SlideShare a Scribd company logo
Presentation on   SECURITY FEATURES OF ATM
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HOW ATM WORKS  :- 1.The ATM is act as a data terminal. ATM has to connect to or communicate through a host  computer .  2. The host computer in analogous to an Internet service provider (ISP) . 3. The host computer is the gateway through which all the various ATM network becomes available  to the user.
4. In ATM system customers authenticate themselves by using a plastic card with a magnetic stripe which is known as  “ ATM  CARD”. 5. The magnetic stripe encodes the customers  account number and a  numeric password which is known as PIN (Personal  Identification Number) . 6. The ATM  prompts the user to insert the card. 7.  When the card is entered the customer  personal identification number (PIN) is requested.
8.  The customer inputs his or her PIN. 9.  If the card is a valid  card  which can  be  processed by the machine then control transfer to next stages and prompts the user to either transfer, deposit or withdrawal of cash.  10.  If the number entered incorrectly several times in a row most ATMs will retain the card as a security precaution  to  prevent an unauthorized users . 11.  ATM reads and store customer’s data on a smart card.
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
HARDWARE  AND SOFTWARE  :- 1. ATM  contain secure crypto-processors, generally within an IBM PC  compatible  host computer in a secure enclosure . 2.  The security of the machine relies mostly on the integrity  of the secure crypto-processor. 3.  A crypto-processor is a type of processor which process encrypted  datas.
[object Object],[object Object],[object Object],[object Object]
GENERAL SECURITY :- ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CARD PIN CARD PRESENT USER OK ACC. NO. S  E  C  U  R  I T  Y  ACC NO PIN REQUEST PIN VALIDATE USER SELECT SERVICE INCORRECT PIN RE-ENTER PIN INCORECT PIN RETURN CARD TIME OUT RETURN CARD INVALID CARD RETURN CARD STOLEN CARD RETAIN CARD
To provide security, ATM system follows three different mechanism 1. Time out 2. Invalid card 3.  Stolen card Time out   :- The customer may fail to enter the PIN within the allowed time limit then the card is returned. Invalid card   :-  The card is not recognized  and it is returned . Stolen card  :- The card is recognized as a stolen card and is retained by the machine.
DATABASE SECURITY   : 1. The ATM keeps all the information about the user and user’s account inside the centralized  database. Inside  the database all the  information are stored in the form of tables  (objects) which are more secured than the general file systems. 2.The database also provide locking mechanisms to maintain safety and security of  data.
NETWORK SECURITY   : The ATM network system  provides the  following features. 1. Authentication : The user is the one it claims to be. 2. Confidentiality : Only authorized users can access the content  of the data. 3. Integrity : The data is not be altered by the third party during the transmission.
4. Non-repudiation (refuse to access) : A user can’t deny the fact that it has accessed a service or data. ADDITIONAL FEATURES  : 1. Verifications of identity : Security system is able to establish and verify the claimed identity of any actor in an ATM network. 2.  Protection of confidentiality : Stored and communicate datas are confidential.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
6. Security recovery : The security system is able to recover from successful or attempted failures of security.
PRECAUTIONS TO TAKE  :- 1.Treat your ATM card like cash. Always keep your card in a safe place. 2. Keep your secret code as secret. Don’t use date of birth, address ,phone number as your PIN. 3. Take your receipt on every ATM transaction. Don’t leave it  at or near the ATM counter. 4. Report a lost or stolen card at once. 5. ATM users should seek  out a machine that is  located in a well-lighted area.
ANY QUESTIONS ?
THANK YOU.

