SlideShare uma empresa Scribd logo
1 de 22
Presentation on   SECURITY FEATURES OF ATM
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HOW ATM WORKS  :- 1.The ATM is act as a data terminal. ATM has to connect to or communicate through a host  computer .  2. The host computer in analogous to an Internet service provider (ISP) . 3. The host computer is the gateway through which all the various ATM network becomes available  to the user.
4. In ATM system customers authenticate themselves by using a plastic card with a magnetic stripe which is known as  “ ATM  CARD”. 5. The magnetic stripe encodes the customers  account number and a  numeric password which is known as PIN (Personal  Identification Number) . 6. The ATM  prompts the user to insert the card. 7.  When the card is entered the customer  personal identification number (PIN) is requested.
8.  The customer inputs his or her PIN. 9.  If the card is a valid  card  which can  be  processed by the machine then control transfer to next stages and prompts the user to either transfer, deposit or withdrawal of cash.  10.  If the number entered incorrectly several times in a row most ATMs will retain the card as a security precaution  to  prevent an unauthorized users . 11.  ATM reads and store customer’s data on a smart card.
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
HARDWARE  AND SOFTWARE  :- 1. ATM  contain secure crypto-processors, generally within an IBM PC  compatible  host computer in a secure enclosure . 2.  The security of the machine relies mostly on the integrity  of the secure crypto-processor. 3.  A crypto-processor is a type of processor which process encrypted  datas.
[object Object],[object Object],[object Object],[object Object]
GENERAL SECURITY :- ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CARD PIN CARD PRESENT USER OK ACC. NO. S  E  C  U  R  I T  Y  ACC NO PIN REQUEST PIN VALIDATE USER SELECT SERVICE INCORRECT PIN RE-ENTER PIN INCORECT PIN RETURN CARD TIME OUT RETURN CARD INVALID CARD RETURN CARD STOLEN CARD RETAIN CARD
To provide security, ATM system follows three different mechanism 1. Time out 2. Invalid card 3.  Stolen card Time out   :- The customer may fail to enter the PIN within the allowed time limit then the card is returned. Invalid card   :-  The card is not recognized  and it is returned . Stolen card  :- The card is recognized as a stolen card and is retained by the machine.
DATABASE SECURITY   : 1. The ATM keeps all the information about the user and user’s account inside the centralized  database. Inside  the database all the  information are stored in the form of tables  (objects) which are more secured than the general file systems. 2.The database also provide locking mechanisms to maintain safety and security of  data.
NETWORK SECURITY   : The ATM network system  provides the  following features. 1. Authentication : The user is the one it claims to be. 2. Confidentiality : Only authorized users can access the content  of the data. 3. Integrity : The data is not be altered by the third party during the transmission.
4. Non-repudiation (refuse to access) : A user can’t deny the fact that it has accessed a service or data. ADDITIONAL FEATURES  : 1. Verifications of identity : Security system is able to establish and verify the claimed identity of any actor in an ATM network. 2.  Protection of confidentiality : Stored and communicate datas are confidential.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
6. Security recovery : The security system is able to recover from successful or attempted failures of security.
PRECAUTIONS TO TAKE  :- 1.Treat your ATM card like cash. Always keep your card in a safe place. 2. Keep your secret code as secret. Don’t use date of birth, address ,phone number as your PIN. 3. Take your receipt on every ATM transaction. Don’t leave it  at or near the ATM counter. 4. Report a lost or stolen card at once. 5. ATM users should seek  out a machine that is  located in a well-lighted area.
ANY QUESTIONS ?
THANK YOU.

