Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

For the following question below can you explain how you feel about the paragraph below A bank ATM provides confidentiality before allowing access to an

For the following question below can you explain how you feel about the paragraph below

A bank ATM provides confidentiality before allowing access to an ATM user. This is done by enforcing three principles of information security, confidentiality, integrity, and availability.

Confidentiality is handled by requiring two forms of identification, a card, and a PIN code to gain access to an ATM.

Integrity ensures that transfers or withdrawals of funds by the machine are from the users' bank account.

Availability is always made possible by allowing the user to gain access to information.

"Even using iris biometric-based IoT environments such as ATMs, the communication channels are still a weak point in the overall system. Any penetration of these channels endangers the system. So iris encryption is crucial here, but conventional cryptography techniques like AES, RSA, and DES (Stallings, 2016; Menezes, Van Oorschot & Vanstone, 1996) are unsuitable for biometric data due to inseparable characteristics of biometric data like high correlation among adjacent pixels, high redundancy, etc."(Mehta, Dutta & Kim, 2016). "The chaotic theory is favorable for biometric data encryption, as it is extremely sensitive to initial conditions, pseudorandom in nature, and has high resistivity against system attacks" (Dachselt & Schwarz, 2001).

How authentication and availability might be implemented in the ATM example.

Biometric validation using thumbprint verification and facial recognition can be used to enhance the authentication process in an ATM. To ensure availability, the system must be designed to handle high volumes of transactions, recover quickly from any failures, and be protected from cyber-attacks and other security threats. This would ensure that only the rightful owner of the account can use it with no issue..This would provide safe and dependable banking transactions.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Algorithm Design And Applications

Authors: Michael T. Goodrich, Roberto Tamassia

1st Edition

1118335910, 978-1118335918

More Books

Students also viewed these Algorithms questions

Question

=+c) What might you do instead?

Answered: 1 week ago