More Related Content

What's hot

ATM with an EYE
ATM with an EYEATM with an EYE
ATM with an EYE
Chaitanya Ram
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
akansha bhatnagar
 
Human Area Networking Technology
Human Area Networking TechnologyHuman Area Networking Technology
Human Area Networking Technology
Vinayak Hegde
 
Money pad future wallet
Money pad future walletMoney pad future wallet
Money pad future wallet
Abbas Ambawala
 
I twin technology
I twin technologyI twin technology
I twin technology
Chandra Mohan AD
 
Touchless touch screen
Touchless touch screenTouchless touch screen
Touchless touch screen
Lovely Professional University
 
Silent sound-technology ppt final
Silent sound-technology ppt finalSilent sound-technology ppt final
Silent sound-technology ppt final
Lohit Dalal
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future walletLeelakh Sachdeva
 
Moneypad- The future wallet
Moneypad- The future walletMoneypad- The future wallet
Moneypad- The future walletMokshada Birari
 
An eye with an atm
An eye with an atmAn eye with an atm
An eye with an atm
Suraksha Sanghavi
 
Smart card
Smart cardSmart card
Smart card
Santosh Khadsare
 
Smart Card Presentation
Smart Card Presentation Smart Card Presentation
Smart Card Presentation
ppriteshs
 
money pad the future wallet
money pad the future walletmoney pad the future wallet
money pad the future walletSabin Tripathi
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
sravya raju
 
Fog computing
Fog computingFog computing
Fog computing
Mahantesh Hiremath
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
preeti tripathi
 
Brain chips ppt
Brain chips pptBrain chips ppt
Brain chips ppt
Mohammed Rizwan S
 
Smart digital door locking system
Smart digital door locking systemSmart digital door locking system
Smart digital door locking system
VISHAL NAGAR
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
mahesh123slideshre
 

What's hot (20)

ATM with an EYE
ATM with an EYEATM with an EYE
ATM with an EYE
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
Human Area Networking Technology
Human Area Networking TechnologyHuman Area Networking Technology
Human Area Networking Technology
 
Money pad future wallet
Money pad future walletMoney pad future wallet
Money pad future wallet
 
I twin technology
I twin technologyI twin technology
I twin technology
 
Touchless touch screen
Touchless touch screenTouchless touch screen
Touchless touch screen
 
Silent sound-technology ppt final
Silent sound-technology ppt finalSilent sound-technology ppt final
Silent sound-technology ppt final
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
 
Moneypad- The future wallet
Moneypad- The future walletMoneypad- The future wallet
Moneypad- The future wallet
 
An eye with an atm
An eye with an atmAn eye with an atm
An eye with an atm
 
Smart card
Smart cardSmart card
Smart card
 
Smart Card Presentation
Smart Card Presentation Smart Card Presentation
Smart Card Presentation
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
money pad the future wallet
money pad the future walletmoney pad the future wallet
money pad the future wallet
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Fog computing
Fog computingFog computing
Fog computing
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Brain chips ppt
Brain chips pptBrain chips ppt
Brain chips ppt
 
Smart digital door locking system
Smart digital door locking systemSmart digital door locking system
Smart digital door locking system
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 

Viewers also liked

automated teller machines
automated teller  machinesautomated teller  machines
automated teller machinestejinderubs
 
Ppt on atm machine
Ppt on atm machinePpt on atm machine
Ppt on atm machine
Prabhat Singh
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atmargoncillo
 
10 Slides to ATM
10 Slides to ATM10 Slides to ATM
10 Slides to ATM
seanraz
 
Atm System
Atm SystemAtm System
Atm System
Nila Kamal Nayak
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
Clarice_Wilson
 
Security
SecuritySecurity
Security
AyushiGupta3123
 
ATM Banking
ATM BankingATM Banking
ATM Banking
Arnav Sameer
 
A T M (Automated Teller Machine)
A T M (Automated Teller Machine)A T M (Automated Teller Machine)
A T M (Automated Teller Machine)
Networking
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller MachineDiotima Gupta
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
Alfred Oboi
 
How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.
worldstuff
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
Alpesh Kurhade
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet Banking
Chiheb Chebbi
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking Concept
Tushar Ranjan
 
Seminar on atm
Seminar on atmSeminar on atm
Seminar on atm
khurda
 
E banking security
E banking securityE banking security
E banking security
Iman Rahmanian
 

Viewers also liked (20)

automated teller machines
automated teller  machinesautomated teller  machines
automated teller machines
 
