You are on page 1of 3

Chapter 1 I.

Introduction Definition of ATM An ATM is an electronic device which allows a bank's customer to make cash withdrawals and check their account balance at any time without the need for a human teller. Many ATMs also allow depositing cash or cheques, transfer money between their banks. The World's first ATM was installed in ENFIELD town in the London on June 27, 1967 by Barclays bank. ATMs are known by various other names including Automated Transaction Machine, automated banking machine, cash point (in Britain),money machine, bank machine, cash machine, hole-in-the-wall, Bancomat (in various countries in Europe and Russia), Multibanco (after a registered trade mark, in Portugal), and Any Time Money (in India). An automated teller machine or automatic teller machine (ATM), also known as an automated banking machine (ABM) in Canada, and a Cash point (which is a trademark of Lloyds TSB), cash machine or sometimes a hole in the wall in British English, is a computerised telecommunications device that provides the clients of a financial institution with access to financial transactions in a public space without the need for a cashier, human clerk or bank teller. ATMs are known by various other names including ATM machine, automated banking machine, and various regional variants derived from trademarks on ATM systems held by particular banks

1.1 Rationale of Research This research is intended to lend informations about ATM, on how it works, how does it manages each transaction and to know what are the security features of ATM.

1.2 Statement of the Problem Many of us only know how to use ATM cards and ATMs but the mere fact is we usually dont know how does the transactions inside and out being processed and we dont know the security features of it. 1. 2. 3. 4. Creation of ATMs Why does ATM exits? For what cause? What is the assurance of users in using ATM? What are the security features of ATM?

1.3 Objectives This document identifies security guidelines for ATMs, considering the protection that can be provided by the hardware and the software of the ATM itself against attacks aimed at compromising sensitive data acquired, stored, exported, or in any way processed by the device.

1.4 Method The conduct this research, I used the following methods: Survey Method: I will try to use Survey Method to identify the statistic of the ATM users and to know the feedback. Observational Method: I will use this method to observe and to take down notes about the subject.

Library Method: I will use library as one of my references. I will also use this to identify different terminologies and also internet.

You might also like