Wednesday, May 6, 2020

Computer Network and Information Security †MyAssignmenthelp.com

Question: Discuss about the Computer Network and Information Security. Answer: Introduction: The concept of integrity, confidentiality and availability can be considered as a CIA triad, which is nothing but a basic model that is designed for the purpose of guiding policies related to information security within any organization. The concept of ATM in recent times is a daily use technology for the common people and would be always playing a dominating role. In this aspect the security of the technology also play a vital role. The PIN number can be considered as a security aspect, which restricts unauthorized user from access the system. Integrity can be considered more focused towards the concept of accuracy, maintaining and trustworthiness relating to the data over the overall life cycle. Availability concept is the maintaining of the data in all kind situation when the user needs it. The data should safeguarded taking into consideration any event of fire or natural disaster. It can be stated here that the data of the customer should be the upmost priority (Soomro, Shah Ahm ed, 2016). There always should be a backup, which would be helping to safe guard the data when critical situation arises. There can be many situation where the card of the holder are lost and any unauthorized person makes the access to the card. This is where the authentication of the user would be playing a vital role. The PIN can be considered as a security number by which people can directly have access to the bank account and involve in any kind of transaction. Many a times it is seen that the safeguard of the data takes special kind of training for the people who are involved into the concept, the concept may include technological advancement and implementation of new security tools in the system. In recent times, most of the technological aspects are so much advanced that people without training would not be able to implement the system. The concept of data encryption can be considered as a method, which is very common, which can be implemented to ensure the concept of the con fidentiality (Peltier, 2016). The confidentiality of the user or the customer is one of the most crucial elements in the security of the user regarding the access to the system. In some situation, it can be stated that the security aspect is also the job for the customer or the user. They should be more concerned with the activity, which they are performing over the concept of the ATM (Jebaline, G. R Gomathi, 2015). The keyboard of an ATM system mainly contains ten keys ranging from 0 to 9 and some other functional keys which have specific task assigned to it. . In the event the thief has already broken five keys in the keyboard so more five key are available to the thief for breaking (Ray, Das Sen, 2015). The pin number relating to the ATM usually consist of four digits, which has to be selected form a set of five keys using the concept of combination. There can be different methods, which can be used to find the different combinations, which can be implemented to find out the exact password of the card. In this situation we are using the concept if combination and permutation to calculate the number of actions in a particular situation. 5P4 = 5! / (5-4)! = 5! /1! = 5*4*3*2*1/ 1 =120/1 =120. From the above statement, it can be stated that the thief can make five attempts taking into consideration the situation. The answer is obtained from the concept of combination technique. There are different types of advantage, which can be achieved from the concept of the biometric, but on the other hand, it can be stated that there are various types of problem, which are faced. The three reason for the reluctant use of the biometric are as following: One of the reason, which can be related to the reluctant use of biometric, is the concept of security. In the concept of the biometric, the information regarding a particular person is stored in the database. The information may include address, phone number and other personal details. If the database of the system were hacked, it would be directly affecting the individual. It may result in the leak of all the personal information. Sometimes the hacker by taking the identity of other person indulge into illegal activity, which can be termed as an unethical event. There can be different types of error in the technology of the biometric. The main aspect, which can be taken into consideration, is the aspect of false rejection and false entry. The biometric system does not have any type of idea relating to the identity of any particular person. It can be sometimes seen that there is a false detection of person and the access to a particular area is given to the person. One of the most important sector, which should be taken care in the concept of the biometric, is the mapping system. The mapping in this type of system is done relating to the information and usually the fingerprint. The system in such a situation has to be very much accurate. In some cases, it can be seen that the users identification is stored in the system but the system is not able to recognize the person. It may result in the delay of the entry of the person, which can have some sort of effect on the functionality (Tu Yuan, 2014). Counter of Objections The method, which can be used, for countering the problem is the implementation of the process, which is known