20130506015829677
20130506015829677
20130506015829677
1, March 2013
I.
II.
INTRODUCTION
LOCATION.
56
Figure 1.
ATM Network
Figure 2.
SECURITY
VI. PHYSICAL
Modern ATM physical security, per other modern
money-handling security, concentrates on denying the use
of the money inside the machine to a thief, by means of
techniques such as dye markers and smoke canisters [10].
VII. TRANSACTIONAL SECRECY AND INTEGRITY
The security of ATM transactions relies mostly on the
integrity of the secure crypto processor: the ATM often
uses commodity components that are not considered to be
"trusted systems". Encryption of personal information,
required by law in many jurisdictions, is used to prevent
fraud. Sensitive data in ATM transactions are usually
encrypted with DES, but transaction processors now
usually require the use of Triple DES.Remote Key
Loading techniques may be used to ensure the secrecy of
the initialization of the encryption keys in the ATM.
Message Authentication Code (MAC) or Partial MAC
may also be used to ensure messages have not been
tampered with while in transit between the ATM and the
financial network [4] [10].
VIII. CUSTOMER SECURITY
In some areas, multiple security cameras and security
guards are a common feature. Critics of ATM operators
57
Figure 3.
REFERENCES
[1]
[2]
58
[3]
[4]
[5]
[6]
[7]
http://www.upiu.com/other/2011/06/15/Nigerian-students-and-theATMAutomated-Teller-Machines/UPIU-3801308194612/
C. Robat. (2006). ATM Automatic Teller Machine. [Online].
Available: http://www.thocp.net/hardware/atm.htm
Wikipedia the Free Encyclopedia. (2010). Automated Teller
Machine. [Online]. Available: http//:en.wikipedia.org,.
R Hossain, et al., Designing an Atm Network Based on Distributed
Database Systems", no date.
A. R. Rai, "Customer relationship management: Concepts and
cases " New Delhi, 2008, pp. 97-98
59