Tuesday, May 5, 2020

OTP and Facial Recognition Features †Free Samples to Students

Question: Discuss about the OTP and Facial Recognition Features. Answer: Introduction: Confidentiality, integrity and availability is also known as CIA Triad is nothing but a model which is designed for guiding policies for information security within an organization. In the case of ATM machine pin number confidentiality is generally compared to privacy (Hajare et al., 2018). PIN numbers are designed in such a way that it can prevent from reaching to unauthorized people. Integrity is much more focused in maintaining, accuracy and trustworthiness of data over the whole life cycle. Availability is generally ensured by maintaining of data of all kinds of hardware and repair of data when needed (Onyesolu Okpala, 2017). Safeguarding of data or any kinds of interruptions in various kinds of connection must be included in various kinds of parameters like natural disaster and fire. For prevention of data a backup must be there so that important data can be easily stored. PIN in ATM mainly makes use of data so that it cannot be easily accessed or authorized by unauthorized peo ple. Many times it is seen that safeguarding of data may require special kind of training for looking into the documents. This kind of training would generally require various kinds of security risk which is used for threating of information. Data encryption is known to be common kind of method which is used for ensuring confidentiality. While availability focus on maintaining of hardware which generally performs maintaining of hardware for functioning of operating system. The whole keypad of an ATM machine consists of ten keys that is (0-9). Now in this situation the thief has broken five keys so more five keys are available to him. The pin number of an ATM machine generally consist of four numbers. So with the five keys available the maximum number of possible outcome for a four-digit pin is as follows 5P4 = 5! / (5-4)! = 5! /1! = 5*4*3*2*1/ 1 =120/1 =120. So the maximum number of possible outcome in this situation is 120. But according to the ATM security a user can enter pin for maximum three times. After three wrong inputs the card gets blocked. So keeping the security of the ATM in mind the maximum time the thief can enter the pin is three times. After three wrong trials by thief the card will be blocked. The reasons behind the reluctant to the use of biometrics are: One of the biggest challenges is the kind of process which is involved in capturing or mapping it a particular kind of identity (Karovaliya et al., 2015). Lack of accuracy in the kind of capturing may easily led to failure of a particular system. Privacy is considered to be one of the biggest concern in the kind of biometric solutions (Pathak et al., 2015). If somehow the server storing the biometric information is hacked in anyway then it may have led to serious kind of impact on a particular kind of individual. Any kind of error in biometric devices may led to false rejection and false kind of acceptance. This is mainly due to biometric technology which is unable to have an idea regarding the characteristic of a particular person for various kinds of reasons. There are certain number of steps which can be used for overcoming issues in biometric kind of authentication (Singh Kaur, 2016). Spoofing attack is considered to be well known kind of attack in which biometric of other persons are created. Another way for the implementation is the multifactor authentication which mainly requires multiple kind of identifiers on depending on certain number or level of risk. A false negative is a thing in biometric system when a particular kind of system fails to recognize the authenticity of an individual which might lead to something which is not happening in general (Khan, Hasan Xu, 2015). Depending on the thing there can be serious kinds of consequences like personal who is considered to have safety on the parameter of accessing inspite of guarding the whole kind of thing. On organizational level it can easily shut down the whole infrastructure and various kinds of things needed will be the data centers needed for restoring of various kinds of services. Transposition cipher is nothing but a simple scheme in which some of the plaintext are shifted in some kinds of regular pattern for forming cipher text. In some of the manual system transposition is generally carried out by making use of mnemonic. Simple frequency count can easily reveal to cryptanalyst. It generally has the same frequency in the cipher like some of the average in plaintext. And so simple rearrangement of various kinds of letters are possible in this. Simple distribution cipher is a kind of cypher which is being used for many years. It basically consists of plaintext character which are considered to be different from cipher text character. It is considered to be different from Caesar cipher in the context that cipher alphabet is not alphabet shifted instead of that is jumbled completely. Encrypted Text N T J W K H X K Corresponding numeric value 14 20 10 23 11 8 24 11 Key 2 3 4 2 3 4 2 3 Decoded from the substitution cipher 12 17 6 21 8 4 22 8 Caeser cipher shift 3 3 3 3 3 3 3 3 Decoded from the caeser cipher 9 14 3 18 5 1 19 5 Decoded Text I N C R E A S E Encrypted Text A M K Corresponding numeric value 1 13 11 Key 4 2 3 Decoded from the substitution cipher 23 11 8 Caeser cipher shift 3 3 3 Decoded from the caeser cipher 20 8 5 Decoded Text T H E Encrypted Text W W U J J Y Z T X Corresponding numeric value 23 23 21 10 10 25 26 20 24 Key 4 2 3 4 2 3 4 2 3 Decoded from the substitution cipher 19 21 18 6 8 22 22 18 21 Caeser cipher shift 3 3 3 3 3 3 3 3 3 Decoded from the caeser cipher 16 18 15 3 5 19 19 15 18 Decoded Text P R O C E S S O R Encrypted Text M W K X Z K U H E Corresponding numeric value 13 23 11 24 26 11 21 8 5 Key 4 2 3 4 2 3 4 2 3 Decoded from the substitution cipher 9 21 8 20 24 8 17 6 2 Caeser cipher shift 3 3 3 3 3 3 3 3 3 Decoded from the caeser cipher 6 18 5 17 21 5 14 3 25 Decoded Text F R E Q U E N C Y Therefore, the decoded text for the cypher text for employees will increases the processor speed. References Hajare, U., Mahajan, R., Jadhav, S., Pingale, N., Salunke, S. (2018). Efficient Cash Withdrawal from ATM machine using Mobile Banking. Karovaliya, M., Karedia, S., Oza, S., Kalbande, D. R. (2015). Enhanced security for ATM machine with OTP and Facial recognition features.Procedia Computer Science,45, 390-396. Khan, R., Hasan, R., Xu, J. (2015, March). SEPIA: Secure-PIN-authentication-as-a-service for ATM using mobile and wearable devices. InMobile Cloud Computing, Services, and Engineering (MobileCloud), 2015 3rd IEEE International Conference on(pp. 41-50). IEEE. Koteswari, S., Paul, P. J. (2017). A Survey: Fusion of Fingerprint and Iris for ATM services. Onyesolu, M. O., Okpala, A. C. (2017). Improving Security Using a Three-Tier Authentication for Automated Teller Machine (ATM).International Journal of Computer Network and Information Security,9(10), 50. Pathak, S. K., Pathak, S. K., Mishra, M. K., Kesharwani, L., Gupta, A. K. (2015). Automated Teller Machine (ATM) Frauds and Security.EDITORIAL BOARD, 192. Singh, S., Kaur, S. (2016). Enhancing ATM Security Using Fusion of Biometric Techniques.IITM Journal of Management and IT,7(1), 79-82.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.