scholarly journals ATM Shield: Analysis of Multitier Security Issues of ATM in the Context of Bangladesh

2020 ◽  
pp. 22-27
Author(s):  
Md. Raqibul Hasan Rumman ◽  
Atish Sarker ◽  
Md. Majharul Islam ◽  
Md. Imdadul Hoque ◽  
Robin Kuri

Over the last decade, consumers have been largely dependent on and trust the Automatic Teller Machine (ATM) to conveniently meet their banking needs. However, despite the numerous advantages of ATM system, ATM fraud has recently become more widespread. In this paper, we provide an overview of the possible fraudulent activities that may be perpetrated against ATMs and investigates recommended approaches to prevent these types of frauds. In particular, we develop a prototype model for the utilization of three tier security equipped ATM to provide security solutions against must of the well-known breaches. In this research article, the tools and techniques of ATM fraud are contemplated. A secure three layer electronic transaction mechanism of ATM is developed to prevent ATM frauds. In this three layer authentication systems the users can improve ATM security against frauds and crimes.

Learning is a never-ending process since the evolution of mankind. The learning process has brought mankind to breakdown the atom to the formation of space exploration from International Space Station (ISS). There are many supporting tools and techniques to support the teaching and learning process. In this line of tools and techniques, Augmented Reality (AR) has kept the footprint in the educational system after a struggle of 50 years of research. The research in AR has great anticipation in enhancing the educational system by redefining the articulations of the system. It is believed that AR can bring a different perspective on the educational system. This research article shall investigate the facts and reasons from the past that can be attributed to this phenomenon. This article begins with the introduction of the educational system from the traditional method to present practice, the facts & research findings and concludes with the references at the end.


Now a days most of the persons doing their banking transactions, bill payments online through mobile app or web. Almost all the financial institutions are providing second layer of authentication by providing one time password while online transactions. But one the other hand in almost every mobile applications have the features to read your contacts, your locations, your messages not only read but they have the features to write the massages, write the contacts in your contacts list. Are these features really helps us? Are they really for our time saving? In this research article we will see the dark side of these features of our mobile applications.


Author(s):  
David Worth ◽  
Chris Greenough ◽  
Shawn Chin

The purpose of this chapter is to introduce scientific software developers to software engineering tools and techniques that will save them much blood, sweat, and tears and allow them to demonstrate the quality of their software. By introducing ideas around the software development life cycle, source code analysis, documentation, and testing, and touching on best practices, this chapter demonstrates ways in which scientific software can be improved and future developments made easier. This is not a research article on current software engineering methods, nor does it attempt to specify best practices. Its aim is to introduce components that can be built into a tailored process. The chapter draws upon ideas of best practice current in software engineering, but recommends using these only selectively. This is done by presenting details of tools that can be used to implement these ideas and a set of case studies to demonstrate their use.


2021 ◽  
Vol 8 (3) ◽  
pp. 517
Author(s):  
Herri Setiawan ◽  
M. Agus Munandar ◽  
Lastri Widya Astuti

