SlideShare una empresa de Scribd logo
1 de 20
A PRESENTATION ON
the SECURITY
FEATURE OF ATM
ABOUT THE ATM (automated
teller machine)
 An ATM is an electronic device which allows a
bank’s customer to make cash withdrawals
and check their account balance at any time
without the need for a human teller.
 Many ATMs also allow to deposit cash or
checques, and to transfer money between
their bank accounts.
PARTS OF THE ATM SYSTEM:
1. Card Reader
2. Keypad
3. Speaker
4. Display Screen
5. Receipt Printer
6. Cash dispenser
7. Deposit slot
8. Screen buttons
HOW ATM WORKS:
 The ATM acts as a data terminal. ATM has
to connect to or communicate through a host
computer.
 The host computer is analogous to an
Internet Service Provider(ISP).
 The host computer is the gateway through
which all the various ATMs become available
Contd..
 In an ATM system customers authenticate
themselves by using a plastic card with a
magnetic stripe which is known as “ATM CARD”.
 The magnetic stripe encodes the customers
account number and a numeric password which is
known as “PIN” (Personal Identification Number).
 The ATM prompts the user to insert the card.
 When the card is entered the customer’s PIN is
requested.
Contd..
 The customer inputs his or her PIN.
 If the card is a valid card which can be processed by
the machine then it prompts the user to either
transfer, deposit or withdraw cash.
 If the number is entered incorrectly several times in
a row most ATMs will retain the card as a security
precaution to prevent an unauthorized user.
 ATM needs and stores customer’s data on a smart
card.
NETWORKING CONCEPT:
 ATMs rely on authorization of a
financial transaction by the card issuer or
other authorizing institution
via the communications network.
 Most host computers can support either
leased-line or dial-up machines.
 Leased-line machines connect directly to the
host computer through a four-wire, point-to-
point dedicated telephone line.
Contd..
 Dial-up ATMs connect the host computer
through a normal phone line using a modem.
 The host computer may be owned by a bank
or any financial institutions or it may be used
by an independent service provider.
Hardware and Software:
 An ATM contains secure crypto-
processors, generally within an IBM PC
compatible host computer in a secure
enclosure.
 The security of the machine relies mostly on
the integrity of the secure crypto-processor.
 A crypto-processor is a type of processor
which processes encrypted data.
Contd..
 ATM typically connects directly to their ATM
transaction processor via a modem over a
dedicated telephone line.
 ATM machines runs with operating systems
such as Windows 2000 and Linux.
 ATM transactions are usually encrypted with
DES.
 Most ATM are connected to inter-bank
network.
GENERAL SECURITY:
 Modern ATM’s physical security concentrate on
denying the use of the money inside the machine
to a thief or a fraud using some fraud detection
techniques.
 Another trend in ATM security is the fortified
cash dispenser which is replaced with nothing
more than a paper-tape printer.
 The customer requests a withdrawal from the
machine which dispenses no money but merely
prints a receipt. The customer then takes the
receipt to the sales clerk and then exchange it
for cash.
Contd..
 Some ATM system provides the security that if
you withdraw certain amount per day or you
deposit, a prompt on the screen will ask you to
enter your birthday and month to confirm your
identity.
 By ensuring that you are the real card holder it
can reduce the risks of the frauds.
 An additional security measure limits the total
amount of the ATM withdrawal to some
particular amount.
 This aims to reduce the amount of fraud
withdrawal.
SECURITY FEATURE:
To provide security, ATM systems follows three
different mechanisms:
Time-out
Invalid card
Stolen card
• Time out: The customer may fail to enter the PIN
within the allowed time limit then the card is
returned.
• Invalid card: The card is not recognized and is
returned.
• Stolen card: The card is recognized as a stolen
card and is retained by the machine.
DATABASE SECURITY:
 The ATM keeps all the information about the
user and the user’s account inside the
centralized database. Inside the database all
the information are stored in the form of
tables(objects) which are more secure than
the general file systems.
 The database also provide locking mechanisms
to maintain safety and security of data.
NETWORK SECURITY:
The ATM network system provides the following
features:
 Authentication: The user is the one it claims to
be.
 Confidentiality: Only authorized users can access
the content of the data.
 Integrity: The data is not to be altered by the
third party during the transmission.
Contd..
 Non-repudiation(refuse to access): A user
cant deny the fact that it has accessed a
service or data.
ADDITIONAL FEATURES:
 Verifications of identity: Security system is
able to establish and verify the claimed
identity of any actor in an ATM network.
 Protection of confidentiality: Stored and
communicated data are confidential.
Contd..
 Strong accountability: The entity can’t deny
the responsibility of its performed action as
well as their effects.
 Alarm reporting: The security system is able
to generate alarm notification about certain
selected security related events.
 Audit: When violations of security happens
the system is able to analyze the data
relevant to security.
Contd..
 Security recovery:
The security system is able to recover from
successful or attempted failures of security.
PRECAUTIONS TO TAKE:
 Treat your ATM card like cash. Always keep
your card in a safe place.
 Keep your secret code as a secret. Don’t use
date of birth, address, phone number as your
PIN.
 Take your receipt on every ATM transactions.
Don’t leave it or near the ATM counter.
 Report a lost or stolen card at once.
 ATM user should seek out a machine that is
located in a well-lighted area.
THANK YOU

