The confidentiality, integrity, and the availability of the data is also by CIA traid, which is a model mainly designed to maintain the laws and policies of information security in the system. Confidentiality involves some set of rules that generally limits the access of the information. Integrity ensures assurance of accuracy and trustworthy, that is to be provided with the information that is available. And availability in the security triad guarantees the true access of the information that is available is with the authorized person only. The details of the triad are detailed below:
Confidentiality:
Integrity:
Availability:
The security that is provided by the ATM machine ensures security to the data that in included with the system (Farooq et al., 2015). The security that is provided by automated teller machines is that if the user enters the pin wrong three times consecutively, either deliberately or accidentally, then the card gets locked and the customer will not be able to proceed with the transaction. Once the card gets locked, a security alert is send to the registered phone number or email id of the customer. The customer will not able to proceed with the transaction if the card is blocked. Once two-time wrong pin is input in a transaction, then the machine shows an alert about only a single attempt is left with the user to put the pin correctly. Even if the customer is not able input the pin correctly, then the card gets locked. Once the card gets locked, the user can call the customer care of the bank to unlock the card immediately or another way is to wait for 24 hours till the card gets unlocked. Only after 24 hours, any kind of transaction is possible with that card.
In the case that is stated in the question states that a thief broke in an ATM machine and was successful in spoiling five keys of the keypad. The ATM keypad is used for entering the security pin of the account associated with the ATM card. In the question, the thief broke down the card reader, and also broke down five keys of the ATM machine. While he was continuing with this work of breaking down other keys as well, a customer stopped at the ATM for transaction (Cooper & Zywicki, 2017). The customer was able to collect cash successfully from the ATM machine. But, as the card reader was jammed, the customer could not take out the ATM card from the card reader. The customer went out to fetch some help from someone outside, in the meanwhile the thief thought of giving some attempts for the pin of the card so that he can take out some amount of cash from the ATM. With the five digits on the keypad working, the thief can find out many combination of four-digit number. The total possible outcomes are:
5P4 = 5 * 4 * 3 * 2 = 120 total possible outcome the thief attempt. But, as discussed earlier, the security associated with the ATM does not allow the user to give 120 tries to find out the pin. Maximum of three times, the thief can try the pin number to make the transaction successful. Otherwise, the card will be locked and will only get unlocked on the approval from the client. And if the thief is lucky enough to coincidently match the ATM pin within the three attempts, then he will be able to successfully collect the cash from the ATM.
Many disavantages that are provided by biometric authentication system. The disadvantages of biometric system for authentication for which people find this process of security as a reluctant one are as follows:
False positive or false acceptance basically happens when the system of authentication mistakenly identifies one to be someone else (French et al., 2015). This is considered as a error of authentication. When a system of biometric authentication cannot recognize the difference between an authenticated user and an unauthorized user, it is generally known to be a false positive error. False negative or false rejection is an error occurred in biometric system of authentication is basically when a system rejects the authentication of an authorized user (Yuan, Sun & Lv, 2016). The biometric system cannot detect the person is an authenticated one, and simple rejects its access. The data of that person is stored in the database, but still the system is unable to detect it. The system is gives wrong result, which is a negative match with the result. People generally get confused about this authentication process (Karabina, K., & Robinson, 2016). From the organization instances, it can be said that false negative rate is much higher than the false positive rate. Two instances show how the false negative rate is higher than false positive rate.
An example of false rejection error is that, in 2011 October, the Microsoft Security Essentials made false acceptance error of thinking the Chrome Browser as a Zbot malware and then the company deleted the whole browser (Holz, Buthpitiya & Knaust, 2015). When employees of the company tried to install Google Chrome on their systems, the system would totally delete the application as the company detected it as a false accepted site. Another instance, which shows that false positive case, is that there are high percentages of vulnerabilities that are discovered that are actually false positive. An emerging technique for securing the software development is done by static code analysis that are analyzed by larger software code.
There are many ways that can detect the cipher text. Similar to transportation method, other methods that are used to encrypt and decrypt a cipher text are Baconian method, Caesarian shifting method, substitution method, Double transportation method, columnar transposition method, Affine method and many more (Hadid et al., 2015).
The text that is given to decrypt is NTJWKHXK AMK WWUJJYZTX MWKXZKUHE
The methods that are used to decrypt the key is substitution method and Caesar cipher method (Jain, Dedhia & Patil, 2015). The first step is calculated by calculating the numeric value of the text. The step is shown as follows.
