The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
On The Design of Secure ATM System
Author(s): Lawan A. Mohammed (King Fahd University of Petroleum and Minerals, Saudi Arabia)
Copyright: 2011
Pages: 21
EISBN13: 9781609606541
Purchase
View Sample PDF
Abstract
Over the past three decades, consumers have been largely depending on and trust the Automatic Teller Machine, better known as ATM machine to conveniently meet their banking needs. ATM is a data terminal, it has to be connected to, and communicate through, a host processor. The host processor may be owned by a bank or any financial institution, or it may be owned by an independent service provider. Moreover, an ATM can support multiple ATM cards owned by different financial institutions or banks. Most host processors can support leased-line or dial-up machines. However, despite the numerous advantages of ATM system, ATM fraud has recently become more widespread. Recent occurrences of ATM fraud range from techniques such as shoulder surfing and card skimming to highly advanced techniques involving fraudulent mobile alerts, and account takeover via stolen information and call centers, software tampering and/or hardware modifications to divert, or trap the dispensed currency. In this chapter, we provide a comprehensive overview of the possible fraudulent activities that may be perpetrated against ATMs and investigates recommended approaches to prevent or deter these types of frauds. In particular we develop a model for the utilization of biometrics equipped ATM to provide security solution against must of the well-known breaches associated with the current ATM system practice.
Related Content
Cath Ellis.
© 2013.
24 pages.
|
Roberto Di Scala.
© 2010.
13 pages.
|
Angelo Kevin Brown.
© 2023.
16 pages.
|
Antonio Daniel Juan Rubio.
© 2023.
23 pages.
|
Aurelio M. Montemayor, Nancy Feyl Chavkin.
© 2020.
27 pages.
|
|
|