Ppt on atm machine
Ppt on atm machinePpt on atm machine
Ppt on atm machine
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
Atm (bm)
Atm (bm)Atm (bm)
Atm (bm)
 
10 Slides to ATM
10 Slides to ATM10 Slides to ATM
10 Slides to ATM
 
Atm System
Atm SystemAtm System
Atm System
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
Security
SecuritySecurity
Security
 
ATM Banking
ATM BankingATM Banking
ATM Banking
 
A T M (Automated Teller Machine)
A T M (Automated Teller Machine)A T M (Automated Teller Machine)
A T M (Automated Teller Machine)
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 
Vehicle security system final report
Vehicle security system final reportVehicle security system final report
Vehicle security system final report
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet Banking
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking Concept
 
Seminar on atm
Seminar on atmSeminar on atm
Seminar on atm
 
E banking security
E banking securityE banking security
E banking security
 

Similar to Atm security

13362741.ppt
13362741.ppt13362741.ppt
13362741.ppt
Prashantmittal33
 
Presentationonsecurityfeatureofatm2 130621034116-phpapp02
Presentationonsecurityfeatureofatm2 130621034116-phpapp02Presentationonsecurityfeatureofatm2 130621034116-phpapp02
Presentationonsecurityfeatureofatm2 130621034116-phpapp02
Divyaprathapraju Divyaprathapraju
 
ATM Security
ATM SecurityATM Security
ATM Security
Roushan Jha
 
Moneypad
MoneypadMoneypad
Moneypad
ankur bhalla
 
E010313141
E010313141E010313141
E010313141
IOSR Journals
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
IRJET Journal
 
Presentation On ATM Technology
Presentation On ATM TechnologyPresentation On ATM Technology
Presentation On ATM Technology
VINOD KUMAR RAMKUMAR
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
KanchanRaut13
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)amanjit9306
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
IJSRED
 
Electronic payment by ahmad
Electronic payment by ahmadElectronic payment by ahmad
Electronic payment by ahmad
Mohd. Ahmad Siddiqi
 
N044057478
N044057478N044057478
N044057478
IJERA Editor
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
dbpublications
 
Atm Research
Atm Research Atm Research
Atm Research
محمود فرغلي
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological Innovation
Eldad Lieberman
 
Area of impact -banking and finance
Area of impact -banking and financeArea of impact -banking and finance
Area of impact -banking and finance
Jia
 
Blink tech.
Blink tech.Blink tech.
Blink tech.
Srikant Mohanty
 

Similar to Atm security (20)

13362741.ppt
13362741.ppt13362741.ppt
13362741.ppt
 
Presentationonsecurityfeatureofatm2 130621034116-phpapp02
Presentationonsecurityfeatureofatm2 130621034116-phpapp02Presentationonsecurityfeatureofatm2 130621034116-phpapp02
Presentationonsecurityfeatureofatm2 130621034116-phpapp02
 
ATM Security
ATM SecurityATM Security
ATM Security
 
Moneypad
MoneypadMoneypad
Moneypad
 
Atm transaction
Atm transactionAtm transaction
Atm transaction
 
E010313141
E010313141E010313141
E010313141
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
Presentation On ATM Technology
Presentation On ATM TechnologyPresentation On ATM Technology
Presentation On ATM Technology
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
What is ATM
What is ATMWhat is ATM
What is ATM
 
Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
 
Electronic payment by ahmad
Electronic payment by ahmadElectronic payment by ahmad
Electronic payment by ahmad
 
N044057478
N044057478N044057478
N044057478
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
Atm Research
Atm Research Atm Research
Atm Research
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological Innovation
 
Area of impact -banking and finance
Area of impact -banking and financeArea of impact -banking and finance
Area of impact -banking and finance
 
Blink tech.
Blink tech.Blink tech.
Blink tech.
 

