Discuss about the Security Enhancement of ATM System.
The main work of the Automated Teller Machine is to help the clients enabling them to access their own bank account without visiting the bank. With online concepts, the development of the application is possible (Ahmad, Rifen & Wahab, 2016). After implementing the ATM system, the user can use the service of the ATM system and can view all the information regarding their bank details. The ATM system also provides services such as requesting for cheques, depositing cash, and all other advanced tasks that the user wants to proceed with the ATM system. The data in the ATM is stored in the database and can be retrieved when needed. The implementation of the ATM needs hardware so that they may operate on the system.
In this report, the details of ATM machine are discussed in detailed. The ATM machine has many functional requirements and non-functional requirements that are needed to built up an ATM system. The case study involved with this report is the ATM system of the Collin’s Bank. A use case diagram showing the system of the ATM is detailed in this report, along with a UML class diagram of the system. These diagrams show all the tasks and processes that are included in the ATM system. In order to develop the software of SDLC, a developer has to go through different processes involved in the life cycle of the development. All those processes are described in this report showing all the design activities including environment, designing application components, user interfaces, the database, and software methods.
The functional requirement of an ATM system includes all the features that the ATM system performs. The functional requirement includes all the processes that the system of ATM carries out so that they can satisfy fundamental reason for their existence. All the actions process that an ATM system includes is involved as the functional requirement of the system (Bahill & Madni, 2017). The ATM system performs many functional processes while carrying out a transaction with the user. The functional requirement of the proposed ATM system includes the following.
The non-functional requirements of an ATM system are basically the properties that the ATM system must have (Duvey, Goyal & Hemrajani, 2013). The qualities or the characteristics that the ATM system processes to make the system usable, attractive, reliable, and fast are the non-functional requirements. The non-functional requirements in a system describe character of work the system does. The functionality of the product remains same with the nonfunctional requirement. The non-functional requirements that are included in the ATM system are as follows.
The case that is given in this report is the ATM system of the Collin’s Bank that ahs to perform the online transaction for its entire customer. The above diagram shows the use case diagram for the process of depositing money in the ATM system. The ATM system has the capability to withdraw cash, deposit money, transfer funds, check balance, and can change pin on request.
The actors who are involved in the ATM system are the customers, and the technicians. The customers from the bank can avail the system of the ATM.
A system can take only one card as an input at a time, and only one transaction is possible at a time with the machine (Gaspar et al., 2016). The user can input the password for only one card.
The preconditions that are to be satisfied with the Collin’s Bank account are that the system should be in a working state.
After the transaction is completed successfully, a receipt is generated if the user wants to take a printed slip from the system. A transaction details receipt is to be received from the ATM machine for the transaction that is done.
The Software Development Life Cycle is structure or a framework that helps the tasks to be done properly and carry out all the procedures that are involved in developing the software. The procedures are to be detailed in the SDLC software development procedure (Hossian, Nawaz & Grihan 2013). There are different types of procedures that are involved while developing software. SDLC involves all such activities. Five activities that are involved in the development Life Cycle of the Software are the planning stage, testing stage, deployment stage, implementation and maintenance
Planning: The preliminary work of developing software is done in the planning stage. All the procedures that are to be followed for the development process is done in planning (Kim, Jeong & Park, 2016). The information is gathered, requirement and analysis is done, and development process is involved in the software.
Testing: In testing phase, the testing is done after development of the software. When the system is being built, the testing is made partially to avoid any kind of problem afterwards.
Development: When the client approves the software, then only the deployment process is done (Okokpujie et al., 2016). The software deployment is done after the software is designed and is completed.
Implementation: The software is being implemented after all the process is being completed. All the procedures for building up the software system are to be followed for implementing the software.
Maintenance: For maintaining the software that is made, proper maintenance process is to be maintained (Patoliya & Desai, 2017). The maintenance procedure is very much time taking, and the software or the system is to be maintained throughout the life of the system. All other activities in the SDLC method generally last for a fixed period of time, but the maintenance activity is to be maintained for lifelong of the software.
The environment that is to be followed while designing the software is the design state as well as planning stage. Both the design state and planning stage are involved in System Development Life Cycle (Prasanthi et al., 2014). The software analysis is done through the planning process. For the transaction to be carried out properly there should be suitable environment in the SDLC model of software development. Many processes are carried out in the SDLC model of the software development. Other than the SDLC model, there is also another model known as Integrated Development Environment. Different processes are being carried out with the IDE model of system development.
