Strategies and Techniques of Banking Security and ATMs
Strategies and Techniques of Banking Security and ATMs
ISSN(Online): 2581-7280
VIVA Institute of Technology
10th National Conference on Role of Engineers in Nation Building – 2022 (NCRENB-2022)
Abstract : Security may be a major issue in cash dispenser Machine (ATM).with the wide unfold utilization of
electronic transactions it's necessary to extend customers recognition accuracy. Biometric systems can give a
convenient and secure mode of authentication to the shoppers.Nowadays the banking sector is one among the
foremost vital elements of an individual's day to day life. Banking facilities are unit wide used by folks for his or
her economies activities.cash dispenser Machine (ATM) is an electronic machine that is employed for accessing
a checking account from anyplace while not requiring the assistance of bank workers. The user will perform
many banking activities like money withdrawal, cash transfer with the assistance of an ATM. it's discovered that
the numbers of crime associated with ATM magnification thus have to be compelled to offer higher security to
ATM machines.
Keywords: ATM machine,ATM security,Appropriate Password,Bank Passbook,Bank security,Customer
details,Identity card,OTP and Password Security Guard.
I. INTRODUCTION
ATM is an electronic machine thus any device that allows the client of a financial organization to
perform monetary transactions, money withdrawal, while not the requirement for an individual's gift. ATM
trade Association, that features a record that about to three million ATMs area unit presently put in worldwide.
Beside the growing convenience and practicableness of the ATMs, there's additionally a rise within the quantity
of ATM thieving and driver fraud, that area unit developing at an forbidding rate. Within the neck of the woods
of practicality versus security needed, the practicality additional needed. Security has continually been viewed
upon as AN overhead or afterthought by computer code developers. However within the case of banking and
cash transactions, the safety ought to hold the highest priority. Increase in daily attacks on ATM and banking
security the developers older right track and putt security their necessary facet in developing comes. The multi
issue authentication is an approach to authentication which requires the presentation of 2 or additional
authentication issues: an information factor, a possession issue, And an inheritance issue. When presentation,
every issue should be valid by the opposite party for authentication to occur. In gift days the ATM holds just one
factor Pin to secure the cash saved within the bank if we tend to aren't considering the physical attacks. In our
system we tend to area unit going on the far side this level of security to reinforce security of the ATM. We tend
to introduce the conception of 1 time watchword OTP in ATM banking. Our system can give the second level of
security victimization various factors to come up with OTP. This may send over customer’s mobile range keep
in records. In secure ATM, user can get to register mobile and its IMEI range in bank system. Once user
puts/swipes card into machine, user get request to insert PIN (which is current approach of ATM banking).
Within the projected system user can get OTP on mobile. Once user enters OTP to the system, he/she are having
access to the machine else no group action are often created.
ATMs or automated teller machine area unit one thing that everyone is awake too recently. ATMs area
unit helpful instrumentation that we tend to all use to induce money from banks. They save U.S. from waiting in
long queues in banks for retreating money from our bank accounts. However, the shortage of awareness of users
concerning the ATM security has been inflicting hassle and problems to the ATM users. The cases of ATM
frauds and skimming are additional and additional common within the GB and across the world. This is
regularly relevant even just in case of the young students United Nations agency area unit the new generation
users of the ATM services.[3]
F-133
www.viva-technology.org/New/IJRI
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 5 (2022)
ISSN(Online): 2581-7280
VIVA Institute of Technology
10th National Conference on Role of Engineers in Nation Building – 2022 (NCRENB-2022)
IV. METHODOLOGY
The Research Philosophy According to Elliot, the research philosophy is about the manner in which
research builds the source, the nature and the nurturing of the knowledge expected from the research (Elliot,
2005). The research philosophy adopted here would be interpretive in the nature where the responses of the
respondents will be interpreted using interpretation research philosophy[9]
The Research Purpose A research must have a purpose to ensure that the research is being conducted
and progressed in the right direction. The purpose of the research here would be to understand the existing
awareness of youngsters regarding the security measures and effective usage of ATMs.[4][7]
The Research Strategy According to Silverman, the research strategy is about the manner in which
you conduct your strategy. It is about choosing whether the research is to be done using primary data or
secondary data or even both. The Research Approach The choice of the research approach can be from the
available three types, which are deductive, inductive and adductive. According to Denzin & Lincoln, deductive
approach can be used to prove the correctness and applicability of an existing theory in the chosen scenario.
The Data Analysis The data analysis should be done effectively in order to achieve effective and
applicable results. This research would be adopting thematic data analysis using qualitative analysis on the
primary data collected from the surveys and the interviews.[11]
F-134
www.viva-technology.org/New/IJRI
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 5 (2022)
ISSN(Online): 2581-7280
VIVA Institute of Technology
10th National Conference on Role of Engineers in Nation Building – 2022 (NCRENB-2022)
The Reliability The research conducted would be highly reliable as the data would be collected
directly from the primary respondents and therefore, the authenticity of the research would be ensured. The
respondent's’ identity would be kept secret 0 The Validity The research results are expected to be highly valid
for the analysis of the necessity of awareness about security measures and knowledge during using ATMs. The
validity is expected to be high, as only primary data will be collected from respondents directly.[2][10]
V. PROPOSED SYSTEM
The process of ATM dealings starts once face recognized. MATLAB IDE used for face recognition
purpose, then next step is RFID card, distinctive for every person, to the RFID reader for scanning. The account
associated with the distinctive RFID range can access. Once this step match with keep RFID range than the
dealings are allowed. Otherwise, the account data won't be displayed, and more activity are disabled.