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
Smart Card Presentation
Smart Card Presentation Smart Card Presentation
Smart Card Presentation
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Atm System
Atm SystemAtm System
Atm System
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Bank locker system
Bank locker systemBank locker system
Bank locker system
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Password based door locking system
Password based door locking systemPassword based door locking system
Password based door locking system
 
Smart card
Smart cardSmart card
Smart card
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Atm (bm)
Atm (bm)Atm (bm)
Atm (bm)
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
Smart cards
Smart cards Smart cards
Smart cards
 
Electronic payment system for e-commerce
Electronic payment system for e-commerceElectronic payment system for e-commerce
Electronic payment system for e-commerce
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 

Destacado

automated teller machines
automated teller  machinesautomated teller  machines
automated teller machinestejinderubs
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atmargoncillo
 
10 Slides to ATM
10 Slides to ATM10 Slides to ATM
10 Slides to ATMseanraz
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and SolutionsClarice_Wilson
 
A T M (Automated Teller Machine)
A T M (Automated Teller Machine)A T M (Automated Teller Machine)
A T M (Automated Teller Machine)Networking
 
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTUREATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURERadhika Venkat
 
Communication in automatic teller machine (atm)
Communication in automatic teller machine (atm)Communication in automatic teller machine (atm)
Communication in automatic teller machine (atm)Ruksin Sangrugee
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking ConceptTushar Ranjan
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyAlfred Oboi
 
Seminar on atm
Seminar on atmSeminar on atm
Seminar on atmkhurda
 
How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.worldstuff
 
ATM System Description and functional and non- functional Requirements
ATM System Description and functional and non- functional RequirementsATM System Description and functional and non- functional Requirements
ATM System Description and functional and non- functional Requirementswajahat Gul
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMAlpesh Kurhade
 
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
ATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGYATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGY
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGYJOLLUSUDARSHANREDDY
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognitionmahesh123slideshre
 
Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)Agreeta Sharma
 

Destacado (20)

automated teller machines
automated teller  machinesautomated teller  machines
automated teller machines
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
10 Slides to ATM
10 Slides to ATM10 Slides to ATM
10 Slides to ATM
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
A T M (Automated Teller Machine)
A T M (Automated Teller Machine)A T M (Automated Teller Machine)
A T M (Automated Teller Machine)
 
ATM Banking
ATM BankingATM Banking
ATM Banking
 
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTUREATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
 
Communication in automatic teller machine (atm)
Communication in automatic teller machine (atm)Communication in automatic teller machine (atm)
Communication in automatic teller machine (atm)
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking Concept
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Seminar on atm
Seminar on atmSeminar on atm
Seminar on atm
 
How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.
 
