You are on page 1of 2
ATM FRAUDS ‘The fnadtr inserts a fold piece of plastic im into the ATM card slot sot wil hold ofthe card and not allow it tobe expelled bythe machine. The ‘atm believes his or her ard to be caught nthe ‘machine and doesnt nie the ead slat has been tampered ih, (Once an inserted cane strck rater pretend ingas a genuine eardolde wll suggest thatthe in tended Vieuin reenter hit or er security o When the cardholder uimately leaves in despa, the fraudster reeves the ead and enters the code that he has watched clanesinely. Another method involves use of fake cards using data collected ffom tiny cameras and devices called “skimmer.” that capture and record bank account information, This ser risky ast doesnot involve any fa ster-vicim intention and the absence of any feaudser makes the cardholder more relaxed nd lesser consis about the salty of the password Another interesting method of ATM frauds in the use of"dupiate ATM" bythe fat ers that uses software which records the pas ‘words typed on those machines. Three, dp te ards are manufactured and money is with- frawn with the use of olen password, Sometimes ‘such frauds are an inside job withthe collin of| the employees of he company isuig those cad ‘Whatever the mode ofthese frauds But tis def ritly legal and punishable as per the law ofthe concerned county. The punishment may, however, not bring back the money est inthe proces. Thus, the punishment of an offender will though prove Jeterent to other offenders yet it may not be the best method of restoration of stolen propery. Thus preventive safeguards and nsuring the ATM fraud seems to Be he righ approach, faor%e SBT Sey waw VOR on rar Reerpeperienneemenryen epee) mei ee ee ee Ree ets eee neh ee at pam Ore Orr wey ann eter tet Ce ee ed sre thete reno unusual or unauthorized transactions. Federal ee pert eer Coen tt eer eet pray ey ee eee! are eh ay Tenet et ee ere eee Peete eee eee reseed the ATM is located ee eee ee ea See eee ei Automated Teller Machine ‘The Automated Teller Machine (ATM) was fst com- rercialyitoduced inthe 1960s. By 2005, there were ‘over 15 milion ATMs installed worldwide, The intro- oeton ofthe ATM proved to be an important techno- logical development tat enabled financial instatons to provide services to ther easter in 24XT env ronment The ATM his enhanced the convenience of «customers by enabling ther to gees thir ash wher- ‘ver aquired fom the nearest ATM, Financial istiuions have implemented many stat- isto upgrade the secur at hei ATMS and reduce ‘Scope fr faud. These inclade choosing safe location for installing the ATM, installation of surveillance video cameras, emote montring,an-card skimming Solutions, and increasing consumer awareness by in- Forming them of various methods of safeguarding het personal information while transacting tthe ATM or fn the Inter. A majorrof forthe Awareness of eber security hasbeen, and will continue to be, to leverage existing awareness and in- ‘esse efforts and ¥ initiate and enhance public awareness Promoting a secure eyberspace isthe responsibly of every citizen al levels of government academia, and nds, tiles of size or sector The list of key sakeholder involved Jn th solution simile, and therefore, the sation wil ony ome srs of eoordtatod, publie-pevate partnerships ‘Theres noo to develop 2 national awareness campaign and a strategy 10 make public and communicate eamass 10 the ‘scademia and private industry across the country abou the in- orance of eyber security and thei ole in enhancing security. ‘Recognizing the role of school students, teachers, and schools and universities a strategy hus bee created to bring eer se- curity dietly to them In addition, we have to moblize dedi- ated state and local public servants take shared responsibi- fy in enhancing eyber security awareness in tate and local vermont agente thigh each tte Information Security Education and Awareness (ISEA) pro- ‘gram of Deparment of Information Technology, Goverment fof nia is exscued by Centre for Development of Advanced Computing (C-DAC), Hyderabad Program By Information Security Education and Awareness (ISEA) Deparment of information Technology Ministry of Communications and Information Technology Government of India Banking Tips ais ‘Enable your mobilephone number and email with your banking transactions for timely SMS_ and mal alert. ‘Your Financia Institution or Bank will never send youn email asking you o eater your Banking de- tals online (Check regularly your eredit card or bank account als and kep track of your transactions. Update your details sich as change of adress for receipt of cheque books, statements, debit credit card a the ight adress. For protesting phishing atacks, your browser shouldbe enable with phishing fillers and ever ‘lik inks in your email for updating and ears ‘Koopa strong and easy to remember password and changeit rogulay. Vishing is form of phishing, where instead of peopl reesving an email tying to lure them into ving personal information, the criminal uses a hone call, ether live or aulomatod, to attack the bunk reed unin customer and ge critical infor- ‘ryt restrict yousl rom giving persona infor mation when You receive ell Irom ¢ Bank or (Credit Cad Provider Executed By Centre or Development of Aevanced Compuaing {INTU-Hyerabad Campus Kukapally Hyderabad 300 085 Tol: 040-25150118 Fax: 40-28150117 ‘emat: lsea@edac.in

You might also like