Security of Automated Teller Machines - Conclusion

Conclusion

The application of cryptography(hidden or secret) to electronic funds transfer systems has shown that attacks may occur in different sub-systems. In other words, the protection of Electronic funds transfer terminals from attack by unauthorized outsiders is realized. Terminal's protection from authorized insiders is an impossible task. In order to go beyond these problems, the combined implementation of physical security, procedural protection and cryptography should be applied.

Read more about this topic:  Security Of Automated Teller Machines

Famous quotes containing the word conclusion:

    The conclusion suggested by these arguments might be called the paradox of theorizing. It asserts that if the terms and the general principles of a scientific theory serve their purpose, i. e., if they establish the definite connections among observable phenomena, then they can be dispensed with since any chain of laws and interpretive statements establishing such a connection should then be replaceable by a law which directly links observational antecedents to observational consequents.
    —C.G. (Carl Gustav)

    The source of our actions resides in an unconscious propensity to regard ourselves as the center, the cause, and the conclusion of time. Our reflexes and our pride transform into a planet the parcel of flesh and consciousness we are.
    E.M. Cioran (b. 1911)

    Human affairs are so obscure and various that nothing can be clearly known. This was the sound conclusion of the Academic sceptics, who were the least surly of philosophers.
    Desiderius Erasmus (1469–1536)