Assignment 1
Assignment 1
Assignment 1
PROGRAM: HCF
(iii).Risk is the potential for loss, damage or destruction of an asset as a result of a threat
exploiting a vulnerability. For instance, in a system that allows weak passwords, the resources
within the system are prone for illegal access, modification or damage by the intruder. Financial
losses in a company is also a risk.
(b).
Confidentiality: To access debit or credit cards one must enter a security password which is
available only to authorized users and aimed at further enhancing the level of security. While
securing the PIN of a respective card it is the responsibility of end user to ensure they use a
strong pin. Banks also need to ensure privacy whenever a communication is happening in
between ATM and bank server to prevent hacking. The entire transaction needs to be properly
secured so to avoid any kind of harm or hackers cracking the card pins and accessing
(Ajaykumar & Kumar, 2013).Proper encryption of PIN ensures that high level of confidentiality
is maintained while lack of attention towards the same could lead to breach of data or customers
information. Moreover, the policy related to changing PIN after regular intervals will help boost
the customers and keep data and information secure.
Integrity: Use of advanced, efficient technology and proper optimization & Collaboration of
ATMs is necessary to ensure their integrity is maintained and customer’s information is secure.
Both in case of withdraw and deposit, systems must be updated chronologically with authentic
data and does not affect the customer account in any manner. Withdrawals of money should
reflect as debits on the account, deposit of funds would result in credit of account. Moreover, a
section or committee should be incorporated to handle queries of customers which are related
with mismatch of account due to use of ATM.
Availability: The frequency of ATM should enhance depending upon the demand of the
customers and further should be frequently updated with cash to provide accurate services. While
ATM which is out of service could lead to customer dissatisfaction, that of ATM with accuracy
in services could attract more and more customers.
3. Unethical behavior are immoral action that contrary to the moral principles such as cheating
on exams and plagiarizing someone’s ideas or article and claim it off as your own whereas ethics
are based on cultural mores, relatively fixed moral attitude or customer of society group. Three
basic security concepts important to information on the internet are confidentiality, integrity, and
availability. Concepts relating to the people who use that information are authentication,
authorization, and nonrepudiation. The information security team and staff are responsible for
deterring unethical and illegal behaviors and act, by enforcing and using policy, training, and
education, technology as controls to protect the organization information and systems. Many
information security specials understand technological means of data and information protection,
but many underestimate the value of the law and policy. (Management of Information Security,
2017, p70). For instance, according to Jawad Ahmed, Uber suffered a possible cyberattack on 16
September 2022 afternoon with an allegedly 18-year-old hacker downloading vulnerability
reports and sharing screenshots of the company's internal systems, email dashboard, and Slack
server. Which means laws, policies, technical controls, fear of penalty and probability of penalty
being administered should be passed by states to prevent such illegal behavior.