You are on page 1of 2

In the digital business environment, we use technologies to access data, in the meantime, those

data are much in use to business and this data needs to be secure. It gives us the best
opportunity to look out the breaches of data assets and which implies to the business. This data
is seen as the main module while making decisions, those operations which currently involved
related to business, and all competitors, stakeholders combined and supervisory agreement.

The business data is the most valuable, and we need to prevent this data from threats and
attacks on organizations related to all information. Like if we look at the Crown Jewels of
Enterprise, became more battered and sophisticated. So the associations need to apply
strategic and acceptable protections on data, those protection guidelines made and given by
the enterprise. So the readymade strategy applied to the enterprise's data to protect and
comply with the requirements.

When the companies become fail to give protection to data, so the result is seen to be as
vulnerable. Like they can destroy their company in the aspects of reputation and loss of
business and financial phase. The business data is most valuable like we cannot compromise
related to this data. Enterprises must apply secure protection to their data.

There's IT security experts team in every organization which finds and prevents all data threats
and outbreaks. Information Technology Security experts' team must see the viewpoints of
further lines of business, including promotion, selling, and process of stock-chain like they also
need to identify and classify the uppermost value data vibrant to the enterprise's persistence.

The general security key requirements for Confidentiality, Integrity, and Availability are given
below:

Confidentiality: Confidential data or information must not be available or unveiled to


unauthorized users.

Integrity: It must assure that the information, seems to be in both Stored and transmitted
packets. And those programs must be available for authorized users in an authentic manner.
This all took as Data integrity, on the other side, the system integrity must assure that the
system needs to perform its functions in a manner way.

Availability: it must assure that the system should perform its function promptly and services
aren't denied to the approved users.

The system machine needs to keep private credentials like ATM identification which is
confidential like for mutually in the system when hosting and while transmitting for the
transaction of money. So this system needs to defend the integrity of records related to
accounting information and when doing transactions individually. On the other side, Availability
is when the host classification is significant to the financial banking safety, however not for its
depositary accountability feature. The individual teller machine's obtainability is of less
apprehension and some main important resources are included such as related to Software,
Hardware Firmware, Data/information, and Telecommunication.

Confidentiality: when you are using an ATM like accessing through credit card or debit card so
the person must enter their security pins or password to access information related to them
and that password or pins is only available for the accredited person and intended at additional
increasing the security level. While safeguarding the password or pin of a particular individual
card, the main concern of end-users to make their selves guaranteed they're using an
encrypted and strong password or pin. So that time the responsibility of a bank is seen to be as
they make it essential to confirm confidentiality at whatever time the person communicating
with the ATM so this communication is needed to be secure and safe which is on amongst the
ATM system and Banking Server to prevent attacks and threats. The whole operation essentials
to be appropriately protected to evade some harmful things or when the hackers cracking or
breaking the password or pin.

Proper encryption of PIN ensures that a high level of confidentiality is maintained while a lack
of attention towards the same could lead to a breach of data or customers' information.
Furthermore, there also policies provided by the bank to change their password or ping time by
time. It will help the customers to keep their data and information more secure and protect.

Integrity: Well-organized advanced technology and appropriate Association and Optimization of


ATMs are essential to certify their integrity is well-maintained and end user's related
information is protected in the aspects of withdrawing and depositing money, machines
essentially be modernized with trustworthy data. It doesn't disturb the systematic view of end-
user interpretation in the slight method. Furthermore, a team section or working group must
be combined to knob requests of clients that get associated with the incongruity of
interpretation because of the ATM usage and the actions which are being performed through
the ATM must be accompanied by the user account associated with the Debit or credit card.

Availability: when the demands are put through the customer so the occurrence of the ATM
must be given the available feature to the customer with the accurate services. While those
ATMs which took as out or unavailable of services might prime to the client's displeasure, so
those ATM which is more correctly providing services to the customers are highly preferable.
The machine must be available at the demand which is requested by the client.

You might also like