Conclusion
The application of cryptography(hidden or secret) to electronic funds transfer systems has shown that attacks may occur in different sub-systems. In other words, the protection of Electronic funds transfer terminals from attack by unauthorized outsiders is realized. Terminal's protection from authorized insiders is an impossible task. In order to go beyond these problems, the combined implementation of physical security, procedural protection and cryptography should be applied.
Read more about this topic: Security Of Automated Teller Machines
Famous quotes containing the word conclusion:
“The conclusion has never changed: the worst sort of people come here for the worst sort of reasons and put upon those of us who have conveniently forgotten where we came from and how we got here.”
—Anna Quindlen (b. 1952)
“No one can write a best seller by trying to. He must write with complete sincerity; the clichés that make you laugh, the hackneyed characters, the well-worn situations, the commonplace story that excites your derision, seem neither hackneyed, well worn nor commonplace to him.... The conclusion is obvious: you cannot write anything that will convince unless you are yourself convinced. The best seller sells because he writes with his hearts blood.”
—W. Somerset Maugham (18741966)
“We must not leap to the fatalistic conclusion that we are stuck with the conceptual scheme that we grew up in. We can change it, bit by bit, plank by plank, though meanwhile there is nothing to carry us along but the evolving conceptual scheme itself. The philosophers task was well compared by Neurath to that of a mariner who must rebuild his ship on the open sea.”
—Willard Van Orman Quine (b. 1908)