No best solution in the security field?

Source: Internet
Author: User
Keywords Information security security policy
Tags access credit credit card credit card information data financial financial services information
The Federal Bank (Australian Financial services provider) has published a report entitled "Access to ATM card information and PIN numbers". The report notes that credit card information reading technology is mainly done by stealing data from the magnetic stripe on the back of the ATM card, and the device used to read the magnetic stripe information of the credit card is about the same size as the card. , the card reader is usually installed on or near the ATM machine at the factory where the ATM is made. The fraudster then installs another device to obtain the PIN number associated with the user's credit card and, in light of the glare, can find that the device is installed on the ATM's keyboard, or next to the generator and screen, that is, it may be anywhere in the machine. The report also provides photos of ATM machines that have been installed with reader devices, and surprisingly, these devices look like part of ATM. It's hard to see visually that the devices you insert into your credit card are added separately. The same is true for pin-number acquisition devices, where most pin-number acquisition devices are hidden, and even the possibility of using a forged keyboard to replace a real keyboard to get data. These criminals usually get information about the card reader at night or early in the morning. So what are the suggestions for managing this ATM? One of the key recommendations is to know about ATM. Of course, this is a bad solution, because the people who make the ATM are supposed to be careful and diligent, although this is just ideal. Second, one of the basic problems that those who manufacture ATMs will solve is design flaws, and if the ATM is not easily identified, even the most diligent ATM caretaker can lead to a security leak. There is a typical risk management problem: Although a solution is already being widely used, we now find that there are serious problems with the solution. Now we have two choices: not to consider cost issues and complexity, to redesign solutions to solve these problems perfectly and to reduce security risks, or to develop workable policies. Otherwise, it will face greater loss than redesign, and cost loss. Consumer confidence is also to be taken into account in ATM cases, but most consumers are less concerned about these issues, although some banks are starting to use a one-time-generated captcha to stop card readers and information acquisition problems, but these devices are also easily lost. ATM security issues, like many other IT security issues, do not have the best solution. "Editorial Recommendation" Wireless ADSL Small Network solution Status quo and development of information security risk assessment in China Java EE Application Licensing concepts and solutions servlet and Struts action thread security issues analysis! "Responsible editor: Jian Ying TEL: (010) 68476606" Original: The security field does not exist the best solution? Back to network security home

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.