Security is one of the most important aspects that we demand from each service we use everyday in the highly developed technological world and especially in the World Wide Web. How much secure are we? How much dangerous the insecurity might be? It mostly depends on the sphere and the level of threats, whether privacy is under threat or our personal details as consumers of the banks are expected to be reachable by hackers. According to IP-ATM Security banks and financial institutions are failing to properly secure their ATMs. IP-ATM Security identifies three main threats to ATMs. These are:
Internet protocol (IP) worms;
Disruption of the IP network and denial of service;
The harvesting of consumers’ transaction data for malicious purposes
The harvesting of consumers’ transaction data for malicious purposes gives opportunities to hackers collect consumers’ personal details, their card number, account balance and transaction history.
According to the SourceWire press release there are several reasons ATMs have become less secure. One of them is the way in which ATMs operate. ATMs hardware platforms with proprietary software and communications protocols have been migrated to commodity-embedded hardware platforms (essentially PC-based with Intel microprocessors), commodity operating systems (primarily Window and Linux), and standard IP networking. “70 per cent of current ATMs are now based on PC/Intel hardware and commodity operating systems (mostly Windows XP embedded) and this trend is expected to continue. Essentially, these new ATMs are PCs that are running PC operating systems, using the standard Internet Protocol (IP) with some additional peripherals housed in a secure vault-like box.”
No change is done if there are not advantages in the newer system. Among the advantages of the new system are: cost; performance; flexibility; standardization and enhanced functionality
And there is no coin with one side. Advantages are faded by threats the name of that is “hackers.”
2008 analysis of ATM network traffic by Network Box “found that only the PIN number was encrypted and that a large portion of the traffic travelled in plain text, leaving card numbers, card expiry dates, transaction amounts and account balances clearly readable. Therefore, a hacker needs only to access some part of the IP network between the IP-ATM and the payment processor to be privy to the aforementioned details.”ATM finds the most effective way to solve the issues is to use a multifunction device with:
Routing,
Firewall,
IDS/IPS,
VPN capabilities,
Protecting, the ATM network.
The specifics of the network are:
Separate from the rest of the bank’s network, monitor and control.
Encrypt all traffic coming out of the ATM machinesThe growth of the ATM marketAccording to SourceWire Mark Webb-Johnson, CTO of Network Box, comments: “Most people simply assume that because an ATM is invariably provided by a bank, the transactions and the data being transmitted must be secure. This assumption may have been true in the past, but today ATMs operate in a way that makes them far more susceptible to attack. “We’ve already seen in August 2003 how the Nachi (aka Welchia) Internet worm crossed over into ‘secure’ networks and infected ATMs for two financial institutions; and we’ve witnessed the SQL Slammer (aka Sapphire) worm indirectly shutdown 13,000 Bank of America ATMs. The chances are that if banks don’t use technology that can actually provide an effective level of protection – technology that is already on the market – then it is very likely that more high-profile attacks are to follow.”
Most Trendings
-
A former prisoner of the Pentridge Prison, Melbourne, Australia, decided to buy his own jail cell, where he had spent several years for frau...
-
When shopping for phone or tablet consumers will have a variety of choices that would determine which brand which model they will choose....
-
The Blogvasion.com Family of Blogs offers you an affordable and effective Internet advertising programs. Currently the Blogvasion.com family...
-
Listen to the latest entertainment news and celebrity gossip, or get politics, world news and sports audio content that you can personalize....
-
If you want to kick-start your career with a coveted job in an IT company of your choice, you need to do more than earning the required cr...
Popular Posts
-
The Blogvasion.com Family of Blogs offers you an affordable and effective Internet advertising programs. Currently the Blogvasion.com family...
-
A former prisoner of the Pentridge Prison, Melbourne, Australia, decided to buy his own jail cell, where he had spent several years for frau...
-
Pilar Stofega, a 34-year old resident of Waterford, Connecticut, was charged with the attempt to destroy her ex-lover’s marriage by using in...
-
Once EE launches the first 4G service in the UK the online gaming industry is expecting to see a huge boost in the number of people accessi...
-
No need for traveling to the North Pole to inform Santa about the wishes you have, no need to send a letter, and no need to ... But just onl...
-
The consumer electronics industry has for many years now tried to shoe-horn a game (some would say game-like) experience on the mobile phone...
-
Corporate Telecommunications presents the service that gives the users opportunity to diagnose their headsets: who is using which headset, w...
-
Japanese business etiquette is the subject of entire books - mostly written by people who have not been to Japan since the 1970s and want u...
-
It is hardly imaginable to be a parent and have no concerns about the influences that environment has over youngster. In a highly competitiv...
-
Recently the UK researchers browsed the various legislations in search of the most ludicrous laws. The results were submitted to polling. He...
0 comments :
Post a Comment