SlideShare uma empresa Scribd logo
1 de 20
A PRESENTATION ON
the SECURITY
FEATURE OF ATM
ABOUT THE ATM (automated
teller machine)
 An ATM is an electronic device which allows a
bank’s customer to make cash withdrawals
and check their account balance at any time
without the need for a human teller.
 Many ATMs also allow to deposit cash or
checques, and to transfer money between
their bank accounts.
PARTS OF THE ATM SYSTEM:
1. Card Reader
2. Keypad
3. Speaker
4. Display Screen
5. Receipt Printer
6. Cash dispenser
7. Deposit slot
8. Screen buttons
HOW ATM WORKS:
 The ATM acts as a data terminal. ATM has
to connect to or communicate through a host
computer.
 The host computer is analogous to an
Internet Service Provider(ISP).
 The host computer is the gateway through
which all the various ATMs become available
Contd..
 In an ATM system customers authenticate
themselves by using a plastic card with a
magnetic stripe which is known as “ATM CARD”.
 The magnetic stripe encodes the customers
account number and a numeric password which is
known as “PIN” (Personal Identification Number).
 The ATM prompts the user to insert the card.
 When the card is entered the customer’s PIN is
requested.
Contd..
 The customer inputs his or her PIN.
 If the card is a valid card which can be processed by
the machine then it prompts the user to either
transfer, deposit or withdraw cash.
 If the number is entered incorrectly several times in
a row most ATMs will retain the card as a security
precaution to prevent an unauthorized user.
 ATM needs and stores customer’s data on a smart
card.
NETWORKING CONCEPT:
 ATMs rely on authorization of a
financial transaction by the card issuer or
other authorizing institution
via the communications network.
 Most host computers can support either
leased-line or dial-up machines.
 Leased-line machines connect directly to the
host computer through a four-wire, point-to-
point dedicated telephone line.
Contd..
 Dial-up ATMs connect the host computer
through a normal phone line using a modem.
 The host computer may be owned by a bank
or any financial institutions or it may be used
by an independent service provider.
Hardware and Software:
 An ATM contains secure crypto-
processors, generally within an IBM PC
compatible host computer in a secure
enclosure.
 The security of the machine relies mostly on
the integrity of the secure crypto-processor.
 A crypto-processor is a type of processor
which processes encrypted data.
Contd..
 ATM typically connects directly to their ATM
transaction processor via a modem over a
dedicated telephone line.
 ATM machines runs with operating systems
such as Windows 2000 and Linux.
 ATM transactions are usually encrypted with
DES.
 Most ATM are connected to inter-bank
network.
GENERAL SECURITY:
 Modern ATM’s physical security concentrate on
denying the use of the money inside the machine
to a thief or a fraud using some fraud detection
techniques.
 Another trend in ATM security is the fortified
cash dispenser which is replaced with nothing
more than a paper-tape printer.
 The customer requests a withdrawal from the
machine which dispenses no money but merely
prints a receipt. The customer then takes the
receipt to the sales clerk and then exchange it
for cash.
Contd..
 Some ATM system provides the security that if
you withdraw certain amount per day or you
deposit, a prompt on the screen will ask you to
enter your birthday and month to confirm your
identity.
 By ensuring that you are the real card holder it
can reduce the risks of the frauds.
 An additional security measure limits the total
amount of the ATM withdrawal to some
particular amount.
 This aims to reduce the amount of fraud
withdrawal.
SECURITY FEATURE:
To provide security, ATM systems follows three
different mechanisms:
Time-out
Invalid card
Stolen card
• Time out: The customer may fail to enter the PIN
within the allowed time limit then the card is
returned.
• Invalid card: The card is not recognized and is
returned.
• Stolen card: The card is recognized as a stolen
card and is retained by the machine.
DATABASE SECURITY:
 The ATM keeps all the information about the
user and the user’s account inside the
centralized database. Inside the database all
the information are stored in the form of
tables(objects) which are more secure than
the general file systems.
 The database also provide locking mechanisms
to maintain safety and security of data.
NETWORK SECURITY:
The ATM network system provides the following
features:
 Authentication: The user is the one it claims to
be.
 Confidentiality: Only authorized users can access
the content of the data.
 Integrity: The data is not to be altered by the
third party during the transmission.
Contd..
 Non-repudiation(refuse to access): A user
cant deny the fact that it has accessed a
service or data.
ADDITIONAL FEATURES:
 Verifications of identity: Security system is
able to establish and verify the claimed
identity of any actor in an ATM network.
 Protection of confidentiality: Stored and
communicated data are confidential.
Contd..
 Strong accountability: The entity can’t deny
the responsibility of its performed action as
well as their effects.
 Alarm reporting: The security system is able
to generate alarm notification about certain
selected security related events.
 Audit: When violations of security happens
the system is able to analyze the data
relevant to security.
Contd..
 Security recovery:
The security system is able to recover from
successful or attempted failures of security.
PRECAUTIONS TO TAKE:
 Treat your ATM card like cash. Always keep
your card in a safe place.
 Keep your secret code as a secret. Don’t use
date of birth, address, phone number as your
PIN.
 Take your receipt on every ATM transactions.
Don’t leave it or near the ATM counter.
 Report a lost or stolen card at once.
 ATM user should seek out a machine that is
located in a well-lighted area.
THANK YOU

