Abstract

Large data collections are stored by people in the modern world utilizing computers. Data may be sent across the globe at a reasonable cost. ATM's have been in use for almost 50 years now since their introduction. Since its introduction, ATM's have made it possible to withdraw money without encountering any problems. In the banking industry, the ability of ATM's to be installed in any location is seen as exceptional since it allows customers the freedom to conduct transactions on their own. While the cash dispenser and visual screen serve as output devices, the card reader and keyboard serve as input devices. Many ATM's can work together on a common level through the host processor, which is owned by the bank. Authenticated Banks provide unique ATM PINS to their customers. The registered phone number is used to send these ATM PINS. if someone saw the PIN notice on the user's phone and knows the card data. They can then access the client's account in full and may be held accountable for any criminal activity that occurs. Criminals have developed a variety of schemes to steal money from ATM’s. Due to strict security measures around the money compartment, they are unable to simply steal cash from an ATM; instead, they swipe the cards of several customers. It is far easier to obtain ATM card data than to breach the ATM's security. The practice of card skimming is one that con artists frequently employ. On the card per user space of ATM’s, card skimmers are implemented. The data is stored in the memory of the card skimmer and is seen by an electrical circuit on a visually appealing portion of the card. After driving the skimmer out of the ATM, the criminals later duplicate this data. Card skimmers are designed to fit perfectly over each user's unique cards, making it easy for clients to become victims of them.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call