as the multi factor authentication. The multifactor authentication can be considered as a system, which requires one method of authentication from the different category of authentication (Karovaliya et al., 2015). This process is beneficial in a way of identify the user by the means of a user name, password or fingerprint. Each user would be having a particular user name and password, which would be only available to the concerned user and should not be disclosed to other person. This aspect would be directly increasing the security, which is achieved from the concept (Safa, Von Solms and Furnell, 2016). The Gradient biometric team is in the field of the biometric for more than 10 years and has directly achieved a lot of success in this field. According to the company the three aspects, which should be included in the concept of security in the system of biometric, is the application of comfort, safety and availability. These three concept should be included in one point in order to achieve the desired standard of security. The access to the database of the customer should be always available and can be delivered to the users end when they actually need to access the information. In most of the cases, the network and the linkage between the information and the access permission fail which does not allow the patch, which is required to the access permission, which is needed in the concept of biometric (Onyesolu Okpala, 2017). A false negative can be considered an approach in the process of biometric were the user cannot get access to the location which is biometric bounded. There can be a situation where the persons identity is stored in the database but still the access is not given to the person due to some type of technical issues in the system. In some of the cases it can be noticed that false identity person get the access in the identity of some other person which can lead to the concept of miss identity. The first circumstance, which can be taken into importance, is when the identity of the person is not known. In most of the cases, it can be very much problematic due to the factor that it can restrict the person from different types of activity. The second situation, which can be taken into consideration, is the aspect of loss of identity. Other people may use the identity of some other person and involve themselves into illegal activity taking the other persons identity. There are different types of illegal activity, which are performed in recent times by this use of the system of biometric. This concept can be considered as few of the aspects, which involve high amount of concern so that it can be taken into consideration and the system can be more security-based aspect with high level of service associated with the technology. Taking into consideration the level of the organization it can be very easily shut down the overall infrastructure, the various kinds of things, which are needed, will be the stored in the data center, and restoring can be done to the various service, which are attached to the concept (Koteswari Paul, 2017). Encrypted Text A M K Corresponding numeric value 1 13 11 Key 4 2 3 Decoded from the substitution cipher 23 11 8 Caeser cipher shift 3 3 3 Decoded from the caeser cipher 20 8 5 Decoded Text T H E Encrypted Text W W U J J Y Z T X Corresponding numeric value 23 23 21 10 10 25 26 20 24 Key 4 2 3 4 2 3 4 2 3 Decoded from the substitution cipher 19 21 18 6 8 22 22 18 21 Caeser cipher shift 3 3 3 3 3 3 3 3 3 Decoded from the caeser cipher 16 18 15 3 5 19 19 15 18 Decoded Text P R O C E S S O R Encrypted Text M W K X Z K U H E Corresponding numeric value 13 23 11 24 26 11 21 8 5 Key 4 2 3 4 2 3 4 2 3 Decoded from the substitution cipher 9 21 8 20 24 8 17 6 2 Caeser cipher shift 3 3 3 3 3 3 3 3 3 Decoded from the caeser cipher 6 18 5 17 21 5 14 3 25 Decoded Text F R E Q U E N C Y Therefore, the decoded text for the cypher text for employees will increases the processor speed. References Jebaline, G. R., Gomathi, S. (2015, March). A novel method to enhance the security of ATM using biometrics. In Circuit, Power and Computing Technologies (ICCPCT), 2015 International Conference on (pp. 1-4). IEEE. Karovaliya, M., Karedia, S., Oza, S., Kalbande, D. R. (2015). Enhanced security for ATM machine with OTP and Facial recognition features. Procedia Computer Science, 45, 390-396. Koteswari, S., Paul, P. J. (2017). A Survey: Fusion of Fingerprint and Iris for ATM services. Onyesolu, M. O., Okpala, A. C. (2017). Improving Security Using a Three-Tier Authentication for Automated Teller Machine (ATM).International Journal of Computer Network and Information Security,9(10), 50. Pathak, S. K., Pathak, S. K., Mishra, M. K., Kesharwani, L., Gupta, A. K. (2015). Automated Teller Machine (ATM) Frauds and Security.EDITORIAL BOARD, 192. Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Ray, S., Das, S., Sen, A. (2015, December). An intelligent vision system for monitoring security and surveillance of ATM. In India Conference (INDICON), 2015 Annual IEEE (pp. 1-5). IEEE. Singh, S., Kaur, S. (2016). Enhancing ATM Security Using Fusion of Biometric Techniques.IITM Journal of Management and IT,7(1), 79-82. Soomro, Z. A., Shah, M. H., Ahmed, J. (2016). Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), 215-225. Tu, Z., Yuan, Y. (2014). Critical success factors analysis on effective information security management: A literature review.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.