Text given |
N |
T |
J |
W |
K |
H |
X |
K |
Numeric value from the alphabets |
14 |
20 |
10 |
23 |
11 |
8 |
24 |
11 |
Text given |
A |
M |
K |
||||||
Numeric value from the alphabets |
1 |
13 |
11 |
||||||
Text given |
W |
W |
U |
J |
J |
Y |
Z |
T |
X |
Numeric value from the alphabets |
23 |
23 |
21 |
10 |
10 |
25 |
26 |
20 |
24 |
Text given |
M |
W |
K |
X |
Z |
K |
U |
H |
E |
Numeric value from the alphabets |
13 |
23 |
11 |
24 |
26 |
11 |
21 |
8 |
5 |
In second step, the key is applied to the full text in a continuous way. And then the substitution process is done by subtracting the key value from numeric value (Oktaviana & Siahaan, 2016).
Text given |
N |
T |
J |
W |
K |
H |
X |
K |
Numeric value from the alphabets |
14 |
20 |
10 |
23 |
11 |
8 |
24 |
11 |
Key given in the question |
2 |
3 |
4 |
2 |
3 |
4 |
2 |
3 |
Text decoded |
12 |
17 |
6 |
21 |
8 |
4 |
22 |
8 |
Text given |
A |
M |
K |
Numeric value from the alphabets |
1 |
13 |
11 |
Key given in the question |
4 |
2 |
3 |
Text decoded |
23 |
11 |
8 |
Text given |
W |
W |
U |
J |
J |
Y |
Z |
T |
X |
Numeric value from the alphabets |
23 |
23 |
21 |
10 |
10 |
25 |
26 |
20 |
24 |
Key given in the question |
4 |
2 |
3 |
4 |
2 |
3 |
4 |
2 |
3 |
Text decoded |
19 |
21 |
18 |
6 |
8 |
22 |
22 |
18 |
21 |
Text given |
M |
W |
K |
X |
Z |
K |
U |
H |
E |
Numeric value from the alphabets |
13 |
23 |
11 |
24 |
26 |
11 |
21 |
8 |
5 |
Key given in the question |
4 |
2 |
3 |
4 |
2 |
3 |
4 |
2 |
3 |
Text decoded |
9 |
21 |
8 |
20 |
24 |
8 |
17 |
6 |
2 |
After substitution process, the Caesar cipher shift by 3 shift is done and the numeric value is achieved by subtracting three digits from the decoded substituted text (Purnama & Rohayani, 2015).
Text given |
N |
T |
J |
W |
K |
H |
X |
K |
Numeric value from the alphabets |
14 |
20 |
10 |
23 |
11 |
8 |
24 |
11 |
Key given in the question |
2 |
3 |
4 |
2 |
3 |
4 |
2 |
3 |
Text decoded |
12 |
17 |
6 |
21 |
8 |
4 |
22 |
8 |
Shift by 3 by Caesar Cipher |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
Decoded numeric number |
9 |
14 |
3 |
18 |
5 |
1 |
19 |
5 |
Result |
I |
N |
C |
R |
E |
A |
S |
E |
Text given |
A |
M |
K |
Numeric value from the alphabets |
1 |
13 |
11 |
Key given in the question |
4 |
2 |
3 |
Text decoded |
23 |
11 |
8 |
Shift by 3 by Caesar Cipher |
3 |
3 |
3 |
Decoded numeric number |
20 |
8 |
5 |
Result |
T |
H |
E |
Text given |
W |
W |
U |
J |
J |
Y |
Z |
T |
X |
Numeric value from the alphabets |
23 |
23 |
21 |
10 |
10 |
25 |
26 |
20 |
24 |
Key given in the question |
4 |
2 |
3 |
4 |
2 |
3 |
4 |
2 |
3 |
Text decoded |
19 |
21 |
18 |
6 |
8 |
22 |
22 |
18 |
21 |
Shift by 3 by Caesar Cipher |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
Decoded numeric number |
16 |
18 |
15 |
3 |
5 |
19 |
19 |
15 |
18 |
Result |
P |
R |
O |
C |
E |
S |
S |
O |
R |
Text given |
M |
W |
K |
X |
Z |
K |
U |
H |
E |
Numeric value from the alphabets |
13 |
23 |
11 |
24 |
26 |
11 |
21 |
8 |
5 |
Key given in the question |
4 |
2 |
3 |
4 |
2 |
3 |
4 |
2 |
3 |
Text decoded |
9 |
21 |
8 |
20 |
24 |
8 |
17 |
6 |
2 |
Shift by 3 by Caesar Cipher |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
3 |
Decoded numeric number |
6 |
18 |
5 |
17 |
21 |
5 |
14 |
3 |
25 |
Result |
F |
R |
E |
Q |
U |
E |
N |
C |
Y |
The result is Increase The Processor Frequency
References
Alsaadi, I. M. (2015). Physiological Biometric Authentication Systems, Advantages, Disadvantages And Future Development: A Review. International Journal Of Scientific & Technology Research, 4(8), 285-289.