There are many components involved in the development of the system. The designing components help to establish a successful communication in between the system software and the user who is using the software. There is a key-switch in the ATM that is used to make the ATM machine turn on and turn off (Raj & Julian, 2015). The card reader also falls under the component of software application, which takes the card as an input in the system. The keypad helps to input any number or functions that are present with the system.
There should be a proper user interface between the ATM system and the user who is using the system so that the transaction is successfully carried out. The keypad helps to establish a conversation in between machine and the user. This interaction is called Human Computer Interaction.
The ATM system has a database connected with them. The transaction that is done with the ATM is being noted in the database and the same database is forwarded to the database of the bank (Risodkar et al., 2017). The bank’s database and the ATM’s database is connected with each other. All gets updated as soon as a transaction takes place.
Different banks follow different software for the transaction. The software that is used for carrying out the transaction process has different kinds of resources involved in it. The database of the software that is to be used is Oracle for storing all the information.
References
Ahmad, N., Rifen, A. A. M., & Wahab, M. H. A. (2016, November). AES Cardless Automatic Teller Machine (ATM) Biometric Security System Design Using FPGA Implementation. In IOP Conference Series: Materials Science and Engineering (Vol. 160, No. 1, p. 012113). IOP Publishing.
Bahill, A. T., & Madni, A. M. (2017). Discovering system requirements. In Tradeoff Decisions in System Design (pp. 373-457). Springer, Cham.
Buede, D. M., & Miller, W. D. (2016). The engineering design of systems: models and methods. John Wiley & Sons.
Duvey, A. A., Goyal, D., &Hemrajani, D. N. (2013). A reliable ATM protocol and comparative analysis on various parameters with other ATM protocols. International Journal of Communication and Computer Technologies, 1(56), 192-197.
García, D. V., Otte, A., Willemsen, A. T., Dierckx, R. A., Doorduin, J., & Holstege, G. (2015). Altered Regional Cerebral Blood Flow in Chronic Whiplash Associated Disorder. PET Imaging of Mild Traumatic Brain Injury and Whiplash Associated Disorder, 149.
Gardi, A., Sabatini, R., Ramasamy, S., & Marino, M. (2015). Automated ATM system for 4-dimensional trajectory based operations. In AIAC16: 16th Australian International Aerospace Congress (p. 190). Engineers Australia.
Gaspar, A., Bari, A. G., Kumar, A. N., Bucci, A., Wiegand, R. P., & Albert, J. L. (2016, November). Evolutionary Practice Problems Generation: Design Guidelines. In Tools with Artificial Intelligence (ICTAI), 2016 IEEE 28th International Conference on (pp. 544-548). IEEE.
Hossian, F. S., Nawaz, A., &Grihan, K. (2013). Biometric authentication scheme for ATM banking system using energy efficient AES processor. International Journal of Information and Computer Science, 2(4), 57-63.
Kim, Y. H., Jeong, B. Y., & Park, M. H. (2016). Universal User Interface Design of ATM Touch Screen Based on the Reaction Time. Journal of the Ergonomics Society of Korea, 35(5).
Okokpujie, K., Olajide, F., John, S., & Kennedy, C. G. (2016, January). Implementation of the enhanced fingerprint authentication in the ATM system using ATmega128. In Proceedings of the International Conference on Security and Management (SAM) (p. 258). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
Patoliya, J. J., & Desai, M. M. (2017, April). Face detection based ATM security system using embedded Linux platform. In Convergence in Technology (I2CT), 2017 2nd International Conference for (pp. 74-78). IEEE.
Prasanthi, B. V., Jyothi, U. P., Sridevi, B., & Krishna, T. V. (2014). Security Enhancement of ATM System with Fingerprint and DNA Data. International Journal of Advanced Research in Computer Science and Software Engineering.
Raj, M. M. E., & Julian, A. (2015, March). Design and implementation of anti-theft ATM machine using embedded management. In Circuit, Power and Computing Technologies (ICCPCT), 2015 International Conference on (pp. 1-5). IEEE.
Risodkar, Y. R., Pawar, A. B., Chavanke, S. N., & Pawar, A. S. (2017). ATM Authentication with Enhance Security Using GSM. Journal of Science and Technology (JST), 2(5), 01-05.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download