Preview

How Does Atms Ensure Security

Good Essays
Open Document
Open Document
464 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
How Does Atms Ensure Security
How does ATMs ensure Security?
ATMs (Automated Teller Machines) are one of the most commonly used technologies in today’s world. They are special machines that make banking easier all over the world. The banks issue special cards that the customers can use in these machines for withdrawing cash, checking their balance and several other purposes. Such a marvelous combination of technology and intelligence has made things easier for people. But where there are so many advantages and applications for this technology, it has one major issue and that is of security. Since these machines contain cash and people feed in their personal finance details in the same, it is important that the banks maintain high levels of safety for these machines. Below discussed are some ways in which the ATMs ensure security.
The machines used as ATMs usually work on the specially designed cryptoprocessors, which help in the encryption and decryption of the personal information of users. The encryption of the information entered by the people leads to higher levels of security and leads to fraud prevention. There are special authentication codes that are used for the encryption and decryption of the messages and information entered by the users. This is the biggest safety measure.
Another important measure that is taken by the banks is customer identity integrity, wherein the machines make use of special measures for checking the identity of the user so that no fraud takes place. Several people have tried and adopted different measures for creating duplicate cards or reading pin numbers of people to cheat them but now banks have become alert and have added additional features and additional equipment, which helps in identifying fraudulent activities and thus leads to the better security measures.
There are also additional security approaches and equipments that are now placed on the device itself. People have even tried to tamper with the machine in the past and hence special alarm

You May Also Find These Documents Helpful

  • Satisfactory Essays

    4. What information is generated as part of ATM business processes and how are they…

    • 459 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The three main threats that face the banking industry are; Organized crime targeting financial institutions, Assault on Authentication, Malware. There are other threats that financial institutions are facing such as; Increased insider threat, Mobile Banking Attacks, and Telephone based fraud. The banking industry is facing more and more threats each day as they become more and more dependent on electronic media, this includes mobile banking, web based banking, atm machines, and any kind of information system that the bank is using. With the rise in technology and banking adapting to the technology banks become vulnerable and constantly have to keep up to date on all security measures and sometimes even invent new ways of protecting the banks data as well as its customers data.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Use Cases

    • 1184 Words
    • 5 Pages

    In this use case the basic flow of events consists of the following: (1) the use case begins when bank customer inserts their bank card; (2) Use Case: Validate User is performed; (3) The ATM displays the different alternatives that are available on this unit. In this case the Bank Customer always selects “Withdraw Cash”; (4) the ATM prompts for an account; (5) the bank customer selects an account; (6) the ATM prompts for an amount: (7) the bank customer enters an amount;(8) card id, pin, amount and account is sent to Bank as a transaction. The Bank Consortium replies with a go/no go reply telling if the transaction is ok; (9) then money is dispensed; (10) the bank card is returned; (11) the receipt is printed; and finally (12) the use case ends successfully.…

    • 1184 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Use Case

    • 846 Words
    • 4 Pages

    When a customer inserts their ATM card into the card reader of the ATM machine, a session will started to read customer card. If it can’t read the card due numerous reasons, then the system will eject the card and error message will display on screen. If the system successful read the card, it will ask the customer to enter his/her PIN, if the pin match with server database a system main menu will display. The main menu consists of multiple types of transaction such as withdrawal, deposit, transfer, or account balance. In an event of invalid pin was entering, system will ask customer to try again. It will allow customer three times to enter the right pin. If customer did not enter the correct pin for the fourth times, a screen will display to ask customer to talk to bank representative. The system will keep customer ATM card. Otherwise when the customer is through with his/her transactions, the card is ejected from the machine and session ends.…

    • 846 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The task of these machines is to learn what each customer wants to do with their money and, to the extent that it is possible, act on what the customer wants (for example, ATMs can hand out cash). Customers can always know how much money they have in their accounts, and they are confident that the numbers they see in their bank statements and on their computer screens accurately reflect the number of dollars that they can get from the bank on demand. They can be so sure of this that they can accept those numbers in the same way they accept paper banknotes (this is similar to the way people started accepting paper dollars when they had been accepting gold or…