ATM BANKING
ATM BANKINGATM BANKING
ATM BANKING
 
ATM System Description and functional and non- functional Requirements
ATM System Description and functional and non- functional RequirementsATM System Description and functional and non- functional Requirements
ATM System Description and functional and non- functional Requirements
 
Security
SecuritySecurity
Security
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
ATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGYATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGY
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)
 

Similar a Presentation on security feature of atm (2)

IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
Area of impact -banking and finance
Area of impact -banking and financeArea of impact -banking and finance
Area of impact -banking and financeJia
 
Automated teller machine
Automated teller machineAutomated teller machine
Automated teller machineVidya Sagar
 
Concepts of Digital Banking
Concepts of Digital BankingConcepts of Digital Banking
Concepts of Digital BankingAbinayaS31
 
Payment Gateway
Payment GatewayPayment Gateway
Payment GatewayShujaShah
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)amanjit9306
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMIRJET Journal
 

Similar a Presentation on security feature of atm (2) (20)

13362741.ppt
13362741.ppt13362741.ppt
13362741.ppt
 
What is ATM
What is ATMWhat is ATM
What is ATM
 
13828523.ppt
13828523.ppt13828523.ppt
13828523.ppt
 
ATM Security
ATM SecurityATM Security
ATM Security
 
Electronic payment by ahmad
Electronic payment by ahmadElectronic payment by ahmad
Electronic payment by ahmad
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
Area of impact -banking and finance
Area of impact -banking and financeArea of impact -banking and finance
Area of impact -banking and finance
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
Automated teller machine
Automated teller machineAutomated teller machine
Automated teller machine
 
Atm transaction
Atm transactionAtm transaction
Atm transaction
 
E010313141
E010313141E010313141
E010313141
 
Concepts of Digital Banking
Concepts of Digital BankingConcepts of Digital Banking
Concepts of Digital Banking
 
Atm machine
Atm machineAtm machine
Atm machine
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
Moneypad
MoneypadMoneypad
Moneypad
 
ATM .pptx
ATM .pptxATM .pptx
ATM .pptx
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 

Más de Siya Agarwal

Whats digital marketing
Whats digital marketingWhats digital marketing
Whats digital marketingSiya Agarwal
 
amrapali la residentia
amrapali la residentiaamrapali la residentia
amrapali la residentiaSiya Agarwal
 
Solar home lighting system
Solar home lighting systemSolar home lighting system
Solar home lighting systemSiya Agarwal
 
Solar charge controller
Solar charge controllerSolar charge controller
Solar charge controllerSiya Agarwal
 
Presentation on venturi
Presentation on venturiPresentation on venturi
Presentation on venturiSiya Agarwal
 
Presentation on sparkler filter bag
Presentation on sparkler filter bagPresentation on sparkler filter bag
Presentation on sparkler filter bagSiya Agarwal
 
Presentation on screening mesh
Presentation on screening meshPresentation on screening mesh
Presentation on screening meshSiya Agarwal
 
Presentation on reverse air type filter bag
Presentation on reverse air type filter bagPresentation on reverse air type filter bag
Presentation on reverse air type filter bagSiya Agarwal
 
Presentation on pulveriser sleeve
Presentation on pulveriser sleevePresentation on pulveriser sleeve
Presentation on pulveriser sleeveSiya Agarwal
 
Presentation on pp cartridge housing filter
Presentation on pp cartridge housing filterPresentation on pp cartridge housing filter
Presentation on pp cartridge housing filterSiya Agarwal
 
Presentation on nutsche filter bag
Presentation on nutsche filter bagPresentation on nutsche filter bag
Presentation on nutsche filter bagSiya Agarwal
 
Presentation on geotextile
Presentation on geotextilePresentation on geotextile
Presentation on geotextileSiya Agarwal
 
Presentation on fine bubble diffuser
Presentation on fine bubble diffuserPresentation on fine bubble diffuser
Presentation on fine bubble diffuserSiya Agarwal
 
Presentation on FBD filter bags
Presentation on FBD filter bagsPresentation on FBD filter bags
Presentation on FBD filter bagsSiya Agarwal
 