More from Likan Patra

Sewn Product Machinary & Equipments
Sewn Product Machinary & EquipmentsSewn Product Machinary & Equipments
Sewn Product Machinary & Equipments
Likan Patra
 
SMArt Contest- Smart Quiz Questions
SMArt Contest- Smart Quiz QuestionsSMArt Contest- Smart Quiz Questions
SMArt Contest- Smart Quiz Questions
Likan Patra
 
RC Shri Jagannath Dham- Club Activity Report 2014-15
RC Shri Jagannath Dham- Club Activity Report 2014-15RC Shri Jagannath Dham- Club Activity Report 2014-15
RC Shri Jagannath Dham- Club Activity Report 2014-15
Likan Patra
 
Quiz about Google and its Products
Quiz about Google and its ProductsQuiz about Google and its Products
Quiz about Google and its Products
Likan Patra
 
e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)
e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)
e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)
Likan Patra
 
Everything you want to know about Liquid Lenses
Everything you want to know about Liquid LensesEverything you want to know about Liquid Lenses
Everything you want to know about Liquid Lenses
Likan Patra
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
Likan Patra
 
What is Optical fiber ?
What is Optical fiber ?What is Optical fiber ?
What is Optical fiber ?
Likan Patra
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
Likan Patra
 
Holographic Data Storage
Holographic Data StorageHolographic Data Storage
Holographic Data Storage
Likan Patra
 
A Technical Seminar on OSI model
A Technical Seminar on OSI modelA Technical Seminar on OSI model
A Technical Seminar on OSI model
Likan Patra
 
Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?
Likan Patra
 
Computer Tomography (CT Scan)
Computer Tomography (CT Scan)Computer Tomography (CT Scan)
Computer Tomography (CT Scan)
Likan Patra
 
Akshaya patra foundation - In Depth
Akshaya patra foundation - In DepthAkshaya patra foundation - In Depth
Akshaya patra foundation - In Depth
Likan Patra
 
So, He got a JOB through LinkedIn
So, He got a JOB through LinkedInSo, He got a JOB through LinkedIn
So, He got a JOB through LinkedIn
Likan Patra
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)
Likan Patra
 
Blue ray disc seminar representation
Blue ray disc seminar representationBlue ray disc seminar representation
Blue ray disc seminar representationLikan Patra
 
Brain finger printing
Brain finger printingBrain finger printing
Brain finger printingLikan Patra
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarkingLikan Patra
 

More from Likan Patra (20)

Sewn Product Machinary & Equipments
Sewn Product Machinary & EquipmentsSewn Product Machinary & Equipments
Sewn Product Machinary & Equipments
 
SMArt Contest- Smart Quiz Questions
SMArt Contest- Smart Quiz QuestionsSMArt Contest- Smart Quiz Questions
SMArt Contest- Smart Quiz Questions
 
RC Shri Jagannath Dham- Club Activity Report 2014-15
RC Shri Jagannath Dham- Club Activity Report 2014-15RC Shri Jagannath Dham- Club Activity Report 2014-15
RC Shri Jagannath Dham- Club Activity Report 2014-15
 
Quiz about Google and its Products
Quiz about Google and its ProductsQuiz about Google and its Products
Quiz about Google and its Products
 
e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)
e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)
e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)
 
Everything you want to know about Liquid Lenses
Everything you want to know about Liquid LensesEverything you want to know about Liquid Lenses
Everything you want to know about Liquid Lenses
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
What is Optical fiber ?
What is Optical fiber ?What is Optical fiber ?
What is Optical fiber ?
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
 
Holographic Data Storage
Holographic Data StorageHolographic Data Storage
Holographic Data Storage
 
A Technical Seminar on OSI model
A Technical Seminar on OSI modelA Technical Seminar on OSI model
A Technical Seminar on OSI model
 
Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?
 
