Tuesday, May 5, 2020

Critical Analysis on Security Concerns - Free Samples to Students

Question: Discuss about the Critical Analysis on Security Concerns. Answer: Introduction: The concept of integrity, confidentiality and availability can be considered as CIA trait, which is nothing but a model which is implemented for the purpose of guiding the information security within any form of organization. In this case it can be stated that the concept of the confidentiality is the privacy aspect I the ATM machine. The PIN number are designed for the purpose of security so that any type of authorized person do not have the access to the account of the user. Safeguarding the data from any type of intrusion can be considered one of the most vital aspects in such cases. In order to achieve the security of the data there always should be a backup plan, which can be implemented if there is any type of problem relating to fire or natural disaster management (Fernandez Alexander, 2016). The ATM machine consist of many keys, which have specific operation related to it. In this case, a thief has entered and broken some of the keys in the machine. In this case, we would be using the aspect of permutation and combination in order to get the answer. 5P4 = 5! / (5-4)! = 5! /1! = 5*4*3*2*1/ 1 =120/1 =120. Therefore, it can be stated here that total number of possibility outcome in a particular situation would be 120. On the other hand, it can be mentioned that the security aspect of the ATM does allow only three tries to every user to enter their PIN and after the third PIN the card would be blocked automatically. So taking this into consideration the number of try that the theft can make is three. This is due to the factor that after the third card he would not be able to make the next try (Farooq et al., 2015). The main reason behind the reluctant use of the biometric machine are as follows: Privacy is one of the factor, which play a vital role in this aspect. It is seen majorly that there are different type of privacy issue, which are formed in the different type of technology, which are used in daily life. If somehow the server of the biometric is breached it can result in a big problem which cannot be resolved very easily. Any kind of error may lead to false rejection. The main concept which is applied to the aspect of the biometric is that the personal detail of the person would be stored in the database ones the person tries to access it, the data from the database would be accessed. If the user were located in the database, the person would be allowed or else rejected. In some cases due to false functionality the user who have the information in the database are rejected and they cannot access Lack of accuracy can also be a problem in such type of system. The concept in such a case is the false identity. It can be seen sometimes that a person with the false identity of another person would be granted entry. This may result in different types of illegal activity. The risk factors, which are stated above, can be removed with the use of multifactor biometric management. The concept is beneficial in a way that help the actual user to be identified quite easily and help the system to make to wise decision (Choi et al., 2016) The false negative thing in the concept of the biometric is that if the system rejects the identity of a particular person. It can be a problem due to the aspect of authentication, which is applied to the concept. Depending on the incident, there can be different types of illegal activities, which are performed. In most of the cases, the people using the identity of another person usually involve in different type of unethical activities. When the biometric system is implemented in, the organizational level and it lead to problem it can shut down the overall infrastructure of the organization. Encrypted Text N T J W K H X K Corresponding numeric value 14 20 10 23 11 8 24 11 Key 2 3 4 2 3 4 2 3 Decoded from the substitution cipher 12 17 6 21 8 4 22 8 Caeser cipher shift 3 3 3 3 3 3 3 3 Decoded from the caeser cipher 9 14 3 18 5 1 19 5 Decoded Text I N C R E A S E Encrypted Text A M K Corresponding numeric value 1 13 11 Key 4 2 3 Decoded from the substitution cipher 23 11 8 Caeser cipher shift 3 3 3 Decoded from the caeser cipher 20 8 5 Decoded Text T H E Encrypted Text W W U J J Y Z T X Corresponding numeric value 23 23 21 10 10 25 26 20 24 Key 4 2 3 4 2 3 4 2 3 Decoded from the substitution cipher 19 21 18 6 8 22 22 18 21 Caeser cipher shift 3 3 3 3 3 3 3 3 3 Decoded from the caeser cipher 16 18 15 3 5 19 19 15 18 Decoded Text P R O C E S S O R Encrypted Text M W K X Z K U H E Corresponding numeric value 13 23 11 24 26 11 21 8 5 Key 4 2 3 4 2 3 4 2 3 Decoded from the substitution cipher 9 21 8 20 24 8 17 6 2 Caeser cipher shift 3 3 3 3 3 3 3 3 3 Decoded from the caeser cipher 6 18 5 17 21 5 14 3 25 Decoded Text F R E Q U E N C Y References Choi, H. S., Lee, B., Yoon, S. (2016). Biometric authentication using noisy electrocardiograms acquired by mobile sensors.IEEE Access,4, 1266-1273. Farooq, M. U., Waseem, M., Khairi, A., Mazhar, S. (2015). A critical analysis on the security concerns of internet of things (IoT).International Journal of Computer Applications,111(7). Fernandez, A., Alexander, K. M. (2016). Data Privacy and Confidentiality.iURBAN: Intelligent Urban Energy Tool, 35. Havenetidis, K., Paradisis, G. P., Karanasiou, I. S., Tsekouras, G. J. (2015). An investigation of an Artificial Neural Network method for personal identification using kinematic parameters from specific body parts.Journal of Applied Mathematics and Bioinformatics,5(3), 125. He, D., Wang, D. (2015). Robust biometrics-based authentication scheme for multiserver environment.IEEE Systems Journal,9(3), 816-823.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.