Presentation on candle filter bag
Presentation on candle filter bagPresentation on candle filter bag
Presentation on candle filter bagSiya Agarwal
 
Presentation on waste water diffuser
Presentation on waste water diffuserPresentation on waste water diffuser
Presentation on waste water diffuserSiya Agarwal
 
Presentation on support cages
Presentation on support cagesPresentation on support cages
Presentation on support cagesSiya Agarwal
 

Más de Siya Agarwal (20)

Whats digital marketing
Whats digital marketingWhats digital marketing
Whats digital marketing
 
amrapali la residentia
amrapali la residentiaamrapali la residentia
amrapali la residentia
 
Anode filter bags
Anode filter bagsAnode filter bags
Anode filter bags
 
Pmp west delhi
Pmp west delhiPmp west delhi
Pmp west delhi
 
Solar home lighting system
Solar home lighting systemSolar home lighting system
Solar home lighting system
 
Solar off grid
Solar off gridSolar off grid
Solar off grid
 
Solar charge controller
Solar charge controllerSolar charge controller
Solar charge controller
 
Presentation on venturi
Presentation on venturiPresentation on venturi
Presentation on venturi
 
Presentation on sparkler filter bag
Presentation on sparkler filter bagPresentation on sparkler filter bag
Presentation on sparkler filter bag
 
Presentation on screening mesh
Presentation on screening meshPresentation on screening mesh
Presentation on screening mesh
 
Presentation on reverse air type filter bag
Presentation on reverse air type filter bagPresentation on reverse air type filter bag
Presentation on reverse air type filter bag
 
Presentation on pulveriser sleeve
Presentation on pulveriser sleevePresentation on pulveriser sleeve
Presentation on pulveriser sleeve
 
Presentation on pp cartridge housing filter
Presentation on pp cartridge housing filterPresentation on pp cartridge housing filter
Presentation on pp cartridge housing filter
 
Presentation on nutsche filter bag
Presentation on nutsche filter bagPresentation on nutsche filter bag
Presentation on nutsche filter bag
 
Presentation on geotextile
Presentation on geotextilePresentation on geotextile
Presentation on geotextile
 
Presentation on fine bubble diffuser
Presentation on fine bubble diffuserPresentation on fine bubble diffuser
Presentation on fine bubble diffuser
 
Presentation on FBD filter bags
Presentation on FBD filter bagsPresentation on FBD filter bags
Presentation on FBD filter bags
 
Presentation on candle filter bag
Presentation on candle filter bagPresentation on candle filter bag
Presentation on candle filter bag
 
Presentation on waste water diffuser
Presentation on waste water diffuserPresentation on waste water diffuser
Presentation on waste water diffuser
 
Presentation on support cages
Presentation on support cagesPresentation on support cages
Presentation on support cages
 

Último

Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 

Último (20)

Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 

Presentation on security feature of atm (2)

