On reinforcing automatic teller machine (ATM) transaction authentication security process by imposing behavioral biometrics

Author(s):  
Prakash Chandra Mondal ◽  
Rupam Deb ◽  
Md. Nasim Adnan
2020 ◽  
Author(s):  
Cátia Santos-Pereira

BACKGROUND GDPR was scheduled to be formally adopted in 2016 with EU member states being given two years to implement it (May 2018). Given the sensitive nature of the personal data that healthcare organization process on a 24/7 basis, it is critical that the protection of that data in a hospital environment is given the high priority that data protection legislation (GDPR) requires. OBJECTIVE This study addresses the state of Public Portuguese hospitals regarding GDPR compliance in the moment of GDPR preparation period (2016-2018) before the enforcement in 25 May 2018, and what activities have started since then. The study focuses in three GDPR articles namely 5, 25 and 32, concerning authentication security, identity management processes and audit trail themes. METHODS The study was conducted between 2017 and 2019 in five Portuguese Public Hospitals (each different in complexity). In each hospital, six categories of information systems critical to health institutions were included in the study, trying to cover the main health information systems available and common to hospitals (ADT, EPR, PMS, RIS, LIS and DSS). It was conducted interviews in two phases (before and after GDPR enforcement) with the objective to identify the maturity of information systems of each hospital regarding authentication security, identity management processes and traceability and efforts in progress to avoid security issues. RESULTS A total of 5 hospitals were included in this study and the results of this study highlight the hospitals privacy maturity, in general, the hospitals studied where very far from complying with the security measures selected (before May 2018). Session account lock and password history policy were the poorest issues, and, on the other hand, store encrypted passwords was the best issue. With the enforcement of GDPR these hospitals started a set of initiatives to fill this gap, this is made specifically for means of making the whole process as transparent and trustworthy as possible and trying to avoid the huge fines. CONCLUSIONS We are still very far from having GDPR compliant systems and Institutions efforts are being done. The first step to align an organization with GDPR should be an initial audit of all system. This work collaborates with the initial security audit of the hospitals that belong to this study.


2021 ◽  
pp. 1-13
Author(s):  
Muhammad Rafi ◽  
Mohammad Taha Wahab ◽  
Muhammad Bilal Khan ◽  
Hani Raza

Automatic Teller Machine (ATM) are still largely used to dispense cash to the customers. ATM cash replenishment is a process of refilling ATM machine with a specific amount of cash. Due to vacillating users demands and seasonal patterns, it is a very challenging problem for the financial institutions to keep the optimal amount of cash for each ATM. In this paper, we present a time series model based on Auto Regressive Integrated Moving Average (ARIMA) technique called Time Series ARIMA Model for ATM (TASM4ATM). This study used ATM back-end refilling historical data from 6 different financial organizations in Pakistan. There are 2040 distinct ATMs and 18 month of replenishment data from these ATMs are used to train the proposed model. The model is compared with the state-of- the-art models like Recurrent Neural Network (RNN) and Amazon’s DeepAR model. Two approaches are used for forecasting (i) Single ATM and (ii) clusters of ATMs (In which ATMs are clustered with similar cash-demands). The Mean Absolute Percentage Error (MAPE) and Symmetric Mean Absolute Percentage Error (SMAPE) are used to evaluate the models. The suggested model produces far better forecasting as compared to the models in comparison and produced an average of 7.86/7.99 values for MAPE/SMAPE errors on individual ATMs and average of 6.57/6.64 values for MAPE/SMAPE errors on clusters of ATMs.


2018 ◽  
Vol 7 (2.22) ◽  
pp. 35
Author(s):  
Kavitha M ◽  
Mohamed Mansoor Roomi S ◽  
K Priya ◽  
Bavithra Devi K

The Automatic Teller Machine plays an important role in the modern economic society. ATM centers are located in remote central which are at high risk due to the increasing crime rate and robbery.These ATM centers assist with surveillance techniques to provide protection. Even after installing the surveillance mechanism, the robbers fool the security system by hiding their face using mask/helmet. Henceforth, an automatic mask detection algorithm is required to, alert when the ATM is at risk. In this work, the Gaussian Mixture Model (GMM) is applied for foreground detection to extract the regions of interest (ROI) i.e. Human being. Face region is acquired from the foreground region through  the torso partitioning and applying Viola-Jones algorithm in this search space. Parts of the face such as Eye pair, Nose, and Mouth are extracted and a state model is developed to detect  mask.  