An analysis should have a purpose to make sure that the research is being conducted and progressed within the
right direction. The aim of the analysis here would be to grasp the prevailing awareness of children concerning
the safety measures and effective usage of ATMs. The aim of the analysis would be distinctive problems and
loopholes within the existing awareness and areas of scope of improvement. Supported the identification of the
weaknesses and loopholes within the existing information of the children concerning safe and effective use of
ATMs, suggestions would be created concerning enhancing the cognitive content concerning ATM security.
The feedback of a bank worker and also the expertise of a teen World Health Organization has long-faced
security problems whereas victimization Associate in Nursing ATM square measure assessed as a section of the
aim for this analysis paper.[12]
F-135
www.viva-technology.org/New/IJRI
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 5 (2022)
ISSN(Online): 2581-7280
VIVA Institute of Technology
10th National Conference on Role of Engineers in Nation Building – 2022 (NCRENB-2022)
VI. CONCLUSION
The results Face recognition might even be a awfully helpful and versatile technique. it's totally correct
technique. this system has roaring applications. this system will increase each privacy and identity. the
expansion in electronic transactions has resulted terribly} terribly larger demand for quick and correct user
identification and authentication. Access codes for buildings, banks accounts and pc systems typically use PIN's
for identification and security clearances. traditional methodology of identification supported possession of ID
cards or exclusive knowledge kind of a welfare choice or a countersign don't seem to be all quickly reliable.
once credit and ATM cards unit lost or taken, makings unauthorized user will typically return up with the right
personal codes. Despite warning, many individuals still select simply guessed PIN's and passwords birthdays,
phone numbers and welfare numbers. This paper might solve this flinch and helpful for detection a fraud . it's
utilised in Bank sector and any ATM connected security. it's place along named as as bad person following
system. As there's a scope for improvement and as a future implementation we'll add a following chip on ATM
card for tracing the situation of card that's in a very position to facilitate in providing users facilitate. Face
recognition technique finds associate large vary of applications in fields involving high security. it's
advancement at intervals the arena of technology thereby giving a beautiful push to the technology trade. several
comes associated with security and management unit typically enforced by this face recognition technique.[8]
A number of key themes emerge on the shape of conclusions from the findings and their analysis. The
figure below illustrates the conclusions arrived at:
F-136
www.viva-technology.org/New/IJRI
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 5 (2022)
ISSN(Online): 2581-7280
VIVA Institute of Technology
10th National Conference on Role of Engineers in Nation Building – 2022 (NCRENB-2022)
As can be seen in the figure above, an important theme to consider is the over-confidence, which is
visible through student responses. It can be seen that most students do not feel threatened or do not see the
seriousness of ATM security therefore they don’t find it as an issue. Closed spaces and security guards in the
form of physical security barriers seem to be sufficient for them. Similar overconfidence can be seen in their
bank choosing behaviour, wherein they do not choose or consider security considerations to be an important
parameter to finalize their bank choice. Secondly, both the knowledge and the behaviour of the customers have
to play a crucial role in preventing them from self-harm. The interactions reveal a clear lack of knowledge to be
easily evident among the respondents. Students show little understanding or knowledge towards skimming
frauds and are highly unaware of the services which bank provides to prevent skimming frauds in the first place.
Next with regard to the ATM visit and usage behaviour of the customers, it can be concluded and stated that
although most students would like to visit ATM premises for conducting transactions, they have not paid
attention to security guidelines, which banks provide through their websites.[3]
F-137
www.viva-technology.org/New/IJRI
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 5 (2022)
ISSN(Online): 2581-7280
VIVA Institute of Technology
10th National Conference on Role of Engineers in Nation Building – 2022 (NCRENB-2022)
REFERENCES
[1]Barker, K., & Sheridon, P. (2008). mastercard fraud: awareness and bar. Journal of monetary Crime , 15 (4), 398-410.
[2]Dawson, C. (2009). Introduction to analysis ways. London: the way to Books,Ltd.
[3]Degu, G., & Yigzaw, T. (2006). analysis Methodology . Ethiopia: University of Gondar.
[4] Denzin, N. K., & Lincoln, Y. S. (2000). reference book of qualitative analysis ((2nd disfunction.) ed.). Thousand Oaks, CA: Sage.
[5][Ruane, J. M. (2008). necessities of analysis Methods: A Guide to scientific discipline analysis. London: Blackwell Publishers.
[6]ARM7 primarily based sensible ATM Access & Security System exploitation Fingerprint Recognition & GSM Technology Khatmode
Ranjit P1 , Kulkarni Ramchandra V2 , Ghodke Bharat S3 , Prof. P. P. Chitte4 , Prof. Anap S. D five one Student of B.E. physics,
Pravara Rural engineering faculty, loni, geographic area,
[7]An Improved technique for Extraction of Fingerprint options Jianwei rule, Lifeng Liu, and Tianzi Jiang*, Member, IEEE National
Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, Peking 100080, P. R. China.
[8]Indian Journal of Science and Technology Supplementary Article ATM Terminal style exploitation Biological Technology by V. Khanaa
and avatar Mohanta.
[9]Volume three, No. 11, November 2012 Journal of worldwide analysis in computing analysis PAPER HIGH PROTECTION HUMAN
IRIS AUTHENTICATION IN NEW ATM TERMINAL style exploitation biometry MECHANISM.
[10]Neuman, W. L. (2000). Social analysis methods: Qualitative and quantitative aproaches (4th disfunction.)Boston: Allyn and Bacon.
[11]Nwankwo, O. (2013). Implications of Fraud on business Banks Performance in Nigeria.International Journal of Business and
Management , 8 (5), 119-125.
[12]Ruane, J. M. (2008). necessities of analysis Methods: A Guide to science analysis. London:Blackwell Publishers.
F-138
www.viva-technology.org/New/IJRI