Atm Tushar

Embed Size (px)

Citation preview

  • 8/2/2019 Atm Tushar

    1/14

    4/16/12

    Click to edit Master subtitle style

    AUTOMATED TELLER

    MACHINE

  • 8/2/2019 Atm Tushar

    2/14

    4/16/12

    INTRODUCT

    IONAn automated teller machine (ATM) or automaticbanking machine (ABM) is a computerisedtelecommunications device that provides theclients of a financial institution with access to

    financial transactions in a public space without theneed for a cashier, human clerk or bank teller. Onmost modern ATMs, the customer is identified byinserting a plastic ATM card with a magnetic stripeor a plastic smart card with a chip, that contains aunique card number and some securityinformation such as an expiration date or CVVC(CVV). Authentication is provided by the customerentering a personal identification number (PIN).

  • 8/2/2019 Atm Tushar

    3/14

    4/16/12

    HARDWARE

  • 8/2/2019 Atm Tushar

    4/14

    4/16/12

    CPU (to control the user interface and transactiondevices)

    Magnetic and/or Chip card reader (to identify thecustomer) PIN Pad (similar in layout to a Touch tone or Calculatorkeypad), often manufactured as part of a secureenclosure.

    Secure cryptoprocessor, generally within a secureenclosure. Display (used by the customer for performing thetransaction) Function key buttons (usually close to the display) or aTouchscreen (used to select the various aspects of thetransaction)

    An ATM is typically

    made up of thefollowing devices:

  • 8/2/2019 Atm Tushar

    5/14

    4/16/12

    Dispensing mechanism (to provide cash or otheritems of value) Deposit mechanism including a ChequeProcessing Module and Bulk Note Acceptor (to

    allow the customer to make deposits) Security sensors (Magnetic, Thermal, Seismic,gas) Locks: (to ensure controlled access to thecontents of the vault)

    Journaling systems; many are electronic (asealed flash memory device based on proprietarystandards) or a solid-state device (an actualprinter) which accrues all records of activityincluding access timestamps, number of billsdispensed, etc. - This is considered sensitive data

    MECHANIS

    M

  • 8/2/2019 Atm Tushar

    6/14

    4/16/12

    SOFTWAR

    E

  • 8/2/2019 Atm Tushar

    7/14

    4/16/12

    With the migration to commodity PC hardware,standard commercial "off-the-shelf" operating systemsand programming environments can be used inside ofATMs. Typical platforms previously used in ATMdevelopment include RMX or OS/2. Today the vastmajority of ATMs worldwide use a Microsoft OS,

    primarily Windows XP Professional or Windows XPEmbedded. A small number of deployments may stillbe running older versions such as Windows NT,Windows CE or Windows 2000. Notably, Vista was notwidely adopted in ATMs.

    Linux is also finding some reception in the ATMmarketplace. An example of this is Banrisul, the largestbank in the south of Brazil, which has replaced the MS-DOS operating systems in its ATMs with Linux.

    ATM

    O/S

  • 8/2/2019 Atm Tushar

    8/14

    4/16/12

    DEVICE

    OPERATIONINTEGRITY

  • 8/2/2019 Atm Tushar

    9/14

    4/16/12

    Openings on the customer-side of ATMs are oftencovered by mechanical shutters to preventtampering with the mechanisms when they are not

    in use. Alarm sensors are placed inside the ATMand in ATM servicing areas to alert their operatorswhen doors have been opened by unauthorizedpersonnel.Rules are usually set by the government or ATMoperating body that dictate what happens whenintegrity systems fail. Depending on the

    jurisdiction, a bank may or may not be liable whenan attempt is made to dispense a customer's

    money from an ATM and the money either getsoutside of the ATM's vault, or was exposed in anon-secure fashion, or they are unable todetermine the state of the money after a failedtransaction. Bank customers often complain thatbanks have made it difficult to recover money lost

  • 8/2/2019 Atm Tushar

    10/14

    4/16/12

    CUSTOMER IDENTITY

    INTEGRITY

  • 8/2/2019 Atm Tushar

    11/14

    4/16/12

    There have also been a number of incidents offraud by Man-in-the-middle attacks, wherecriminals have attached fake keypads or cardreaders to existing machines. These have thenbeen used to record customers' PINs and bank cardinformation in order to gain unauthorized access totheir accounts. Various ATM manufacturers have

    put in place countermeasures to protect theequipment they manufacture from these threats.Alternate methods to verify cardholder identitieshave been tested and deployed in some countries,such as finger and palm vein patterns,iris, andfacial recognition technologies. However, recently,cheaper mass production equipment has beendeveloped and being installed in machines globallythat detect the presence of foreign objects on the

    front of ATMs, current tests have shown 99%detection success for all t es of skimmin devices.

  • 8/2/2019 Atm Tushar

    12/14

    4/16/12

    SECURITY

  • 8/2/2019 Atm Tushar

    13/14

    4/16/12

    Security, as it relates to ATMs, has severaldimensions. ATMs also provide a practicaldemonstration of a number of security systems andconcepts operating together and how varioussecurity concerns are dealt with. Modern ATMphysical security, per other modern money-handlingsecurity, concentrates on denying the use of the

    money inside the machine to a thief, by means oftechniques such as dye markers and smokecanisters.A common method is to simply rob the staff fillingthe machine with money. To avoid this, theschedule for filling them is kept secret, varying andrandom. The money is often kept in cassettes,which will dye the money if incorrectly opened.

  • 8/2/2019 Atm Tushar

    14/14

    4/16/12

    ANY SUGGESTION OR QUESTION

    PLEASE ??

    THANKYOU