2020 ◽  
Vol 1 (1) ◽  
pp. 201-206
Author(s):  
Ida Ayu Gede Kristina Dewi ◽  
I Nyoman Gede Sugiartha ◽  
Ida Ayu Putu Widiati

Nowadays, advances in technology and information, criminal acts also often occur, automatic teller machines (ATMs) in the banking world are a form of Bank Customer Service that uses machines or can be said as well as electronic devices. Service is an important factor in attracting the attention of customers. Because of this technological sophistication as we know cyber crime, crime is a new form of contemporary crime that has been in the spotlight worldwide. Internet users here become victims because of crime through this electronic system by utilizing and seeing their virtual. In this research, there are at least two problems of violating the automatic cash register (ATM) account theft account: And (2) how is the judge's consideration in determining the crime of bank robbery through an ATM. The research method used is information retrieval using a normative approach based on legal sources, study of literature in studying the legal materials of the legislation as a process to find the rule of law, legal source collection techniques used in this research are records and documentation. Based on research it can be started that the criminal sanctions regulation against account robbery criminal acts. Through the Automatic teller Machine (ATM) in the Criminal Code law contained in Article 362 of the Criminal Code, in the ITE Law the theft is contained in Article 30 paragraph (1), Article 30 paragraph (3), Article 32 paragraph (2), Article 32 paragraph (3 ), Article 36. And there is an addition to Law Number 3 of 2011 concerning the transfer of theft funds contained in Article 81, Article 83 paragraph (1), Article 83 paragraph (2), decision number: 688 / PID. B / 2012 / PN. The judge ruled the case that the defendant was firmly proven legally and convincingly guilty of committing a crime against the law of buying, renting, exchanging, accepting as a promise, accepting as a gift or by accepting as a gift or in the hope of getting a profit selling, saving, exchanging, mortgaging, transported, stored or hidden items.


2016 ◽  
Vol 2 (3) ◽  
pp. 520
Author(s):  
Nooruldeen Nasih Qader

Newly released researches disclose the need of canceling the incorrect opinion; security by Password (PW) is dead and proves that these believe has been hurtful. Moreover, recommended a campaign prioritize strategies of building PW. Considering the PW features such as costless, maturity and vast experiences, and usability PW continues to be the most used options in Information Security (IS), it is furthermore, consider most challengers to researchers and really needs further boosting. PWs control authentication mechanism of IS, requiring that individuals choose strong PW. The best advice to protect from hackers is randomly generating unique PW for every site and service, to apply this advice we need more techniques of easy to remember and hard to guess. This study proposed a bunch of easy to remember techniques for building a strong PW. Also, it exhibited the importance of similar strategy despite existing of many helpful PW managers. On the other hand, this paper compiled and analyzed today’s data regarding authenticating secure systems via PW. Analyzed data showed some of common weakness in PW selection. Moreover, gathered information and evaluated data indicated the need of boosting PW. Proposed techniques and solutions enable individuals to select appropriate PW easily.


Author(s):  
Jesœs Solano ◽  
Lizzy Tengana ◽  
Alejandra Castelblanco ◽  
Esteban Rivera ◽  
Christian Lopez ◽  
...  

2021 ◽  
Vol 1 (3) ◽  
pp. 470-495
Author(s):  
Md Shopon ◽  
Sanjida Nasreen Tumpa ◽  
Yajurv Bhatia ◽  
K. N. Pavan Kumar ◽  
Marina L. Gavrilova

Biometric de-identification is an emerging topic of research within the information security domain that integrates privacy considerations with biometric system development. A comprehensive overview of research in the context of authentication applications spanning physiological, behavioral, and social-behavioral biometric systems and their privacy considerations is discussed. Three categories of biometric de-identification are introduced, namely complete de-identification, auxiliary biometric preserving de-identification, and traditional biometric preserving de-identification. An overview of biometric de-identification in emerging domains such as sensor-based biometrics, social behavioral biometrics, psychological user profile identification, and aesthetic-based biometrics is presented. The article concludes with open questions and provides a rich avenue for subsequent explorations of biometric de-identification in the context of information privacy.


Sign in / Sign up

Export Citation Format

Share Document