Strategies and techniques of Banking security and ATMs



EOI: 10.11242/viva-tech.01.05.198

Download Full Text here



Citation

Shivam Chaurasiya, Chetan Prajapati, "Strategies and techniques of Banking security and ATMs", VIVA-IJRI Volume 1, Issue 5, Article 198, pp. 1-6, 2022. Published by Computer Engineering Department, VIVA Institute of Technology, Virar, India.

Abstract

Security may be a major issue in cash dispenser Machine (ATM).with the wide unfold utilization of electronic transactions it's necessary to extend customers recognition accuracy. Biometric systems can give a convenient and secure mode of authentication to the shoppers.Nowadays the banking sector is one among the foremost vital elements of an individual's day to day life. Banking facilities are unit wide used by folks for his or her economies activities.cash dispenser Machine (ATM) is an electronic machine that is employed for accessing a checking account from anyplace while not requiring the assistance of bank workers. The user will perform many banking activities like money withdrawal, cash transfer with the assistance of an ATM. it's discovered that the numbers of crime associated with ATM magnification thus have to be compelled to offer higher security to ATM machines.

Keywords

ATM machine,ATM security,Appropriate Password,Bank Passbook,Bank security,Customer details,Identity card,OTP and Password Security Guard.

References

  1. [1]Barker, K., & Sheridon, P. (2008). mastercard fraud: awareness and bar. Journal of monetary Crime , 15 (4), 398-410.
  2. [2]Dawson, C. (2009). Introduction to analysis ways. London: the way to Books,Ltd.
  3. [3]Degu, G., & Yigzaw, T. (2006). analysis Methodology . Ethiopia: University of Gondar.
  4. [4] Denzin, N. K., & Lincoln, Y. S. (2000). reference book of qualitative analysis ((2nd disfunction.) ed.). Thousand Oaks, CA: Sage.
  5. [5][Ruane, J. M. (2008). necessities of analysis Methods: A Guide to scientific discipline analysis. London: Blackwell Publishers.
  6. [6]ARM7 primarily based sensible ATM Access & Security System exploitation Fingerprint Recognition & GSM Technology Khatmode Ranjit P1 , Kulkarni Ramchandra V2 , Ghodke Bharat S3 , Prof. P. P. Chitte4 , Prof. Anap S. D five one Student of B.E. physics, Pravara Rural engineering faculty, loni, geographic area,
  7. [7]An Improved technique for Extraction of Fingerprint options Jianwei rule, Lifeng Liu, and Tianzi Jiang*, Member, IEEE National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, Peking 100080, P. R. China.
  8. [8]Indian Journal of Science and Technology Supplementary Article ATM Terminal style exploitation Biological Technology by V. Khanaa and avatar Mohanta.
  9. [9]Volume three, No. 11, November 2012 Journal of worldwide analysis in computing analysis PAPER HIGH PROTECTION HUMAN IRIS AUTHENTICATION IN NEW ATM TERMINAL style exploitation biometry MECHANISM.
  10. [10]Neuman, W. L. (2000). Social analysis methods: Qualitative and quantitative aproaches (4th disfunction.)Boston: Allyn and Bacon.
  11. [11]Nwankwo, O. (2013). Implications of Fraud on business Banks Performance in Nigeria.International Journal of Business and Management , 8 (5), 119-125.
  12. [12]Ruane, J. M. (2008). necessities of analysis Methods: A Guide to science analysis. London:Blackwell Publishers.