01 Information Security Assignment Sample

Here’s the best sample of 01 Information Security Assignment, written by the expert. 

Answer 1

Automated teller machine plays a crucial role for users. It is one of the best discoveries of a human. Automatic teller machine is referred as an electronic banking channel that gives permission to the customers to do primary transactions without the help of bank employee or representative. ATMs are suitable and consistent way for the user to access their own money. ATMs are an important part of the banking industry (Zedan and Al-Sultan, 2017). Any person, who has a credit card or debit card, is authorized to access most of the ATMs. ATMs help the users by giving relaxation to banking issues. ATMs are found everywhere nowadays due to its significance. But in case of ATMs, the confidentiality should be maintained by the banks as well as by the customers. Even the integrity and availability should also be maintained. These three terms are as follows:

Confidentiality: The confidentiality is meant for services which gives the safety while exchanging data to the unauthorized person or id. The confidentiality of account holder’s card detail and PIN are very important. That’s why it is a must for the host system and during transmission for a transaction that PIN should be encrypted. Because customer’s money can be stolen because lack of confidentiality. In the present time, the information like bank account detail, bank statement, credit or debit card’s number, trade security’s information, is more valuable in banks. Protection of such kind of information is an essential part of information security so the main factor of securing information, confidentiality is maintained. Banks always inform their every customer to keep safe the ATM’s PIN. Because if they lose or tell someone other about their ATM’s PIN, there is lots of chance to steal money from ATM. In absences of a PIN, there are no chances to access the account.

Get Assignment Help from Industry Expert Writers (1)

Integrity: Integrity refers the protection of information from the modification through an unauthorized person. The Banks should be integrated because the customers rely on the accuracy of banks communication services. Integrity is also essential in the banking industry to provide its user’s accuracy and efficiency in services (Bahill and Madni, 2017). Banks also should maintain integrity due to their various ATM cards which are provided to various customers. In case of integrity with information confidentiality, cryptography is essential. By using various methods of cryptography, integrity can be maintained in the banks.

Availability: Availability is defined as a surety of access ability while authorizing person is accessing the information at the time of urgency. ATMs availability plays an important role in using ATMs because the information is valuable when it is available to access at the right time.  If the ATMs are not available at every place and for all the time, the customers have to face various problems. That’s why banks try that ATMs availability can be maintained and the customers do not face problems. In the present time, the DDOS attacks are common which leads the lack of availability of server in banks due to which the customers are denied to access of websites. This downtime in banks can be more costly in order to maintain it.

Thus, it is necessary for the banks that the confidentiality, integrity and the availability of access should be maintained because customers have trust on banks in respect to protect their money, securities, and many things. So it is banks responsibility to maintain customer’s trust.

Answer 2

As per this case, a thief jams the card reader as well as breaks the five keys of ATM’s keypad. On the basis of these activities, a thief is able to jam the card and finds a card of that person who went to seek some help for getting his card back (Nivetha and Babu, 2016). Now thief wants to steal money by discovering the PIN. Thief has to press 4 digits pin to unlock the card. The pin of 4 digits is 0000 to 9999 which the thief can enter but he has not so much time so he needs to enter the PIN only five-time then, he can unlock the card and steal the money from bank ATM.

Answer 3

Bio-metric authentication is referred an authentication which depends on the human body which common physical characteristics. It is considered as the most robust authentication till now. Bio-metric authentication is full of features which are exclusive to individuals but these features are found in every human body like retina, figure prints, and iris. Bio-metric authentication has other various advantages over another form (Holz and Knaust, 2015). By using Bio-metric authentication, the data cannot be stolen, lost and forgot while the availability of authentication is found always. Even then, there are various reasons due to that the people might be reluctant for using bio-metrics for authentication. These reasons are given below:

  1. People feel hesitate for using bio-metric because they are not comfortable with it. They think that it is not good for them.
  2. It is not easy like forgotten password, to replace or change its authentication when the body part of authenticator has worsted or damaged.
  3. This is a costly concept for banks because its maintenance cost is too high which make it expensive.

Banks need to aware the public about the bio-metric authentication so they can understand the importance of bio-metric authentication (Odelu et al., 2015). For saving from authentication issues, users should use more than one figure scanning when user sign up in bio-metric authentication for fingerprint bio-metrics.

