Editorial Notes
NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the ICIA 2016 Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM's investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.
ABSTRACT
The introduction of ATM is an important technological development for the financial institutions which has made the banks to provide a 24/7 customer service. They have become a convenient way of doing the financial transactions for both banks and the customers. Customers can use the ATM's service at any time. But this technological development has also lead to more number of criminal activities. The frauds in attacking the ATM Machine and Skimming the information of the card details have increased more. This has become a big problem for the financial institutions to protect their customer's money from being stolen by the attackers. Though various security measures is been followed by the banks to protect the cash in the ATM machine and the customers card information the fraudsters are more smart than the banks. The ATM environment should be monitored continuously for security purpose and they should act according to the context of the environment that will change for each and every customer. The ATM should be smart enough to sense the persons coming inside and the situation that is happening in the environment at that time. People entering the ATM will be with different emotions. If the emotions is been sensed then the environment itself can identify whether any critical activity is been carried out by the person. If any critical activity is sensed the environment can act smartly by carrying the remedial activities provided for the situation. Thus the ATM can be protected better from the attackers.
- A report on awareness of ATM Threats to Parents by CDAC, available at http://www.infosecawareness.in/parents/atm-threats, May 2016.Google Scholar
- A report on the Interview with Chuck Somers, VP of ATM Security, Diebold on march 9, 2011 available at http://www.bankinfosecurity.in/interviews/atm-security-3-key- vulnerabilities-i-1027.Google Scholar
- Checker ATM Security report, "Protect your automatic teller machines against logical fraud", GMV Soluciones Globales Internet, S.AU, 2011.Google Scholar
- Steven D' Alfonso, "ATM Malware: The Next Generation of ATM Attacks", https://securityintelligence.com/atm-malware-the-next-generation-of-atm-attacks/Google Scholar
- A report by RACHELL DELUCA on June 21, 2012 published by SSMMagazine, available at http://www.securitysolutionsmagazine.biz/2012/06/21/ramraidingthebiggestthreattoatmsecurity/Google Scholar
- Security news on Banking Threats: ATM Malware Used to Hack Machines, on 28th October, 2014, available at http://www.trendmicro.com/vinfo/us/security/news/October 2014.Google Scholar
- Sunil R. Udupa, "ATM Security Digest India, Skimming- the global threat", Securens Systems Pvt. Ltd, Edition 2, December 2011.Google Scholar
- A report on Internet Security Threat by Kaspersky Lab, available at http://www.kaspersky.com/internetsecuritycenter/threats/Tyupkin-malware-atm-security-malware.Google Scholar
- A report on ATM Security by Linda McGlasson on January 30, 2008, available at http://www.bankinfosecurity.in/atmsecuritycustomersmachinesareatriska686.Google Scholar
- S. Kouah, D. E. Saïdouni and J. M. Ilié, "Synchronized Petri Net: A Formal Specification Model for Multi Agent Systems", Journal of Software, Vol. 8, no.3, pp. 587--602, ISSN: 1796-217X, 2013.Google ScholarCross Ref
- Vinai George Bijuand Santanu Kumar Rath, "CPN Tools as a Supplement to UML for Validation of Software Requirements", Proceedings of the 4th National Conference, INDIA, Com-2010, 2010.Google Scholar
Recommendations
Human Body and Face Detection based Anti-shoulder Attack System on ATM
BDIOT '17: Proceedings of the International Conference on Big Data and Internet of ThingSelf-service bank including ATM has become a part of people's daily life. However, the concomitant insecurity factors including PIN number stolen caused by shoulder surfing attack can lead to great lose. Considering that ATM is all equipped with cameras ...
Smart home context awareness based on Smart and Innovative Cities
EANN '15: Proceedings of the 16th International Conference on Engineering Applications of Neural Networks (INNS)In the emerging Smart Cities - Smart Homes computing paradigms developing a formalization for context information is increasingly important. In the present paper, basedon the EU FIRE research project "Social and Smart" we aim to formalize and build a ...
Smart Environment Authentication: Multi-domain Authentication, Authorization, Security Policy for Pervasive Network
UMC '08: Proceedings of the 2008 International Symposium on Ubiquitous Multimedia ComputingAs a number of home network services are available and smart environment is expanding into ubiquitous computing environment, we need to protect smart environment system from illegal accesses and a variety of threats. Smart environment is exposed to ...
Comments