Beng, T. C., Hijazi, M. H. A., Lim, Y., & Gani, A. (2018). A survey on Proof of Retrievability for cloud data integrity and availability: Cloud storage state-of-the-art, issues, solutions and future trends. Journal of Network and Computer Applications.
Bhagavatula, C., Ur, B., Iacovino, K., Kywe, S. M., Cranor, L. F., & Savvides, M. (2015). Biometric authentication on iphone and android: Usability, perceptions, and influences on adoption. Proc. USEC, 1-2.
Cooper, J. C., & Zywicki, T. J. (2017). A Chip Off the Old Block or a New Direction for Payment Cards Security? The Chip & PIN Debate, Apple Pay, and the Law & Economics of Preventing Payment Card Fraud.
Farooq, M. U., Waseem, M., Khairi, A., & Mazhar, S. (2015). A critical analysis on the security concerns of internet of things (IoT). International Journal of Computer Applications, 111(7).
French, P., Foulkes, P., Harrison, P., Hughes, V., San Segundo, E., & Stevens, L. (2015). The vocal tract as a biometric: output measures, interrelationships, and efficacy. In Proceedings of the 18th International Congress of Phonetic Sciences (ICPhS).
Hadid, A. (2014). Face biometrics under spoofing attacks: Vulnerabilities, countermeasures, open issues, and research directions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops (pp. 113-118).
Hadid, A., Evans, N., Marcel, S., & Fierrez, J. (2015). Biometrics systems under spoofing attack: an evaluation methodology and lessons learned. IEEE Signal Processing Magazine, 32(5), 20-30.
Hajare, U., Mahajan, R., Jadhav, S., Pingale, N., & Salunke, S. (2018). Efficient Cash Withdrawal from ATM machine using Mobile Banking.
Haupt, G., & Mozer, T. (2015). Assessing biometric authentication: a holistic approach to accuracy. Biometric Technology Today, 2015(3), 5-8.
Holz, C., Buthpitiya, S., & Knaust, M. (2015, April). Bodyprint: Biometric user identification on mobile devices using the capacitive touchscreen to scan body parts. In Proceedings of the 33rd annual ACM conference on human factors in computing systems (pp. 3011-3014). ACM.
Jain, A., Dedhia, R., & Patil, A. (2015). Enhancing the security of caesar cipher substitution method using a randomized approach for more secure communication. arXiv preprint arXiv:1512.05483.
Karabina, K., & Robinson, A. (2016, August). Revisiting the False Acceptance Rate Attack on Biometric Visual Cryptographic Schemes. In International Conference on Information Theoretic Security (pp. 114-125). Springer, Cham.
Kim, H., Park, J., Lee, J., & Ryou, J. (2015). Biometric authentication technology trends in smart device environment. In Mobile and Wireless Technology 2015 (pp. 199-206). Springer, Berlin, Heidelberg.
Kubbo, M., Jayabalan, M., & Rana, M. E. (2016, September). Privacy and Security Challenges in Cloud Based Electronic Health Record: Towards Access Control Model. In The Third International Conference on Digital Security and Forensics (DigitalSec2016) (p. 113).
Meng, W., Wong, D. S., Furnell, S., & Zhou, J. (2015). Surveying the development of biometric user authentication on mobile phones. IEEE Communications Surveys & Tutorials, 17(3), 1268-1293.
Oktaviana, B., & Siahaan, A. P. U. (2016). Three-Pass Protocol Implementation in Caesar Cipher Classic Cryptography. IOSR Journal of Computer Engineering (IOSR-JCE), 18(4), 26-29.
Purnama, B., & Rohayani, A. H. (2015). A New Modified Caesar Cipher Cryptography Method with LegibleCiphertext From a Message to Be Encrypted. Procedia Computer Science, 59, 195-204.
Rahim, M. R. (2016). Implementation of biometric authentication methods for home based systems (Doctoral dissertation, Cardiff Metropolitan University).
Rao, U. H., & Nayak, U. (2014). Physical Security and Biometrics. In The InfoSec Handbook (pp. 293-306). Apress, Berkeley, CA.
Raspotnig, C., Karpati, P., & Opdahl, A. L. (2017). Addendum to:” Combined Assessment of Software Safety and Security Requirements-An Industrial Evaluation of the CHASSIS Method”.
Risodkar, Y. R., Pawar, A. B., Chavanke, S. N., & Pawar, A. S. (2017). ATM Authentication with Enhance Security Using GSM. Journal of Science and Technology (JST), 2(5), 01-05.
Salnitri, M., Dalpiaz, F., & Giorgini, P. (2017). Designing secure business processes with SecBPMN. Software & Systems Modeling, 16(3), 737-757.
Yuan, C., Sun, X., & Lv, R. (2016). Fingerprint liveness detection based on multi-scale LPQ and PCA. China Communications, 13(7), 60-65.
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.