Security Of Automated Teller Machines
Automated Teller Machines were first used in 1939. Nowadays, about 1.5 million are installed worldwide.
In the consideration of ATM, there are different aspects that should be considered. First, one has to have an idea about the communication within ATMs. Second, the issue of security is of paramount importance because all over the world, there is an increasing use of ATMs and so the risks of hacking turn to be a reality more than ever before. In the past, the function of ATMs was to deliver cash in the form of bank notes and to debit a corresponding bank account. Cards were used to identify the user. As for the withdrawal of money, different methods were used. For instance, punched cards were used. By the use of such cards, only one payment was authorized. Thereby, a user had to get a supply of cards from his/her bank because the punched cards were not returned to the user. Another example was the use of a magnetic card which had a limited life. The use of such cards allowed; for instance, twenty withdrawals of money. From the beginning, personal identification number (PIN) has been of very great importance in the overall operation.
D.W. Davies & W. L. Price (1984). Security for computer networks : an introduction to data security in teleprocessing and electronic funds transfer. ISBN 0-471-90063-X.
The use of it has been done with the aim to decrease the risks that might result from the loss of cards and the misuses that might be connected to that. In fact, in the past as well as in the present, there have been different aspects in the consideration of the designing and the communicative basics of Automated Teller Machines. One aspect of it has been how communication between its participants could be possible. The second of it has been to take into consideration the purposes which could be a part and a parcel of any communicative act. In this context, there are different participants involved in ATMs communication. To cite but a few of them, in an ATM communication, there are remote partners and interfaces to the outside world and these interfaces are in their turn subject to more than one classification. The first interface represents the relationship between the End-user and Automated Teller Machine. The second interface occurs between the ATM and the central bank computer.
Read more about Security Of Automated Teller Machines: Security, Conclusion
Famous quotes containing the words security of, security, automated, teller and/or machines:
“A well-regulated militia being necessary to the security of a free State, the right of the people to keep and bear arms shall not be infringed.”
—U.S. Constitution, Second Amendment.
“The horror of class stratification, racism, and prejudice is that some people begin to believe that the security of their families and communities depends on the oppression of others, that for some to have good lives there must be others whose lives are truncated and brutal.”
—Dorothy Allison (b. 1949)
“Now, as always, the most automated appliance in a household is the mother.”
—Beverly Jones (b. 1927)
“The teller of a mirthful tale has latitude allowed him. We are content with less than absolute truth.”
—Charles Lamb (17751834)
“Shoes are the first adult machines we are given to master.”
—Nicholson Baker (b. 1957)