Question 1 Answer

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

What do you know about the Digital Business Environment?

How the Enterprises Secure and


protect their valuable and sensitive data. Describe the key security requirements of
Confidentiality, Integrity, & Availability. Consider an Automated cash deposit machine in which
users provide a card or an account number to deposit cash. Give examples of confidentiality,
integrity, & availability requirements associated with the system, and, in each case, indicate the
degree of importance of the requirement.

In digital business environment we use technologies to access data, in mean time those data
is much in use to business and this data need to be secure. It give us best opportunity to
look out the breaches of data assets and which implies to the business. This data is seen as
the main module while making decisions, those operations which currently involved related
to business, and all competitors, stakeholders combined and supervisory agreement.
The business data is most valuable data, and we need to prevent this data from threats and
attacks on organizations related all information. Like if we look at the Crown Jewels of
Enterprise, became more battered and sophisticated. So the associations need to apply
strategic and acceptable protections on data, those protection guidelines made and given by
the enterprise. So the readymade strategy applied to the enterprise’s data to protect and
comply with the requirements.
When the companies becomes fail to give protection to data, so the result is seem to be as
vulnerable. Like they can destroy their company in the aspects of reputation and loss of
business and financial phase. The business data is most valuable like we cannot
compromise related to this data. Enterprises must apply secure protection to their data.
There’s IT security experts team in every organization which finds and prevent all data
threats and outbreaks. Information Technology Security experts’ team must see the
viewpoints of further lines of business, including promotion, selling, and process of stock-
chain, like they also need to identify and classify the uppermost value data vibrant to the
enterprises persistence.
The general security key requirements for the Confidentiality, Integrity and Availability
are given below:
Confidentiality: The Confidential data or information must not be available or unveiled to
the unauthorized users.

Integrity: It must assure that the information, seems to be in both Stored and transmitted
packets. And those programs must be available for the authorized users in authentic
manner. This all took as Data integrity, on the other side, the system integrity must assure
that the system need to perform its functions in manner way.

Availability: it must assure that the system should perform its function promptly and
services aren’t denied to the approved users.

The system machine need to keep private credentials like ATM identification which is
really confidential like for mutually in the system when hosting and while transmitting for
transaction of money. So this system need to defend the integrity of records related to
account information and when doing transaction individually. On the other side,
Availability is when the host classification is significant to the financial banking safety,
however not for its depositary accountability feature. The individual teller machine’s
obtainability is of fewer apprehension and some main important resources are included
such as related to Software, Hardware Firmware, Data/information and
Telecommunication.

Confidentiality: when you are using ATM machine like accessing through credit card or
debit card so the individual person must enter their security pins or password to access
information related to them and that password or pins is only available for the accredited
person and intended at additional increasing the security level. While safeguarding the
password or pin of a particular individual card, the main concern of end user to make their
selves guaranteed they’re using encrypted and strong password or pin. So that time the
responsibility of bank is seen to be as they make it essential to confirm confidentiality at
whatever time the person communicating with the ATM machine so this communication is
need to be secure and safe which is on amongst ATM system and Banking Server to
prevent attacks and threats. The whole operation essentials to be appropriately protected
so to evade some harmful things or when the hackers cracking or breaking the password or
pin.
Proper encryption of PIN ensures that high level of confidentiality is maintained while lack
of attention towards the same could lead to breach of data or customers information.
Furthermore, there also policies provided by the bank to change their password or ping
time by time. It will really helpful the customers to keep their data and information more
secure and protect.
Integrity: Well-organized advanced technology and appropriate Association and
Optimization of ATM machine is essential to certify their integrity is well-maintained and
end user’s related information is protected in the aspects of withdraw and depositing
money, machines essentially be modernized with trustworthy data. It doesn’t disturb the
systematic view of end user interpretation in slightly method. Furthermore, a team sections
or working group must be combined to knob requests of clients which get associated with
incongruity of interpretation because of the ATM machine usage and the actions which is
being perform through the ATM must be accompanying with the user account associated
with the Debit or credit card.
Availability: when the demands are putted through the customer so the occurrence of
ATM machine must be given the available feature to the customer with the accurate
services. While those ATM machine which took as out or unavailable of services might
prime to client’s displeasure, so those ATM which is more correctly providing services to
the customers are highly preferable. The machine must be available at the demand which is
requested by client.

You might also like