atm presentationgp2

Post on 07-Dec-2014

3.000 Views

Category:

Education

1 Downloads

Preview:

Click to see full reader

DESCRIPTION

A thorough detail on use of ATM machines. Advent, development and current situation of ATMs in India.

TRANSCRIPT

What is ATM What is ATM

An ATM (Automated Teller Machine) is An ATM (Automated Teller Machine) is a computerized telecommunications a computerized telecommunications device that provides the customers device that provides the customers of a financial institution an access of a financial institution an access to financial transactions in a public to financial transactions in a public

space without the need for a human space without the need for a human clerk or bank teller.clerk or bank teller.

HistoryHistory

First Mechanical ATM installed in NY in 1939 First Mechanical ATM installed in NY in 1939 by Citibankby Citibank

First Electronic ATM developed by Da La First Electronic ATM developed by Da La Rue in 1967 by Barclays Bank in LondonRue in 1967 by Barclays Bank in London

Modern ATM developed in 1968 in Dallas, Modern ATM developed in 1968 in Dallas, Texas Texas

IBM 2984 designed in 1973 by Llyod’s Bank IBM 2984 designed in 1973 by Llyod’s Bank started common use of ATMsstarted common use of ATMs

COMPONENTSCOMPONENTS

HardwareHardware

SoftwareSoftware

HARDWAREHARDWARE

CPUCPU Magnetic/Chip readerMagnetic/Chip reader Display: Touchscreen or with function keysDisplay: Touchscreen or with function keys CryptoprocessorCryptoprocessor Record PrinterRecord Printer VaultVault

ATM’s ATM’s AnatomyAnatomy

SOFTWARESOFTWARE

FRONT END BACK END

•OS2, Linux, Unix, MS WindowsOS2, Linux, Unix, MS Windows

•Firmware (coded in C++/Java)Firmware (coded in C++/Java)

•DBMS – Oracle, MS SQL Server etc (Distributed databases

situated at the bank’s sites)

SECURITYSECURITY

TANGIBLE SECURITYTANGIBLE SECURITY

TRANSACTIONAL TRANSACTIONAL SECURITYSECURITY

TANGIBLE SECURITYTANGIBLE SECURITY

Stainless steel housing and a Stainless steel housing and a mechanical boxmechanical box

Time-delay lock boxTime-delay lock box GPS Enabled NetworkGPS Enabled Network Installation of CCTVsInstallation of CCTVs Security Guards !Security Guards !

TRANSACTIONAL SECURITYTRANSACTIONAL SECURITY

Restricted access to FirmwareRestricted access to Firmware

Biometric Scanning (Iris Scans)Biometric Scanning (Iris Scans)

Core Data Master Key remote Core Data Master Key remote SystemSystem

THREATSTHREATS

Threat AThreat A: Internet Protocol Worms: Internet Protocol Worms

Threat BThreat B: IP Network Disruption/Denial : IP Network Disruption/Denial of of Services Services

Threat CThreat C: Data Collection for Malicious : Data Collection for Malicious purposes purposes

THREAT PREVENTIONTHREAT PREVENTION

THREATTHREAT PREVENTIONPREVENTION

A (Nachi A (Nachi worm)worm)

Installing software based firewallInstalling software based firewall

B B (sapphire (sapphire

worm)worm)

IDS and IPS IDS and IPS Separation of ATM from Public Internet Separation of ATM from Public Internet (patch management)(patch management)

CC Virtual and physical separation of ATM Virtual and physical separation of ATM Encryption of ATM traffic crossing Encryption of ATM traffic crossing public public

networks (VPN)networks (VPN)

GATEWAY (For verification)

BANK

3rd Party Authentication

CONSUMER

HOW IT WORKSHOW IT WORKS

3RD Party (IF Yes)

BANK

SERVER

CONSUMER

HOW IT WORKS 2HOW IT WORKS 2

PRESENTERS…PRESENTERS…

ABHISHEK MISHRAABHISHEK MISHRA

AHUTOSH TIWARIAHUTOSH TIWARI

SANYA JAINSANYA JAIN

SHWETA MATHURSHWETA MATHUR

PAYAL JAIN PAYAL JAIN

top related