<p class="Abstrak">Masalah keamanan jaringan semakin menjadi perhatian saat ini. Sudah semakin banyak <em>tools</em> maupun teknik yang dapat digunakan untuk masuk kedalam sistem secara ilegal, sehingga membuat lumpuh sistem yang ada. Hal tersebut dapat terjadi karena adanya celah dan tidak adanya sistem keamanan yang melindunginya, sehingga sistem menjadi rentan terhadap serangan. Pengenalan pola serangan di jaringan merupakan salah satu upaya agar serangan tersebut dapat dikenali, sehingga mempermudah administrator jaringan dalam menanganinya apabila terjadi serangan. Salah satu teknik yang dapat digunakan dalam keamanan jaringan<em> </em>karena dapat mendeteksi serangan secara <em>real time</em> adalah <em>Intrusion Detection System</em> (IDS), yang dapat membantu administrator dalam mendeteksi serangan yang datang. Penelitian ini menggunakan metode <em>signatured based </em>dan mengujinya dengan menggunakan simulasi. Paket data yang masuk akan dinilai apakah berbahaya atau tidak, selanjutnya digunakan beberapa <em>rule</em> untuk mencari nilai akurasi terbaik. Beberapa <em>rule</em> yang digunakan berdasarkan hasil <em>training </em>dan uji menghasilakan 60% hasil <em>training </em>dan 50% untuk hasil uji <em>rule</em> 1, 50% hasil <em>training </em>dan 75% hasil uji <em>rule</em> 2, 75% hasil <em>training</em> dan hasil uji rule 3, 25% hasil <em>training </em>dan hasil uji <em>rule </em>4, 50% hasil <em>training</em> dan hasil uji untuk <em>rule</em> 5. Hasil pengujian dengan metode <em>signatured based</em> ini mampu mengenali pola data serangan melaui protokol TCP dan UDP, dan <em>monitoring </em>yang dibuat mampu mendeteksi semua serangan dengan tampilan <em>web base.</em></p><p class="Abstrak"><em><br /></em></p><p class="Abstrak"><strong><em>Abstract</em></strong></p><p class="Abstract"><em>Network security issues are becoming increasingly a concern these days. There are more and more tools and techniques that can be used to enter the system illegally, thus paralyzing the existing system. This can occur due to loopholes and the absence of a security system that protects it so that the system becomes vulnerable to attacks. The recognition of attack patterns on the network is an effort to make these attacks recognizable, making it easier for network administrators to handle them in the event of an attack. One of the techniques that can be used in network security because of a timely attack is the Intrusion Detection System (IDS), which can help administrators in surveillance that comes. This study used a signature-based method and tested it using a simulation. The incoming data packet will be assessed whether it is dangerous or not, then several rules are used to find the best accuracy value. Some rules used are based on the results of training and testing results in 60% training results and 50% for rule 1 test results, 50% training results and 75% rule 2 test results, 75% training results and rule 3 test results, 25% training results and the result of rule 4 test, 50% of training results and test results for rule 5. The test results with the signature-based method can recognize attack data patterns via TCP and UDP protocols, and monitoring is made to be able to detect all attacks with a web-based display.</em></p><p class="Abstrak"><strong><em><br /></em></strong></p>


2021 ◽  
Author(s):  
Mark Ashburner ◽  
Koki Mugabe ◽  
Yathu Mohanathas ◽  
Ahmad Umar ◽  
David Huang ◽  
...  

Abstract Machine learning tools and techniques were utilised to create a Novel Change Detection Algorithm (NCDA) as a supplementary quality assurance tool to alert users to potential significant changes in linear accelerator output using daily measurements. A prototype model was developed and validated that provides a forecast for the daily dose and indicated when there is the potential for the output to change beyond what is considered normal daily drift. The model provided a good fit with the validation dataset used, meaning that trends in daily output were easy to identify.The NCDA can be used either daily whereby output data is manually entered from the QA3 user interface, or on a weekly basis allowing input of the other data which is not traditionally presented on the interface. The NCDA should serve as a tool to alert users when data is trending out of tolerance and inform of possible output adjustments, therefore enabling effective allocation of time and resources.


Author(s):  
David Worth ◽  
Chris Greenough ◽  
Shawn Chin

The purpose of this chapter is to introduce scientific software developers to software engineering tools and techniques that will save them much blood, sweat, and tears and allow them to demonstrate the quality of their software. By introducing ideas around the software development life cycle, source code analysis, documentation, and testing, and touching on best practices, this chapter demonstrates ways in which scientific software can be improved and future developments made easier. This is not a research article on current software engineering methods, nor does it attempt to specify best practices. Its aim is to introduce components that can be built into a tailored process. The chapter draws upon ideas of best practice current in software engineering, but recommends using these only selectively. This is done by presenting details of tools that can be used to implement these ideas and a set of case studies to demonstrate their use.


2018 ◽  
Vol 21 (4) ◽  
pp. 1051-1064
Author(s):  
Ashutosh Shukla ◽  
Sunil Kumar Pandey ◽  
Ashish M. Dubey

Organizational learning is a deep-rooted concept having a diverse body of literature. It primarily discusses ideas built around the philosophy of management of learning and knowledge in a firm. These approaches help an organization to improve its effectiveness and manage sustainability in a relatively dynamic world. This research article is an attempt to present a framework that shall discuss organizational learning in the Indian IT sector. Based on an extensive review of literature, some substantial observations for analysing organizational learning have been presented in this research article. The approach constitutes queries pertaining to reasons to learn, type of learning, management of knowledge within an organization, tools and techniques, values, relevance and end results of learning to come up with a research model that could discuss the metamorphosis of organizational learning in software firms in India.


Sign in / Sign up

Export Citation Format

Share Document