SlideShare a Scribd company logo
1 of 22
Presentation on
SECURITY FEATURES OF ATM
Prepared By :
ABOUT THE ATM:-
1. An ATM is an electronic device which allows a bank’s
customer to make cash withdrawals and check their
account balance at any time without the need for a
human teller.
2. Many ATMs also allow to deposit cash or cheques,
transfer money between their bank accounts .
3. The World’s first ATM was installed in ENFIELD
town in the London on June 27, 1967 by Barclays
bank .
PARTS OF THE ATM SYSTEM :-
1. Card reader
2. Keypad
3. Speaker
4. Display screen
5. Receipt printer
6. Cash dispenser
7. Deposit slot
8. Screen buttons
HOW ATM WORKS :-
1.The ATM is act as a data terminal. ATM has to connect
to or communicate through a host
computer .
2. The host computer in analogous to an Internet
service provider (ISP) .
3. The host computer is the gateway through which
all the various ATM network becomes available
to the user.
4. In ATM system customers authenticate
themselves by using a plastic card with a
magnetic stripe which is known as
“ATM CARD”.
5. The magnetic stripe encodes the customers
account number and a numeric password
which is known as PIN
(Personal Identification Number) .
6. The ATM prompts the user to insert the
card.
7. When the card is entered the customer
personal identification number (PIN) is
requested.
8. The customer inputs his or her PIN.
9. If the card is a valid card which can be
processed by the machine then control transfer
to next stages and prompts the user to either
transfer, deposit or withdrawal of cash.
10. If the number entered incorrectly several times
in a row most ATMs will retain the card as a
security precaution to prevent an unauthorized
users .
11. ATM reads and store customer’s data on a
smart card.
NETWORKING CONCEPT :-
1. Most ATMs are connected to authorization of
transaction by the card issuer or other authorizing
institution via the communication network.
2. Most host computers can support either leased-line
or dial-up machines.
3. Leased-line machines connect directly to the host
computer through a four-wire, point-to-point
dedicated telephone line.
4. Dial-up ATMs connect the host computer
through a normal phone line using a modem.
5. The host computer may be owned by a bank
or any financial institutions or it may be used by
an independent service provider.
HARDWARE AND SOFTWARE :-
1. ATM contain secure crypto-processors, generally
within an IBM PC compatible host computer in a
secure enclosure .
2. The security of the machine relies mostly on the
integrity of the secure crypto-processor.
3. A crypto-processor is a type of processor which
process encrypted datas.
4. ATMs typically connect directly to their ATM transaction
processor via a modem over a dedicated telephone line.
5. ATM machines runs with operating systems such as
Windows 2000 and Linux.
6. ATM transactions are usually encrypted with DES.
7. Most ATM are connected to inter-bank network.
GENERAL SECURITY:-
1.Modern ATM physical security concentrate on
denying the use of the money inside the machine to
a thief or a fraud using some fraud detection
techniques.
2.Another trend in ATM security is the fortified cash
dispenser is replaced with nothing more than a
paper-tape printer.
3.The customer request a withdrawal from the
machine which dispenses no money but merely
prints a receipt. The customer then takes the
receipt to a sales clerk and exchange it for cash.
4. Some ATM system provides the security that if
you withdraw certain amount per day or you
deposit ,a prompt on the screen will ask you
to enter your birthday and month to confirm
your identity.
5. By ensuring that you are the real card holder
it can reduce the risk of the frauds.
6. An additional security measure limits the total
amount of ATM withdrawal to some particular
amount.
7. This aims to reduce the amount of fraud
withdrawal.
REQUEST
PIN
VALIDATE
USER
SELECT
SERVICE
INCORRECT PIN
RE-ENTER PIN
INCORECT PIN
RETURN CARD
TIME OUT
RETURN CARD
INVALID CARD
RETURN CARD
STOLEN CARD
RETAIN CARD
CARD
PIN
CARD PRESENT
USER OK
ACC. NO.
S
E
C
U
R
I
T
Y
ACC NO
PIN
To provide security, ATM system follows three different
mechanism
1. Time out
2. Invalid card
3. Stolen card
Time out :-
The customer may fail to enter the PIN within the allowed
time limit then the card is returned.
Invalid card :-
The card is not recognized and it is returned .
Stolen card :-
The card is recognized as a stolen card and is retained by
the machine.
DATABASE SECURITY :
1. The ATM keeps all the information about the user
and user’s account inside the centralized
database. Inside the database all the
information are stored in the form of tables
(objects) which are more secured than the
general file systems.
2.The database also provide locking mechanisms
to maintain safety and security of data.
NETWORK SECURITY :
The ATM network system provides the
following features.
1. Authentication :
The user is the one it claims to be.
2. Confidentiality :
Only authorized users can access the content
of the data.
3. Integrity :
The data is not be altered by the third party
during the transmission.
4. Non-repudiation (refuse to access) :
A user can’t deny the fact that it has accessed
a service or data.
ADDITIONAL FEATURES :
1. Verifications of identity :
Security system is able to establish and
verify the claimed identity of any actor in an ATM
network.
2. Protection of confidentiality :
Stored and communicate datas are confidential.
3. Strong accountability :
The entity can’t deny the responsibility of its
performed action as well as their effects.
4. Alarm reporting :
The security system able to generate alarm
notification about certain selected security related
events.
5. Audit :
When violations of security happens the system
is able to analyze the data relevant to security.
6. Security recovery :
The security system is able to recover from
successful or attempted failures of security.
PRECAUTIONS TO TAKE :-
1.Treat your ATM card like cash. Always keep your
card in a safe place.
2. Keep your secret code as secret. Don’t use date
of birth, address ,phone number as your PIN.
3. Take your receipt on every ATM transaction.
Don’t leave it at or near the ATM counter.
4. Report a lost or stolen card at once.
5. ATM users should seek out a machine that is
located in a well-lighted area.
ANY QUESTIONS ?
THANK YOU.

