The ATM machine provides limited banking facility to withdraw and deposit cash 24 ours a day and 7 days a week. Another feature of ATM is that it is auto driven and no clerk or bank teller is required to be posted there with the machine. The ATM Card consists of a plastic material visiting card size card with a strip of magnetic material or in latest card designs it will contain a chip fabricate on it too along with the magnetic strip on the card. The ATM card also contains a Outvote C.V.
(Card Verification Value Code) code for security reasons.A Personal Identification number (PIN) is required to be entered to avail the service. The PIN code is supplied to the customer when they first receive the card and the customer is required to store it safely to avoid possible misuse of the card. (Cornelia Robot. 1969). In case of ATM machine usages certain extra security measures are adopted like entering the PIN code. The PIN code is NOT written on card and is uniquely allotted to the card customer and customer can change it at will.
Only $13.90 / page
In case credit card is stolen the theft card cannot be used for transactions as PIN is only known to the actual user of the card. This feature is like a password to enter a secured area. This means that not only availability of credit card is necessary for ATM transactions but the secret PIN code is also mandatory and in case of absence of either no transaction process can be completed. There are four major ATM states 1. START: Enter customer ID 2. PIN: Enter PIN 3. ACCOUNT: select account 4.
TRANSACT: select transaction Repeat Problem 1. For a telephone switching system that routes calls through a switching network based on the telephone number requested by the caller. Solution: On a telephone switching system, each extension is unique ID and calls are routed to he extension as per the ID already allotted to the extension. For example if 202 is allotted to a line lying in room no 50 reserved for Assistant Manager then all calls dialing 202 extension would be routed to the Jumper / extension lying with ID 202 lying in room No. 50.Each calling end and called end thus connected to each other for communication purposes regardless of other connections. The communication if occurs over the internet then it is encrypted for security purposes before it leaves the caller and before it is received at the receiving end.
Problem 1. 4 For each of the following assets, assign a low, moderate, or high impact level for the loss of confidentiality, availability, and integrity, respectively. Justify your answers. An organization managing public information on its Web server.A law enforcement organization managing extremely sensitive investigative information. A financial organization managing routine administrative information (not privacy- related information). Solutions: An organization managing public information on its Web server.
Solution: The security of the private information lying on the web server is of great importance. The impact of loss or theft or breach of confidential information is high. Because the security flaw would affect countless users and this would affect the customers at large.A law enforcement organization managing extremely sensitive investigative information. Solution: Similarly law enforcement organizations hold extremely sensitive investigation information that if revealed or hacked would be of grave consequences for the country as whole. It could put the security at risk and could create heavy loss. Thus protecting the information by using encryption techniques like hash and others is tutee vital to be used in the case of law enforcement agencies.
A financial organization managing routine administrative information (not privacy- related information).Solution: In today’s world the private data of any organization is important to compete rivals in business. The keep the administrative information secret is important to ensure integrity of the proper functionality of the organization. The administrative information might contain vital information leading to ways to explore the private and confidential financial information of clients hence security, safety and integrity of he administrative information of the financial organization is of high importance and cannot be put aside.An information system used for large acquisitions in a contracting organization contains both sensitive, pre-solicitation phase contract information and routine administrative information. Assess the impact for the two data sets separately and the information system as a whole. Solution: Routine administrative information is of medium importance as the only protection required to secure the information is for rivals and other information is of not much SE by the invaders.
Furthermore sensitive information and pre-solicitation phase contact information is important to be secured as the business future plan would affect and rivals can steal information to make loss to the organization. Power plant contains a SCADA (supervisory control and data acquisition) system controlling the distribution of electric power for a large military installation. The SCADA system contains both real-time sensor data and routine administrative information. Assess the impact for the two data sets separately and the information yester as a whole.