    • 796 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Bis/220 It Acts Paper

    • 590 Words
    • 3 Pages

    The increasing popularity of online shopping, automated teller machines (ATMs), online banking, point-of-sale terminals, telephone bill payments, and many other monetary devices that use the internet created major security issues. The threat of identity theft, stolen banking information, and other personal information was cause for major concern. With these threats looming, the Electronic Fund Transfer Act (EFTA) was created to protect people who were entering a new age of technology. This act protects people while using access devices. According to The Federal Reserve (2008), an “Access device is a card, code, or other means of access to a consumer’s account or a combination used by the consumer to initiate EFTs. Access devised include debit cards, personal…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Even if you are not a Bank of America customer, you have probably used some bank’s ATM system and/or online banking services. The following instructions require you to consider the business processes delivered to you as a consumer of banking services via an ATM and to help you explore the underlying information management requirements of an ATM system.…

    • 657 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    w2 bis221 memo

    • 486 Words
    • 3 Pages

    Information technology advances in order to keep up with the demands of the modern world. One such way, is the availability to access money from automated tellers and point of sale terminals. “Congress implemented the Electronic Funds Transfer Act in 1978 to establish the basic rights, liabilities and responsibilities of consumers who use electronic funds services and financial institutions who offer those services.” (FDIC, 2006). This law protects an individual consumer’s privacy by ensuring the financial institution protects the digital data it is storing and that it does not disseminate that information to the wrong individual. The financial institution must ensure it receives and authentic information from the consumer and accurately transfer the information into the computer system. “The ETA also identifies error resolution and limits liability for any unauthorized transactions “(FDIC, 2006).…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ATM transactions are ideal for money laundering because launderers can use an account in the U.S. to deposit funds within the U.S. and have another person withdraw (i.e. domestic terrorist) them outside the country. Risk with ATMs involves verifying the identity of an individual for customer that may be out of the financial institutions targeted area. Transactions are usually instantaneous and the destination of cash is difficult to trace, especially for individuals smuggling funds to offshore accounts.…

    • 530 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    the bank plans to build only one ATM, so we need not worry about multiple ATMs accessing this database at the same time the bank does not make any changes to the information in the database while a user is accessing the ATM. an ATM faces reasonably complicated security issues that are beyond our scope. the bank trusts the ATM to access and manipulate the information in the database without significant security…

    • 2544 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    In view of the high cost of ATM machines and RBI's guidelines for expansion of ATMs, the concept of Brown Label ATM network is likely to expand at a brisk pace in next few years. In the recent years, there is a visible shift in the way banks look at the ATM business. From the earlier model where banks used to buy outright the ATM machines and bear the cost of service, they are now preferring brown label ATMS i.e. where the machine and service is outsourced. There are indications that as many as 50% may soon be under this category.…

    • 1951 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    cyber crime in banks

    • 3291 Words
    • 14 Pages

    After the arrival of Internet and WWW this banking sector is totally change specially in terms of security because now money is in your hand on a single click. Now user has number of choices to manage his money with different kind of methods. In this paper an attempt has been made to put forward various issues of Indian banks websites for cyber-crime safety mechanism. Keywords- Cyber; Encryption; Phishing; Secure Socket Layer.…

    • 3291 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    This paper encloses the information regarding the ‘IMAGE PROCESSING’. And discussed one of the major application of image processing ‘BIOMETRICS’. Biometrics technology allows determination and verification of ones identity through physical characteristics. To put it simply, it turns your body in to your password. We discussed various biometric techniques like finger scan, retina scan, facial scan, hand scan etc. Two algorithms have been proposed by taking biometric techniques to authenticate an ATM account holder , enabling a secure ATM by image processing. Biometrics is now applied in various public and private sectors. No doubt, biometrics is going to be next generation’s powerful security tool…!…

    • 2367 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    This paper encloses the information regarding the ‘IMAGE PROCESSING’. And discussed one of the major application of image processing ‘BIOMETRICS’. Biometrics technology allows determination and verification of ones identity through physical characteristics. To put it simply, it turns your body in to your password. We discussed various biometric techniques like finger scan, retina scan, facial scan, hand scan etc. Two algorithms have been proposed by taking biometric techniques to authenticate an ATM account holder , enabling a secure ATM by image processing. Biometrics is now applied in various public and private sectors. No doubt, biometrics is going to be next generation’s powerful security tool…!…

    • 1375 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    1. Urban oriented / district-wise branch, excellent management, high commitment to the customers, experienced & skilled manpower, sound HRM,…

    • 272 Words
    • 2 Pages
    Satisfactory Essays