More Related Content

Similar to 13362741.ppt

IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller MachineDiotima Gupta
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...IJSRED
 
ATM / Electronic Clearing Service
ATM / Electronic Clearing ServiceATM / Electronic Clearing Service
ATM / Electronic Clearing ServiceANANDHU BALAN
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
automated teller machine presentation with slides
automated teller machine presentation with slidesautomated teller machine presentation with slides
automated teller machine presentation with slidesayushkhunt2757
 
Online payment system
Online payment systemOnline payment system
Online payment systemmyangel27
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Networkdbpublications
 
Area of impact -banking and finance
Area of impact -banking and financeArea of impact -banking and finance
Area of impact -banking and financeJia
 

Similar to 13362741.ppt (20)

an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
Moneypad
MoneypadMoneypad
Moneypad
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
 
Electronic payment by ahmad
Electronic payment by ahmadElectronic payment by ahmad
Electronic payment by ahmad
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
 
What is ATM
What is ATMWhat is ATM
What is ATM
 
E commerce
E commerceE commerce
E commerce
 
ATM / Electronic Clearing Service
ATM / Electronic Clearing ServiceATM / Electronic Clearing Service
ATM / Electronic Clearing Service
 
ATM Banking
ATM BankingATM Banking
ATM Banking
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
automated teller machine presentation with slides
automated teller machine presentation with slidesautomated teller machine presentation with slides
automated teller machine presentation with slides
 
Atm Research
Atm Research Atm Research
Atm Research
 
Online payment system
Online payment systemOnline payment system
Online payment system
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
N044057478
N044057478N044057478
N044057478
 
Design.pptx
Design.pptxDesign.pptx
Design.pptx
 
Area of impact -banking and finance
Area of impact -banking and financeArea of impact -banking and finance
Area of impact -banking and finance
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 

Recently uploaded

Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 

Recently uploaded (20)

Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 

13362741.ppt

  • 1. Presentation on SECURITY FEATURES OF ATM Prepared By :
  • 2. ABOUT THE ATM:- 1. An ATM is an electronic device which allows a bank’s customer to make cash withdrawals and check their account balance at any time without the need for a human teller. 2. Many ATMs also allow to deposit cash or cheques, transfer money between their bank accounts . 3. The World’s first ATM was installed in ENFIELD town in the London on June 27, 1967 by Barclays bank .
  • 3. PARTS OF THE ATM SYSTEM :- 1. Card reader 2. Keypad 3. Speaker 4. Display screen 5. Receipt printer 6. Cash dispenser 7. Deposit slot 8. Screen buttons
  • 4. HOW ATM WORKS :- 1.The ATM is act as a data terminal. ATM has to connect to or communicate through a host computer . 2. The host computer in analogous to an Internet service provider (ISP) . 3. The host computer is the gateway through which all the various ATM network becomes available to the user.
  • 5. 4. In ATM system customers authenticate themselves by using a plastic card with a magnetic stripe which is known as “ATM CARD”. 5. The magnetic stripe encodes the customers account number and a numeric password which is known as PIN (Personal Identification Number) . 6. The ATM prompts the user to insert the card. 7. When the card is entered the customer personal identification number (PIN) is requested.
  • 6. 8. The customer inputs his or her PIN. 9. If the card is a valid card which can be processed by the machine then control transfer to next stages and prompts the user to either transfer, deposit or withdrawal of cash. 10. If the number entered incorrectly several times in a row most ATMs will retain the card as a security precaution to prevent an unauthorized users . 11. ATM reads and store customer’s data on a smart card.
  • 7. NETWORKING CONCEPT :- 1. Most ATMs are connected to authorization of transaction by the card issuer or other authorizing institution via the communication network. 2. Most host computers can support either leased-line or dial-up machines. 3. Leased-line machines connect directly to the host computer through a four-wire, point-to-point dedicated telephone line.
  • 8. 4. Dial-up ATMs connect the host computer through a normal phone line using a modem. 5. The host computer may be owned by a bank or any financial institutions or it may be used by an independent service provider.
  • 9. HARDWARE AND SOFTWARE :- 1. ATM contain secure crypto-processors, generally within an IBM PC compatible host computer in a secure enclosure . 2. The security of the machine relies mostly on the integrity of the secure crypto-processor. 3. A crypto-processor is a type of processor which process encrypted datas.
  • 10. 4. ATMs typically connect directly to their ATM transaction processor via a modem over a dedicated telephone line. 5. ATM machines runs with operating systems such as Windows 2000 and Linux. 6. ATM transactions are usually encrypted with DES. 7. Most ATM are connected to inter-bank network.
  • 11. GENERAL SECURITY:- 1.Modern ATM physical security concentrate on denying the use of the money inside the machine to a thief or a fraud using some fraud detection techniques. 2.Another trend in ATM security is the fortified cash dispenser is replaced with nothing more than a paper-tape printer. 3.The customer request a withdrawal from the machine which dispenses no money but merely prints a receipt. The customer then takes the receipt to a sales clerk and exchange it for cash.
  • 12. 4. Some ATM system provides the security that if you withdraw certain amount per day or you deposit ,a prompt on the screen will ask you to enter your birthday and month to confirm your identity. 5. By ensuring that you are the real card holder it can reduce the risk of the frauds. 6. An additional security measure limits the total amount of ATM withdrawal to some particular amount. 7. This aims to reduce the amount of fraud withdrawal.
  • 13. REQUEST PIN VALIDATE USER SELECT SERVICE INCORRECT PIN RE-ENTER PIN INCORECT PIN RETURN CARD TIME OUT RETURN CARD INVALID CARD RETURN CARD STOLEN CARD RETAIN CARD CARD PIN CARD PRESENT USER OK ACC. NO. S E C U R I T Y ACC NO PIN
  • 14. To provide security, ATM system follows three different mechanism 1. Time out 2. Invalid card 3. Stolen card Time out :- The customer may fail to enter the PIN within the allowed time limit then the card is returned. Invalid card :- The card is not recognized and it is returned . Stolen card :- The card is recognized as a stolen card and is retained by the machine.
  • 15. DATABASE SECURITY : 1. The ATM keeps all the information about the user and user’s account inside the centralized database. Inside the database all the information are stored in the form of tables (objects) which are more secured than the general file systems. 2.The database also provide locking mechanisms to maintain safety and security of data.
  • 16. NETWORK SECURITY : The ATM network system provides the following features. 1. Authentication : The user is the one it claims to be. 2. Confidentiality : Only authorized users can access the content of the data. 3. Integrity : The data is not be altered by the third party during the transmission.
  • 17. 4. Non-repudiation (refuse to access) : A user can’t deny the fact that it has accessed a service or data. ADDITIONAL FEATURES : 1. Verifications of identity : Security system is able to establish and verify the claimed identity of any actor in an ATM network. 2. Protection of confidentiality : Stored and communicate datas are confidential.
  • 18. 3. Strong accountability : The entity can’t deny the responsibility of its performed action as well as their effects. 4. Alarm reporting : The security system able to generate alarm notification about certain selected security related events. 5. Audit : When violations of security happens the system is able to analyze the data relevant to security.
  • 19. 6. Security recovery : The security system is able to recover from successful or attempted failures of security.
  • 20. PRECAUTIONS TO TAKE :- 1.Treat your ATM card like cash. Always keep your card in a safe place. 2. Keep your secret code as secret. Don’t use date of birth, address ,phone number as your PIN. 3. Take your receipt on every ATM transaction. Don’t leave it at or near the ATM counter. 4. Report a lost or stolen card at once. 5. ATM users should seek out a machine that is located in a well-lighted area.