Académique Documents
Professionnel Documents
Culture Documents
Prepared By :
ABOUT THE ATM:1. An ATM is an electronic device which allows a banks customer to make cash withdrawals and check their account balance at any time without the need for a human teller.
2. Many ATMs also allow to deposit cash or cheques, transfer money between their bank accounts . 3. The Worlds first ATM was installed in ENFIELD town in the London on June 27, 1967 by Barclays bank .
4. Display screen
5. Receipt printer 6. Cash dispenser
7. Deposit slot
8. Screen buttons
HOW ATM WORKS :1.The ATM is act as a data terminal. ATM has to connect to or communicate through a host computer .
3. The host computer is the gateway through which all the various ATM network becomes available to the user.
4. In ATM system customers authenticate themselves by using a plastic card with a magnetic stripe which is known as ATM CARD.
5. The magnetic stripe encodes the customers account number and a numeric password which is known as PIN (Personal Identification Number) . 6. The ATM prompts the user to insert the card. 7. When the card is entered the customer personal identification number (PIN) is requested.
8. The customer inputs his or her PIN. 9. If the card is a valid card which can be processed by the machine then control transfer to next stages and prompts the user to either transfer, deposit or withdrawal of cash.
10. If the number entered incorrectly several times in a row most ATMs will retain the card as a security precaution to prevent an unauthorized users . 11. ATM reads and store customers data on a smart card.
NETWORKING CONCEPT :1. Most ATMs are connected to authorization of transaction by the card issuer or other authorizing institution via the communication network.
3. Leased-line machines connect directly to the host computer through a four-wire, point-to-point dedicated telephone line.
4.
Dial-up ATMs connect the host computer through a normal phone line using a modem.
5. The host computer may be owned by a bank or any financial institutions or it may be used by an independent service provider.
1. ATM contain secure crypto-processors, generally within an IBM PC compatible host computer in a secure enclosure .
2. The security of the machine relies mostly on the integrity of the secure crypto-processor.
3. A crypto-processor is a type of processor which process encrypted datas.
4. ATMs typically connect directly to their ATM transaction processor via a modem over a dedicated telephone line.
5. ATM machines runs with operating systems such as Windows 2000 and Linux.
GENERAL SECURITY:1.Modern ATM physical security concentrate on denying the use of the money inside the machine to a thief or a fraud using some fraud detection techniques. 2.Another trend in ATM security is the fortified cash dispenser is replaced with nothing more than a paper-tape printer. 3.The customer request a withdrawal from the machine which dispenses no money but merely prints a receipt. The customer then takes the receipt to a sales clerk and exchange it for cash.
CARD PRESENT
CARD REQUEST PIN ACC NO TIME OUT S E C U INVALID CARD RETURN CARD INCORECT PIN RETURN CARD RETURN CARD PIN VALIDATE USER USER OK ACC. NO. SELECT SERVICE
PIN
INCORRECT PIN
RE-ENTER PIN
R
I T Y
3. Stolen card
Time out :The customer may fail to enter the PIN within the allowed
DATABASE SECURITY :
1. The ATM keeps all the information about the user and users account inside the centralized
NETWORK SECURITY :
The ATM network system provides the following features.
1. Authentication :
The user is the one it claims to be. 2. Confidentiality :
ADDITIONAL FEATURES :
1. Verifications of identity : Security system is able to establish and verify the claimed identity of any actor in an ATM network. 2. Protection of confidentiality : Stored and communicate datas are confidential.
3. Strong accountability :
The entity cant deny the responsibility of its performed action as well as their effects.
4. Alarm reporting :
The security system able to generate alarm notification about certain selected security related events. 5. Audit :
6. Security recovery :
The security system is able to recover from successful or attempted failures of security.
PRECAUTIONS TO TAKE :1.Treat your ATM card like cash. Always keep your card in a safe place.
ANY QUESTIONS ?
THANK YOU.