You are on page 1of 15

Presentation on SECURITY FEATURES OF ATM

Submitted By :
L.Manoj 098T1A0517 Computer Science & Engineering DBSIT-KAVALI

ABOUT THE ATM:1. An ATM is an electronic device which allows a banks customer to make cash withdrawals and check their account balance at any time without the need for a human teller.

2. Many ATMs also allow to deposit cash or cheques, transfer money between their bank accounts . 3. The Worlds first ATM was installed in ENFIELD town in the London on June 27, 1967 by Barclays bank .

PARTS OF THE ATM SYSTEM :-

1. Card reader 2. Keypad 3. Speaker

4. Display screen
5. Receipt printer 6. Cash dispenser

7. Deposit slot
8. Screen buttons

HOW ATM WORKS :1.The ATM is act as a data terminal. ATM has to connect to or communicate through a host computer .

2. The host computer in analogous to an Internet service provider (ISP) .

3. The host computer is the gateway through which all the various ATM network becomes available to the user.

NETWORKING CONCEPT :1. Most ATMs are connected to authorization of transaction by the card issuer or other authorizing institution via the communication network.

2. Most host computers can support either leased-line or dial-up machines.

3. Leased-line machines connect directly to the host computer through a four-wire, point-to-point dedicated telephone line.

4.

Dial-up ATMs connect the host computer through a normal phone line using a modem.

5. The host computer may be owned by a bank or any financial institutions or it may be used by an independent service provider.

HARDWARE AND SOFTWARE :-

1. ATM contain secure crypto-processors, generally within an IBM PC compatible host computer in a secure enclosure .

2. The security of the machine relies mostly on the integrity of the secure crypto-processor.
3. A crypto-processor is a type of processor which process encrypted datas.

4. ATMs typically connect directly to their ATM transaction processor via a modem over a dedicated telephone line.

5. ATM machines runs with operating systems such as Windows 2000 and Linux.

6. ATM transactions are usually encrypted with DES.

7. Most ATM are connected to inter-bank network.

GENERAL SECURITY:1.Modern ATM physical security concentrate on denying the use of the money inside the machine to a thief or a fraud using some fraud detection techniques. 2.Another trend in ATM security is the fortified cash dispenser is replaced with nothing more than a paper-tape printer. 3.The customer request a withdrawal from the machine which dispenses no money but merely prints a receipt. The customer then takes the receipt to a sales clerk and exchange it for cash.

CARD PRESENT
CARD REQUEST PIN ACC NO TIME OUT S E C U INVALIDCARD CARD INVALID RETURNCARD CARD RETURN RETURN CARD INCORRECTPIN PIN INCORRECT RE-ENTERPIN PIN RE-ENTER PIN VALIDATE USER USER OK ACC. NO. SELECT SERVICE

PIN

R
I T Y

STOLENCARD CARD STOLEN RETAINCARD CARD RETAIN

INCORECTPIN PIN INCORECT RETURNCARD CARD RETURN

To provide security, ATM system follows three different mechanism


1. Time out 2. Invalid card

3. Stolen card
Time out :The customer may fail to enter the PIN within the allowed

time limit then the card is returned.


Invalid card :The card is not recognized and it is returned . Stolen card :The card is recognized as a stolen card and is retained by the machine.

DATABASE SECURITY :
1. The ATM keeps all the information about the user and users account inside the centralized

database. Inside the database all the


information are stored in the form of tables (objects) which are more secured than the general file systems.

2.The database also provide locking mechanisms


to maintain safety and security of data.

PRECAUTIONS TO TAKE :1.Treat your ATM card like cash. Always keep your card in a safe place.

2. Keep your secret code as secret. Dont use date


of birth, address ,phone number as your PIN. 3. Take your receipt on every ATM transaction. Dont leave it at or near the ATM counter. 4. Report a lost or stolen card at once.

5. ATM users should seek out a machine that is


located in a well-lighted area.

ANY QUESTIONS ?

THANK YOU.

You might also like