Question: a. Consider an automated teller machine (ATM) to which users provide a personal identification number (PIN) and a card for account access. Give examples of
a. Consider an automated teller machine (ATM) to which users provide a personal identification number (PIN) and a card for account access. Give examples of confidentiality, integrity, and availability requirements associated with the system and, in each case, indicate the degree of importance of the requirement.
b. Repeat question a for a telephone switching system that routes calls through a switching network based on the telephone number requested by the caller.
c. Consider a desktop publishing system used to produce documents for various organizations.
i. Give an example of a type of publication for which confidentiality of the stored data is the most important requirement.
ii. Give an example of a type of publication in which data integrity is the most important requirement.
iii. Give an example in which system availability is the most important requirement.
d. List and briefly define the fundamental security design principles.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
