text |
F |
R |
E |
Q |
U |
E |
N |
C |
Y |
Thus the last decrypted word is, FREQUENCY.
The Complete decrypted sentence is, INCRESE THE PROCESSOR FREQUENCY
References
Hajare, U., Mahajan, R., Jadhav, S., Pingale, N., & Salunke, S. (2018). Efficient Cash Withdrawal from ATM machine using Mobile Banking.
Karovaliya, M., Karedia, S., Oza, S., & Kalbande, D. R. (2015). Enhanced security for ATM machine with OTP and Facial recognition features. Procedia Computer Science, 45, 390-396.
Onyesolu, M. O., & Okpala, A. C. (2017). Improving Security Using a Three-Tier Authentication for Automated Teller Machine (ATM). International Journal of Computer Network and Information Security, 9(10), 50.
Pathak, S. K., Pathak, S. K., Mishra, M. K., Kesharwani, L., & Gupta, A. K. (2015). Automated Teller Machine (ATM) Frauds and Security. EDITORIAL BOARD, 192.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download