Computer Tomography (CT Scan)
Computer Tomography (CT Scan)Computer Tomography (CT Scan)
Computer Tomography (CT Scan)
 
Akshaya patra foundation - In Depth
Akshaya patra foundation - In DepthAkshaya patra foundation - In Depth
Akshaya patra foundation - In Depth
 
So, He got a JOB through LinkedIn
So, He got a JOB through LinkedInSo, He got a JOB through LinkedIn
So, He got a JOB through LinkedIn
 
4g technology
4g technology4g technology
4g technology
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)
 
Blue ray disc seminar representation
Blue ray disc seminar representationBlue ray disc seminar representation
Blue ray disc seminar representation
 
Brain finger printing
Brain finger printingBrain finger printing
Brain finger printing
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarking
 

Recently uploaded

Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop.com LTD
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
Henry Tapper
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 

Recently uploaded (20)

Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 

Atm security

  • 1. Presentation on SECURITY FEATURES OF ATM
  • 2.
  • 3.
  • 4. HOW ATM WORKS :- 1.The ATM is act as a data terminal. ATM has to connect to or communicate through a host computer . 2. The host computer in analogous to an Internet service provider (ISP) . 3. The host computer is the gateway through which all the various ATM network becomes available to the user.
  • 5. 4. In ATM system customers authenticate themselves by using a plastic card with a magnetic stripe which is known as “ ATM CARD”. 5. The magnetic stripe encodes the customers account number and a numeric password which is known as PIN (Personal Identification Number) . 6. The ATM prompts the user to insert the card. 7. When the card is entered the customer personal identification number (PIN) is requested.
  • 6. 8. The customer inputs his or her PIN. 9. If the card is a valid card which can be processed by the machine then control transfer to next stages and prompts the user to either transfer, deposit or withdrawal of cash. 10. If the number entered incorrectly several times in a row most ATMs will retain the card as a security precaution to prevent an unauthorized users . 11. ATM reads and store customer’s data on a smart card.
  • 7.
  • 8.
  • 9. HARDWARE AND SOFTWARE :- 1. ATM contain secure crypto-processors, generally within an IBM PC compatible host computer in a secure enclosure . 2. The security of the machine relies mostly on the integrity of the secure crypto-processor. 3. A crypto-processor is a type of processor which process encrypted datas.
  • 10.
  • 11.
  • 12.
  • 13. CARD PIN CARD PRESENT USER OK ACC. NO. S E C U R I T Y ACC NO PIN REQUEST PIN VALIDATE USER SELECT SERVICE INCORRECT PIN RE-ENTER PIN INCORECT PIN RETURN CARD TIME OUT RETURN CARD INVALID CARD RETURN CARD STOLEN CARD RETAIN CARD
  • 14. To provide security, ATM system follows three different mechanism 1. Time out 2. Invalid card 3. Stolen card Time out :- The customer may fail to enter the PIN within the allowed time limit then the card is returned. Invalid card :- The card is not recognized and it is returned . Stolen card :- The card is recognized as a stolen card and is retained by the machine.
  • 15. DATABASE SECURITY : 1. The ATM keeps all the information about the user and user’s account inside the centralized database. Inside the database all the information are stored in the form of tables (objects) which are more secured than the general file systems. 2.The database also provide locking mechanisms to maintain safety and security of data.
  • 16. NETWORK SECURITY : The ATM network system provides the following features. 1. Authentication : The user is the one it claims to be. 2. Confidentiality : Only authorized users can access the content of the data. 3. Integrity : The data is not be altered by the third party during the transmission.
  • 17. 4. Non-repudiation (refuse to access) : A user can’t deny the fact that it has accessed a service or data. ADDITIONAL FEATURES : 1. Verifications of identity : Security system is able to establish and verify the claimed identity of any actor in an ATM network. 2. Protection of confidentiality : Stored and communicate datas are confidential.
  • 18.
  • 19. 6. Security recovery : The security system is able to recover from successful or attempted failures of security.
  • 20. PRECAUTIONS TO TAKE :- 1.Treat your ATM card like cash. Always keep your card in a safe place. 2. Keep your secret code as secret. Don’t use date of birth, address ,phone number as your PIN. 3. Take your receipt on every ATM transaction. Don’t leave it at or near the ATM counter. 4. Report a lost or stolen card at once. 5. ATM users should seek out a machine that is located in a well-lighted area.