Mais conteúdo relacionado

Mais procurados (20)

Smart Card Presentation
Smart Card Presentation Smart Card Presentation
Smart Card Presentation
 
ATM with an EYE
ATM with an EYEATM with an EYE
ATM with an EYE
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
 
How do at ms work.ppt
How do at ms work.pptHow do at ms work.ppt
How do at ms work.ppt
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
 
Automated teller machine
Automated teller machineAutomated teller machine
Automated teller machine
 
Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)
 
Atm
AtmAtm
Atm
 
Money pad future wallet
Money pad future walletMoney pad future wallet
Money pad future wallet
 
Bank locker system
Bank locker systemBank locker system
Bank locker system
 
Moneypad
MoneypadMoneypad
Moneypad
 
Smatcard documentation
Smatcard documentationSmatcard documentation
Smatcard documentation
 
Atm (bm)
Atm (bm)Atm (bm)
Atm (bm)
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Moneypad
MoneypadMoneypad
Moneypad
 
Digital payment
Digital paymentDigital payment
Digital payment
 
Ppt final
Ppt finalPpt final
Ppt final
 
Atm technology and operations
Atm technology and operationsAtm technology and operations
Atm technology and operations
 
Atm machine
Atm machineAtm machine
Atm machine
 

Destaque

automated teller machines
automated teller  machinesautomated teller  machines
automated teller machinestejinderubs
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atmargoncillo
 
10 Slides to ATM
10 Slides to ATM10 Slides to ATM
10 Slides to ATMseanraz
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and SolutionsClarice_Wilson
 
A T M (Automated Teller Machine)
A T M (Automated Teller Machine)A T M (Automated Teller Machine)
A T M (Automated Teller Machine)Networking
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyAlfred Oboi
 
How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.worldstuff
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMAlpesh Kurhade
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet BankingChiheb Chebbi
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking ConceptTushar Ranjan
 
Seminar on atm
Seminar on atmSeminar on atm
Seminar on atmkhurda
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Manish (passive optic network)
Manish (passive optic network)Manish (passive optic network)
Manish (passive optic network)Manish Desai
 

Destaque (20)

automated teller machines
automated teller  machinesautomated teller  machines
automated teller machines
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
10 Slides to ATM
10 Slides to ATM10 Slides to ATM
10 Slides to ATM
 
Atm System
Atm SystemAtm System
Atm System
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
Security
SecuritySecurity
Security
 
ATM Banking
ATM BankingATM Banking
ATM Banking
 
A T M (Automated Teller Machine)
A T M (Automated Teller Machine)A T M (Automated Teller Machine)
A T M (Automated Teller Machine)
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Atm security
Atm securityAtm security
Atm security
 
How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 
Vehicle security system final report
Vehicle security system final reportVehicle security system final report
Vehicle security system final report
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet Banking
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking Concept
 
Seminar on atm
Seminar on atmSeminar on atm
Seminar on atm
 
E banking security
E banking securityE banking security
E banking security
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Manish (passive optic network)
Manish (passive optic network)Manish (passive optic network)
Manish (passive optic network)
 

Semelhante a Atm security

IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...IJSRED
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Networkdbpublications
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological InnovationEldad Lieberman
 
Area of impact -banking and finance
Area of impact -banking and financeArea of impact -banking and finance
Area of impact -banking and financeJia
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...Eswar Publications
 
Automated teller machine
Automated teller machineAutomated teller machine
Automated teller machineVidya Sagar
 

Semelhante a Atm security (20)

13362741.ppt
13362741.ppt13362741.ppt
13362741.ppt
 
Presentationonsecurityfeatureofatm2 130621034116-phpapp02
Presentationonsecurityfeatureofatm2 130621034116-phpapp02Presentationonsecurityfeatureofatm2 130621034116-phpapp02
Presentationonsecurityfeatureofatm2 130621034116-phpapp02
 
ATM Security
ATM SecurityATM Security
ATM Security
 
E010313141
E010313141E010313141
E010313141
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
What is ATM
What is ATMWhat is ATM
What is ATM
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
 
Electronic payment by ahmad
Electronic payment by ahmadElectronic payment by ahmad
Electronic payment by ahmad
 
N044057478
N044057478N044057478
N044057478
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
Atm Research
Atm Research Atm Research
Atm Research
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological Innovation
 
Area of impact -banking and finance
Area of impact -banking and financeArea of impact -banking and finance
Area of impact -banking and finance
 
Blink tech.
Blink tech.Blink tech.
Blink tech.
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
 
My blink tech.
My blink tech.My blink tech.
My blink tech.
 
