ATM FRAUDS
‘The fnadtr inserts a fold piece of plastic im
into the ATM card slot sot wil hold ofthe card
and not allow it tobe expelled bythe machine. The
‘atm believes his or her ard to be caught nthe
‘machine and doesnt nie the ead slat has been
tampered ih,
(Once an inserted cane strck rater pretend
ingas a genuine eardolde wll suggest thatthe in
tended Vieuin reenter hit or er security o
When the cardholder uimately leaves in despa,
the fraudster reeves the ead and enters the code
that he has watched clanesinely. Another method
involves use of fake cards using data collected
ffom tiny cameras and devices called “skimmer.”
that capture and record bank account information,
This ser risky ast doesnot involve any fa
ster-vicim intention and the absence of any
feaudser makes the cardholder more relaxed nd
lesser consis about the salty of the password
Another interesting method of ATM frauds in
the use of"dupiate ATM" bythe fat
ers that uses software which records the pas
‘words typed on those machines. Three, dp
te ards are manufactured and money is with-
frawn with the use of olen password, Sometimes
‘such frauds are an inside job withthe collin of|
the employees of he company isuig those cad
‘Whatever the mode ofthese frauds But tis def
ritly legal and punishable as per the law ofthe
concerned county. The punishment may, however,
not bring back the money est inthe proces. Thus,
the punishment of an offender will though prove
Jeterent to other offenders yet it may not be the
best method of restoration of stolen propery. Thus
preventive safeguards and nsuring the ATM fraud
seems to Be he righ approach,
faor%e
SBT Sey waw VOR on
rar Reerpeperienneemenryen epee)
mei
ee ee ee
Ree ets
eee neh ee at
pam Ore Orr wey ann
eter tet
Ce ee ed
sre thete reno unusual or unauthorized transactions. Federal
ee pert eer
Coen tt eer eet
pray ey
ee eee!
are eh ay Tenet
et ee ere eee
Peete eee eee reseed
the ATM is located
ee eee ee
ea See eee eiAutomated Teller Machine
‘The Automated Teller Machine (ATM) was fst com-
rercialyitoduced inthe 1960s. By 2005, there were
‘over 15 milion ATMs installed worldwide, The intro-
oeton ofthe ATM proved to be an important techno-
logical development tat enabled financial instatons
to provide services to ther easter in 24XT env
ronment The ATM his enhanced the convenience of
«customers by enabling ther to gees thir ash wher-
‘ver aquired fom the nearest ATM,
Financial istiuions have implemented many stat-
isto upgrade the secur at hei ATMS and reduce
‘Scope fr faud. These inclade choosing safe location
for installing the ATM, installation of surveillance
video cameras, emote montring,an-card skimming
Solutions, and increasing consumer awareness by in-
Forming them of various methods of safeguarding het
personal information while transacting tthe ATM or
fn the Inter.
A majorrof forthe Awareness of eber security hasbeen, and
will continue to be, to leverage existing awareness and in-
‘esse efforts and ¥ initiate and enhance public awareness
Promoting a secure eyberspace isthe responsibly of every
citizen al levels of government academia, and nds,
tiles of size or sector The list of key sakeholder involved
Jn th solution simile, and therefore, the sation wil ony
ome srs of eoordtatod, publie-pevate partnerships
‘Theres noo to develop 2 national awareness campaign and a
strategy 10 make public and communicate eamass 10 the
‘scademia and private industry across the country abou the in-
orance of eyber security and thei ole in enhancing security.
‘Recognizing the role of school students, teachers, and schools
and universities a strategy hus bee created to bring eer se-
curity dietly to them In addition, we have to moblize dedi-
ated state and local public servants take shared responsibi-
fy in enhancing eyber security awareness in tate and local
vermont agente thigh each tte
Information Security Education and Awareness (ISEA) pro-
‘gram of Deparment of Information Technology, Goverment
fof nia is exscued by Centre for Development of Advanced
Computing (C-DAC), Hyderabad
Program By
Information Security Education and Awareness (ISEA)
Deparment of information Technology
Ministry of Communications and Information
Technology
Government of India
Banking Tips ais
‘Enable your mobilephone number and email with
your banking transactions for timely SMS_ and
mal alert.
‘Your Financia Institution or Bank will never send
youn email asking you o eater your Banking de-
tals online
(Check regularly your eredit card or bank account
als and kep track of your transactions.
Update your details sich as change of adress for
receipt of cheque books, statements, debit credit
card a the ight adress.
For protesting phishing atacks, your browser
shouldbe enable with phishing fillers and ever
‘lik inks in your email for updating and ears
‘Koopa strong and easy to remember password and
changeit rogulay.
Vishing is form of phishing, where instead of
peopl reesving an email tying to lure them into
ving personal information, the criminal uses a
hone call, ether live or aulomatod, to attack the
bunk reed unin customer and ge critical infor-
‘ryt restrict yousl rom giving persona infor
mation when You receive ell Irom ¢ Bank or
(Credit Cad Provider
Executed By
Centre or Development of Aevanced Compuaing
{INTU-Hyerabad Campus Kukapally
Hyderabad 300 085
Tol: 040-25150118 Fax: 40-28150117
‘emat: lsea@edac.in