atm presentationgp2
Post on 07-Dec-2014
3.000 Views
Preview:
DESCRIPTION
TRANSCRIPT
What is ATM What is ATM
An ATM (Automated Teller Machine) is An ATM (Automated Teller Machine) is a computerized telecommunications a computerized telecommunications device that provides the customers device that provides the customers of a financial institution an access of a financial institution an access to financial transactions in a public to financial transactions in a public
space without the need for a human space without the need for a human clerk or bank teller.clerk or bank teller.
HistoryHistory
First Mechanical ATM installed in NY in 1939 First Mechanical ATM installed in NY in 1939 by Citibankby Citibank
First Electronic ATM developed by Da La First Electronic ATM developed by Da La Rue in 1967 by Barclays Bank in LondonRue in 1967 by Barclays Bank in London
Modern ATM developed in 1968 in Dallas, Modern ATM developed in 1968 in Dallas, Texas Texas
IBM 2984 designed in 1973 by Llyod’s Bank IBM 2984 designed in 1973 by Llyod’s Bank started common use of ATMsstarted common use of ATMs
COMPONENTSCOMPONENTS
HardwareHardware
SoftwareSoftware
HARDWAREHARDWARE
CPUCPU Magnetic/Chip readerMagnetic/Chip reader Display: Touchscreen or with function keysDisplay: Touchscreen or with function keys CryptoprocessorCryptoprocessor Record PrinterRecord Printer VaultVault
ATM’s ATM’s AnatomyAnatomy
SOFTWARESOFTWARE
FRONT END BACK END
•OS2, Linux, Unix, MS WindowsOS2, Linux, Unix, MS Windows
•Firmware (coded in C++/Java)Firmware (coded in C++/Java)
•DBMS – Oracle, MS SQL Server etc (Distributed databases
situated at the bank’s sites)
SECURITYSECURITY
TANGIBLE SECURITYTANGIBLE SECURITY
TRANSACTIONAL TRANSACTIONAL SECURITYSECURITY
TANGIBLE SECURITYTANGIBLE SECURITY
Stainless steel housing and a Stainless steel housing and a mechanical boxmechanical box
Time-delay lock boxTime-delay lock box GPS Enabled NetworkGPS Enabled Network Installation of CCTVsInstallation of CCTVs Security Guards !Security Guards !
TRANSACTIONAL SECURITYTRANSACTIONAL SECURITY
Restricted access to FirmwareRestricted access to Firmware
Biometric Scanning (Iris Scans)Biometric Scanning (Iris Scans)
Core Data Master Key remote Core Data Master Key remote SystemSystem
THREATSTHREATS
Threat AThreat A: Internet Protocol Worms: Internet Protocol Worms
Threat BThreat B: IP Network Disruption/Denial : IP Network Disruption/Denial of of Services Services
Threat CThreat C: Data Collection for Malicious : Data Collection for Malicious purposes purposes
THREAT PREVENTIONTHREAT PREVENTION
THREATTHREAT PREVENTIONPREVENTION
A (Nachi A (Nachi worm)worm)
Installing software based firewallInstalling software based firewall
B B (sapphire (sapphire
worm)worm)
IDS and IPS IDS and IPS Separation of ATM from Public Internet Separation of ATM from Public Internet (patch management)(patch management)
CC Virtual and physical separation of ATM Virtual and physical separation of ATM Encryption of ATM traffic crossing Encryption of ATM traffic crossing public public
networks (VPN)networks (VPN)
GATEWAY (For verification)
BANK
3rd Party Authentication
CONSUMER
HOW IT WORKSHOW IT WORKS
3RD Party (IF Yes)
BANK
SERVER
CONSUMER
HOW IT WORKS 2HOW IT WORKS 2
PRESENTERS…PRESENTERS…
ABHISHEK MISHRAABHISHEK MISHRA
AHUTOSH TIWARIAHUTOSH TIWARI
SANYA JAINSANYA JAIN
SHWETA MATHURSHWETA MATHUR
PAYAL JAIN PAYAL JAIN
top related