Automated teller machine
Automated teller machineAutomated teller machine
Automated teller machine
 
Atm
AtmAtm
Atm
 

Mais de Likan Patra

Sewn Product Machinary & Equipments
Sewn Product Machinary & EquipmentsSewn Product Machinary & Equipments
Sewn Product Machinary & EquipmentsLikan Patra
 
SMArt Contest- Smart Quiz Questions
SMArt Contest- Smart Quiz QuestionsSMArt Contest- Smart Quiz Questions
SMArt Contest- Smart Quiz QuestionsLikan Patra
 
RC Shri Jagannath Dham- Club Activity Report 2014-15
RC Shri Jagannath Dham- Club Activity Report 2014-15RC Shri Jagannath Dham- Club Activity Report 2014-15
RC Shri Jagannath Dham- Club Activity Report 2014-15Likan Patra
 
Quiz about Google and its Products
Quiz about Google and its ProductsQuiz about Google and its Products
Quiz about Google and its ProductsLikan Patra
 
e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)
e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)
e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)Likan Patra
 
Everything you want to know about Liquid Lenses
Everything you want to know about Liquid LensesEverything you want to know about Liquid Lenses
Everything you want to know about Liquid LensesLikan Patra
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber CrimeLikan Patra
 
What is Optical fiber ?
What is Optical fiber ?What is Optical fiber ?
What is Optical fiber ?Likan Patra
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding FirewallsLikan Patra
 
Holographic Data Storage
Holographic Data StorageHolographic Data Storage
Holographic Data StorageLikan Patra
 
A Technical Seminar on OSI model
A Technical Seminar on OSI modelA Technical Seminar on OSI model
A Technical Seminar on OSI modelLikan Patra
 
Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?Likan Patra
 
Computer Tomography (CT Scan)
Computer Tomography (CT Scan)Computer Tomography (CT Scan)
Computer Tomography (CT Scan)Likan Patra
 
Akshaya patra foundation - In Depth
Akshaya patra foundation - In DepthAkshaya patra foundation - In Depth
Akshaya patra foundation - In DepthLikan Patra
 
So, He got a JOB through LinkedIn
So, He got a JOB through LinkedInSo, He got a JOB through LinkedIn
So, He got a JOB through LinkedInLikan Patra
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)Likan Patra
 
Blue ray disc seminar representation
Blue ray disc seminar representationBlue ray disc seminar representation
Blue ray disc seminar representationLikan Patra
 
Brain finger printing
Brain finger printingBrain finger printing
Brain finger printingLikan Patra
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarkingLikan Patra
 

Mais de Likan Patra (20)

Sewn Product Machinary & Equipments
Sewn Product Machinary & EquipmentsSewn Product Machinary & Equipments
Sewn Product Machinary & Equipments
 
SMArt Contest- Smart Quiz Questions
SMArt Contest- Smart Quiz QuestionsSMArt Contest- Smart Quiz Questions
SMArt Contest- Smart Quiz Questions
 
RC Shri Jagannath Dham- Club Activity Report 2014-15
RC Shri Jagannath Dham- Club Activity Report 2014-15RC Shri Jagannath Dham- Club Activity Report 2014-15
RC Shri Jagannath Dham- Club Activity Report 2014-15
 
Quiz about Google and its Products
Quiz about Google and its ProductsQuiz about Google and its Products
Quiz about Google and its Products
 
e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)
e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)
e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)
 
Everything you want to know about Liquid Lenses
Everything you want to know about Liquid LensesEverything you want to know about Liquid Lenses
Everything you want to know about Liquid Lenses
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
What is Optical fiber ?
What is Optical fiber ?What is Optical fiber ?
What is Optical fiber ?
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
 
Holographic Data Storage
Holographic Data StorageHolographic Data Storage
Holographic Data Storage
 
A Technical Seminar on OSI model
A Technical Seminar on OSI modelA Technical Seminar on OSI model
A Technical Seminar on OSI model
 
Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?
 