Mais conteúdo relacionado

Mais procurados

bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
Aeman Khan
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Asim Kumar Pathak
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
deepu427
 

Mais procurados (20)

An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
wireless usb ppt
wireless usb pptwireless usb ppt
wireless usb ppt
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
 
Atm wtih an eye FROM ANAND REDDY
Atm wtih an eye  FROM ANAND REDDYAtm wtih an eye  FROM ANAND REDDY
Atm wtih an eye FROM ANAND REDDY
 
Moneypad- the future wallet
Moneypad- the future walletMoneypad- the future wallet
Moneypad- the future wallet
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Atm security
Atm securityAtm security
Atm security
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Atm
AtmAtm
Atm
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
seminar on invisible eye
seminar on invisible eyeseminar on invisible eye
seminar on invisible eye
 
Presentation On ATM Technology
Presentation On ATM TechnologyPresentation On ATM Technology
Presentation On ATM Technology
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 

Destaque

automated teller machines
automated teller  machinesautomated teller  machines
automated teller machines
tejinderubs
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
argoncillo
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
Diotima Gupta
 

Destaque (20)

automated teller machines
automated teller  machinesautomated teller  machines
automated teller machines
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
10 Slides to ATM
10 Slides to ATM10 Slides to ATM
10 Slides to ATM
 
Atm (bm)
Atm (bm)Atm (bm)
Atm (bm)
 
Atm System
Atm SystemAtm System
Atm System
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
A T M (Automated Teller Machine)
A T M (Automated Teller Machine)A T M (Automated Teller Machine)
A T M (Automated Teller Machine)
 
ATM Banking
ATM BankingATM Banking
ATM Banking
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
 
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTUREATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
 
Communication in automatic teller machine (atm)
Communication in automatic teller machine (atm)Communication in automatic teller machine (atm)
Communication in automatic teller machine (atm)
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking Concept
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.
 
ATM BANKING
ATM BANKINGATM BANKING
ATM BANKING
 
ATM System Description and functional and non- functional Requirements
ATM System Description and functional and non- functional RequirementsATM System Description and functional and non- functional Requirements
ATM System Description and functional and non- functional Requirements
 
Security
SecuritySecurity
Security
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
ATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGYATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGY
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 

Semelhante a Presentation on security feature of atm (2)

Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
Hai Nguyen
 
Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)
amanjit9306
 

Semelhante a Presentation on security feature of atm (2) (20)

13362741.ppt
13362741.ppt13362741.ppt
13362741.ppt
 
What is ATM
What is ATMWhat is ATM
What is ATM
 
13828523.ppt
13828523.ppt13828523.ppt
13828523.ppt
 
ATM Security
ATM SecurityATM Security
ATM Security
 
Electronic payment by ahmad
Electronic payment by ahmadElectronic payment by ahmad
Electronic payment by ahmad
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
Area of impact -banking and finance
Area of impact -banking and financeArea of impact -banking and finance
Area of impact -banking and finance
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
Automated teller machine
Automated teller machineAutomated teller machine
Automated teller machine
 