Answer 4

Get Assignment Help from Industry Expert Writers (1)

A false positive condition when the person finds a positive result of any text while he should have received a negative result. Rather than, when the person finds a negative result of test when he should have found the positive result so this condition is referred as a false negative condition. As per bio-metric authentication, when the system accepts the authentication of an unauthenticated person that means this condition is described as false positive rate and in oppose to this when the system rejects the id of authenticated person that means it is a false negative rate (Nandakumar and Jain, 2015). In terms of network security, the false negative is more serious than false positive due to its impacts. Two circumstances, in which false negative are more serious, are given below:

  1. In the first circumstance, when a person needs to access on his data center for restoring the service whereas he is losing his thousands of dollar in revenue at that time the system of bio-metric authentication rejects the right person in the organization while logging in on the system (Sitová et al., 2016). Thus, the company loses its more money as well as reputation.
  2. In a hotel, a staff member in the main team fall down on the floor due to cardiac arrest, the bio-metric system rejects the person who is trying to go to him for CPR.

These are worst circumstances in which bio-metric authentication’ false negative condition is proofed more serious.

Answer 5

Part 1

Transposition is a method to encrypt the data or text. These kinds of techniques are used by the big companies, for elementary operations and so on. In addition to this cryptography is also a technique or method that applies to the complex logic and mathematics to create strong encryption data. These methods are used for hiding the data (Nambiar, 2017). Cryptography is referred as an art because encrypting text needs the creative application of new or known methods. These are various methods that are used by the organizations for encrypting data or text. Some essential techniques are as follows:

  • RSA
  • Data Encryption Standards
  • Digital Signature
  • Advanced Encryption Standards

There are various steps to decipher this text. The main five steps which are needed are given below:

  • Start Looking single –letter words in the text
  • Find the more frequent letter or symbol
  • Look letters after apostrophes
  • Try to find out what kind of code it is
  • Finally, decipher the text.

Part 2

George knows the value of the information in the organization and he also knows that the market competitors always try to get the other company’s information at any cost so they can beat that company in market competition (Dosanjh, 2016). George is going to launch a new mobile phone and he needs a confidentiality policy due to market competitors. During the meeting, he provides the ciphertext in which he has hidden the information of new phone, to his employees.

References:

Avinash, M., Kumar, R. K., Munusamy, M., Muthuvel, D., Kumar, K. N., & Thirumalaivasan, K. (2017). Multi-level Security using QR Code, Biometrics and Password for Security Systems. International Journal of Engineering Science6334.

Bahill, A. T., & Madni, A. M. (2017). Discovering system requirements. In Tradeoff Decisions in System Design (pp. 373-457). Springer, Cham.

Dosanjh, P. (2016). Research and analysis of cipher decryption investigating various optimisation techniques(Doctoral dissertation, Cardiff Metropolitan University).

Holz, C., & Knaust, M. (2015, November). Biometric touch sensing: Seamlessly augmenting each touch with continuous authentication. In Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology (pp. 303-312). ACM.

Nambiar, A. M. (2017). Towards automatic long term Person Re-identification System in video surveillance (Doctoral dissertation, INSTITUTO SUPERIOR TECNICO).

Nandakumar, K., & Jain, A. K. (2015). Biometric template protection: Bridging the performance gap between theory and practice. IEEE Signal Processing Magazine32(5), 88-100.

Nivetha, R., & Babu, S. (2016). Synchronized Webcam Based Authenticated ATM Centre for End Users.

Odelu, V., Das, A. K., & Goswami, A. (2015). A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Transactions on Information Forensics and Security10(9), 1953-1966.

Sitová, Z., Šeděnka, J., Yang, Q., Peng, G., Zhou, G., Gasti, P., & Balagani, K. S. (2016). HMOG: New behavioral biometric features for continuous authentication of smartphone users. IEEE Transactions on Information Forensics and Security11(5), 877-892.

Zedan, H., & Al-Sultan, S. (2017). The specification and design of secure context-aware workflows. Expert Systems with Applications86, 367-384.

________________________________________________________________________________

Know more about UniqueSubmission’s other writing services:

Assignment Writing Help

Essay Writing Help

Dissertation Writing Help

Case Studies Writing Help

MYOB Perdisco Assignment Help

Presentation Assignment Help

Proofreading & Editing Help

Leave a Comment