  • 1. A PRESENTATION ON the SECURITY FEATURE OF ATM
  • 2. ABOUT THE ATM (automated teller machine)  An ATM is an electronic device which allows a bank’s customer to make cash withdrawals and check their account balance at any time without the need for a human teller.  Many ATMs also allow to deposit cash or checques, and to transfer money between their bank accounts.
  • 3. PARTS OF THE ATM SYSTEM: 1. Card Reader 2. Keypad 3. Speaker 4. Display Screen 5. Receipt Printer 6. Cash dispenser 7. Deposit slot 8. Screen buttons
  • 4. HOW ATM WORKS:  The ATM acts as a data terminal. ATM has to connect to or communicate through a host computer.  The host computer is analogous to an Internet Service Provider(ISP).  The host computer is the gateway through which all the various ATMs become available
  • 5. Contd..  In an ATM system customers authenticate themselves by using a plastic card with a magnetic stripe which is known as “ATM CARD”.  The magnetic stripe encodes the customers account number and a numeric password which is known as “PIN” (Personal Identification Number).  The ATM prompts the user to insert the card.  When the card is entered the customer’s PIN is requested.
  • 6. Contd..  The customer inputs his or her PIN.  If the card is a valid card which can be processed by the machine then it prompts the user to either transfer, deposit or withdraw cash.  If the number is entered incorrectly several times in a row most ATMs will retain the card as a security precaution to prevent an unauthorized user.  ATM needs and stores customer’s data on a smart card.
  • 7. NETWORKING CONCEPT:  ATMs rely on authorization of a financial transaction by the card issuer or other authorizing institution via the communications network.  Most host computers can support either leased-line or dial-up machines.  Leased-line machines connect directly to the host computer through a four-wire, point-to- point dedicated telephone line.
  • 8. Contd..  Dial-up ATMs connect the host computer through a normal phone line using a modem.  The host computer may be owned by a bank or any financial institutions or it may be used by an independent service provider.
  • 9. Hardware and Software:  An ATM contains secure crypto- processors, generally within an IBM PC compatible host computer in a secure enclosure.  The security of the machine relies mostly on the integrity of the secure crypto-processor.  A crypto-processor is a type of processor which processes encrypted data.
  • 10. Contd..  ATM typically connects directly to their ATM transaction processor via a modem over a dedicated telephone line.  ATM machines runs with operating systems such as Windows 2000 and Linux.  ATM transactions are usually encrypted with DES.  Most ATM are connected to inter-bank network.
  • 11. GENERAL SECURITY:  Modern ATM’s physical security concentrate on denying the use of the money inside the machine to a thief or a fraud using some fraud detection techniques.  Another trend in ATM security is the fortified cash dispenser which is replaced with nothing more than a paper-tape printer.  The customer requests a withdrawal from the machine which dispenses no money but merely prints a receipt. The customer then takes the receipt to the sales clerk and then exchange it for cash.
  • 12. Contd..  Some ATM system provides the security that if you withdraw certain amount per day or you deposit, a prompt on the screen will ask you to enter your birthday and month to confirm your identity.  By ensuring that you are the real card holder it can reduce the risks of the frauds.  An additional security measure limits the total amount of the ATM withdrawal to some particular amount.  This aims to reduce the amount of fraud withdrawal.
  • 13. SECURITY FEATURE: To provide security, ATM systems follows three different mechanisms: Time-out Invalid card Stolen card • Time out: The customer may fail to enter the PIN within the allowed time limit then the card is returned. • Invalid card: The card is not recognized and is returned. • Stolen card: The card is recognized as a stolen card and is retained by the machine.
  • 14. DATABASE SECURITY:  The ATM keeps all the information about the user and the user’s account inside the centralized database. Inside the database all the information are stored in the form of tables(objects) which are more secure than the general file systems.  The database also provide locking mechanisms to maintain safety and security of data.
  • 15. NETWORK SECURITY: The ATM network system provides the following features:  Authentication: The user is the one it claims to be.  Confidentiality: Only authorized users can access the content of the data.  Integrity: The data is not to be altered by the third party during the transmission.
  • 16. Contd..  Non-repudiation(refuse to access): A user cant deny the fact that it has accessed a service or data. ADDITIONAL FEATURES:  Verifications of identity: Security system is able to establish and verify the claimed identity of any actor in an ATM network.  Protection of confidentiality: Stored and communicated data are confidential.
  • 17. Contd..  Strong accountability: The entity can’t deny the responsibility of its performed action as well as their effects.  Alarm reporting: The security system is able to generate alarm notification about certain selected security related events.  Audit: When violations of security happens the system is able to analyze the data relevant to security.
  • 18. Contd..  Security recovery: The security system is able to recover from successful or attempted failures of security.
  • 19. PRECAUTIONS TO TAKE:  Treat your ATM card like cash. Always keep your card in a safe place.  Keep your secret code as a secret. Don’t use date of birth, address, phone number as your PIN.  Take your receipt on every ATM transactions. Don’t leave it or near the ATM counter.  Report a lost or stolen card at once.  ATM user should seek out a machine that is located in a well-lighted area.