Atm transaction
Atm transactionAtm transaction
Atm transaction
 
E010313141
E010313141E010313141
E010313141
 
Concepts of Digital Banking
Concepts of Digital BankingConcepts of Digital Banking
Concepts of Digital Banking
 
Atm machine
Atm machineAtm machine
Atm machine
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
Moneypad
MoneypadMoneypad
Moneypad
 
ATM .pptx
ATM .pptxATM .pptx
ATM .pptx
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 

Mais de Siya Agarwal

Mais de Siya Agarwal (20)

Whats digital marketing
Whats digital marketingWhats digital marketing
Whats digital marketing
 
amrapali la residentia
amrapali la residentiaamrapali la residentia
amrapali la residentia
 
Anode filter bags
Anode filter bagsAnode filter bags
Anode filter bags
 
Pmp west delhi
Pmp west delhiPmp west delhi
Pmp west delhi
 
Solar home lighting system
Solar home lighting systemSolar home lighting system
Solar home lighting system
 
Solar off grid
Solar off gridSolar off grid
Solar off grid
 
Solar charge controller
Solar charge controllerSolar charge controller
Solar charge controller
 
Presentation on venturi
Presentation on venturiPresentation on venturi
Presentation on venturi
 
Presentation on sparkler filter bag
Presentation on sparkler filter bagPresentation on sparkler filter bag
Presentation on sparkler filter bag
 
Presentation on screening mesh
Presentation on screening meshPresentation on screening mesh
Presentation on screening mesh
 
Presentation on reverse air type filter bag
Presentation on reverse air type filter bagPresentation on reverse air type filter bag
Presentation on reverse air type filter bag
 
Presentation on pulveriser sleeve
Presentation on pulveriser sleevePresentation on pulveriser sleeve
Presentation on pulveriser sleeve
 
Presentation on pp cartridge housing filter
Presentation on pp cartridge housing filterPresentation on pp cartridge housing filter
Presentation on pp cartridge housing filter
 
Presentation on nutsche filter bag
Presentation on nutsche filter bagPresentation on nutsche filter bag
Presentation on nutsche filter bag
 
Presentation on geotextile
Presentation on geotextilePresentation on geotextile
Presentation on geotextile
 
Presentation on fine bubble diffuser
Presentation on fine bubble diffuserPresentation on fine bubble diffuser
Presentation on fine bubble diffuser
 
Presentation on FBD filter bags
Presentation on FBD filter bagsPresentation on FBD filter bags
Presentation on FBD filter bags
 
Presentation on candle filter bag
Presentation on candle filter bagPresentation on candle filter bag
Presentation on candle filter bag
 
Presentation on waste water diffuser
Presentation on waste water diffuserPresentation on waste water diffuser
Presentation on waste water diffuser
 
Presentation on support cages
Presentation on support cagesPresentation on support cages
Presentation on support cages
 

Último

Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
dlhescort
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 

Último (20)

Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 

Presentation on security feature of atm (2)