Computer Tomography (CT Scan)
Computer Tomography (CT Scan)Computer Tomography (CT Scan)
Computer Tomography (CT Scan)
 
Akshaya patra foundation - In Depth
Akshaya patra foundation - In DepthAkshaya patra foundation - In Depth
Akshaya patra foundation - In Depth
 
So, He got a JOB through LinkedIn
So, He got a JOB through LinkedInSo, He got a JOB through LinkedIn
So, He got a JOB through LinkedIn
 
4g technology
4g technology4g technology
4g technology
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)
 
Blue ray disc seminar representation
Blue ray disc seminar representationBlue ray disc seminar representation
Blue ray disc seminar representation
 
Brain finger printing
Brain finger printingBrain finger printing
Brain finger printing
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarking
 

Último

Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 

Último (20)

Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 

Atm security

  • 1. Presentation on SECURITY FEATURES OF ATM
  • 2.
  • 3.
  • 4. HOW ATM WORKS :- 1.The ATM is act as a data terminal. ATM has to connect to or communicate through a host computer . 2. The host computer in analogous to an Internet service provider (ISP) . 3. The host computer is the gateway through which all the various ATM network becomes available to the user.
  • 5. 4. In ATM system customers authenticate themselves by using a plastic card with a magnetic stripe which is known as “ ATM CARD”. 5. The magnetic stripe encodes the customers account number and a numeric password which is known as PIN (Personal Identification Number) . 6. The ATM prompts the user to insert the card. 7. When the card is entered the customer personal identification number (PIN) is requested.
  • 6. 8. The customer inputs his or her PIN. 9. If the card is a valid card which can be processed by the machine then control transfer to next stages and prompts the user to either transfer, deposit or withdrawal of cash. 10. If the number entered incorrectly several times in a row most ATMs will retain the card as a security precaution to prevent an unauthorized users . 11. ATM reads and store customer’s data on a smart card.
  • 7.
  • 8.
  • 9. HARDWARE AND SOFTWARE :- 1. ATM contain secure crypto-processors, generally within an IBM PC compatible host computer in a secure enclosure . 2. The security of the machine relies mostly on the integrity of the secure crypto-processor. 3. A crypto-processor is a type of processor which process encrypted datas.
  • 10.
  • 11.
  • 12.
  • 13. CARD PIN CARD PRESENT USER OK ACC. NO. S E C U R I T Y ACC NO PIN REQUEST PIN VALIDATE USER SELECT SERVICE INCORRECT PIN RE-ENTER PIN INCORECT PIN RETURN CARD TIME OUT RETURN CARD INVALID CARD RETURN CARD STOLEN CARD RETAIN CARD
  • 14. To provide security, ATM system follows three different mechanism 1. Time out 2. Invalid card 3. Stolen card Time out :- The customer may fail to enter the PIN within the allowed time limit then the card is returned. Invalid card :- The card is not recognized and it is returned . Stolen card :- The card is recognized as a stolen card and is retained by the machine.
  • 15. DATABASE SECURITY : 1. The ATM keeps all the information about the user and user’s account inside the centralized database. Inside the database all the information are stored in the form of tables (objects) which are more secured than the general file systems. 2.The database also provide locking mechanisms to maintain safety and security of data.
  • 16. NETWORK SECURITY : The ATM network system provides the following features. 1. Authentication : The user is the one it claims to be. 2. Confidentiality : Only authorized users can access the content of the data. 3. Integrity : The data is not be altered by the third party during the transmission.
  • 17. 4. Non-repudiation (refuse to access) : A user can’t deny the fact that it has accessed a service or data. ADDITIONAL FEATURES : 1. Verifications of identity : Security system is able to establish and verify the claimed identity of any actor in an ATM network. 2. Protection of confidentiality : Stored and communicate datas are confidential.
  • 18.
  • 19. 6. Security recovery : The security system is able to recover from successful or attempted failures of security.
  • 20. PRECAUTIONS TO TAKE :- 1.Treat your ATM card like cash. Always keep your card in a safe place. 2. Keep your secret code as secret. Don’t use date of birth, address ,phone number as your PIN. 3. Take your receipt on every ATM transaction. Don’t leave it at or near the ATM counter. 4. Report a lost or stolen card at once. 5. ATM users should seek out a machine that is located in a well-lighted area.