  • 1. A PRESENTATION ON the SECURITY FEATURE OF ATM
  • 2. ABOUT THE ATM (automated teller machine)  An ATM is an electronic device which allows a bank’s customer to make cash withdrawals and check their account balance at any time without the need for a human teller.  Many ATMs also allow to deposit cash or checques, and to transfer money between their bank accounts.
  • 3. PARTS OF THE ATM SYSTEM: 1. Card Reader 2. Keypad 3. Speaker 4. Display Screen 5. Receipt Printer 6. Cash dispenser 7. Deposit slot 8. Screen buttons
  • 4. HOW ATM WORKS:  The ATM acts as a data terminal. ATM has to connect to or communicate through a host computer.  The host computer is analogous to an Internet Service Provider(ISP).  The host computer is the gateway through which all the various ATMs become available
  • 5. Contd..  In an ATM system customers authenticate themselves by using a plastic card with a magnetic stripe which is known as “ATM CARD”.  The magnetic stripe encodes the customers account number and a numeric password which is known as “PIN” (Personal Identification Number).  The ATM prompts the user to insert the card.  When the card is entered the customer’s PIN is requested.
  • 6. Contd..  The customer inputs his or her PIN.  If the card is a valid card which can be processed by the machine then it prompts the user to either transfer, deposit or withdraw cash.  If the number is entered incorrectly several times in a row most ATMs will retain the card as a security precaution to prevent an unauthorized user.  ATM needs and stores customer’s data on a smart card.
  • 7. NETWORKING CONCEPT:  ATMs rely on authorization of a financial transaction by the card issuer or other authorizing institution via the communications network.  Most host computers can support either leased-line or dial-up machines.  Leased-line machines connect directly to the host computer through a four-wire, point-to- point dedicated telephone line.
  • 8. Contd..  Dial-up ATMs connect the host computer through a normal phone line using a modem.  The host computer may be owned by a bank or any financial institutions or it may be used by an independent service provider.
  • 9. Hardware and Software:  An ATM contains secure crypto- processors, generally within an IBM PC compatible host computer in a secure enclosure.  The security of the machine relies mostly on the integrity of the secure crypto-processor.  A crypto-processor is a type of processor which processes encrypted data.
  • 10. Contd..  ATM typically connects directly to their ATM transaction processor via a modem over a dedicated telephone line.  ATM machines runs with operating systems such as Windows 2000 and Linux.  ATM transactions are usually encrypted with DES.  Most ATM are connected to inter-bank network.
  • 11. GENERAL SECURITY:  Modern ATM’s physical security concentrate on denying the use of the money inside the machine to a thief or a fraud using some fraud detection techniques.  Another trend in ATM security is the fortified cash dispenser which is replaced with nothing more than a paper-tape printer.  The customer requests a withdrawal from the machine which dispenses no money but merely prints a receipt. The customer then takes the receipt to the sales clerk and then exchange it for cash.
  • 12. Contd..  Some ATM system provides the security that if you withdraw certain amount per day or you deposit, a prompt on the screen will ask you to enter your birthday and month to confirm your identity.  By ensuring that you are the real card holder it can reduce the risks of the frauds.  An additional security measure limits the total amount of the ATM withdrawal to some particular amount.  This aims to reduce the amount of fraud withdrawal.
  • 13. SECURITY FEATURE: To provide security, ATM systems follows three different mechanisms: Time-out Invalid card Stolen card • Time out: The customer may fail to enter the PIN within the allowed time limit then the card is returned. • Invalid card: The card is not recognized and is returned. • Stolen card: The card is recognized as a stolen card and is retained by the machine.
  • 14. DATABASE SECURITY:  The ATM keeps all the information about the user and the user’s account inside the centralized database. Inside the database all the information are stored in the form of tables(objects) which are more secure than the general file systems.  The database also provide locking mechanisms to maintain safety and security of data.
  • 15. NETWORK SECURITY: The ATM network system provides the following features:  Authentication: The user is the one it claims to be.  Confidentiality: Only authorized users can access the content of the data.  Integrity: The data is not to be altered by the third party during the transmission.
  • 16. Contd..  Non-repudiation(refuse to access): A user cant deny the fact that it has accessed a service or data. ADDITIONAL FEATURES:  Verifications of identity: Security system is able to establish and verify the claimed identity of any actor in an ATM network.  Protection of confidentiality: Stored and communicated data are confidential.
  • 17. Contd..  Strong accountability: The entity can’t deny the responsibility of its performed action as well as their effects.  Alarm reporting: The security system is able to generate alarm notification about certain selected security related events.  Audit: When violations of security happens the system is able to analyze the data relevant to security.
  • 18. Contd..  Security recovery: The security system is able to recover from successful or attempted failures of security.
  • 19. PRECAUTIONS TO TAKE:  Treat your ATM card like cash. Always keep your card in a safe place.  Keep your secret code as a secret. Don’t use date of birth, address, phone number as your PIN.  Take your receipt on every ATM transactions. Don’t leave it or near the ATM counter.  Report a lost or stolen card at once.  ATM user should seek out a machine that is located in a well-lighted area.