ATM SCAM  At first glance it would appear as though this individual is simply performing a simple ATM transaction.

Slides:



Advertisements
Similar presentations
Creating Personal Accounts in OvidSP Ovid Training Department 2008 Think Fast. Search Faster.
Advertisements

Chapter 4: Requirements Engineering
ATM SCAM At first glance it would appear as though this individual is simply performing a simple ATM transaction.
PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
SWE 214 (071) Use Case Diagrams Slide 1 Use Case Diagrams Examples.
ATM THEFTS  In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Direct Attacks on Computational Devices
Sequence Diagrams. Introduction A Sequence diagram depicts the sequence of actions that occur in a system. The invocation of methods in each object, and.
Chapter 12 ATM Case Study, Part 1: Object-Oriented Design with the UML
ATM User Interface Design. Requirements A bank customer is able to access his or her account using an automatic teller machine. To be able to use an ATM.
Unit 211 Requirements Phase The objective of this section is to introduce software system requirements and to explain different ways of expressing these.
ATM The “Beast” of Technology. What is the ATM? The ATM stands for Automatic Teller Machine. It was designed and created to give the public an easier.
Aspect-Oriented Software Development (AOSD) Tutorial #9 Modular Verification of Aspects.
Some Types of Scams and what you need to now about them and what you need to now about them.
ATM THEFTS  In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Electronic ATM Fraud. ATM Fraud is where you goto an ATM and you insert your card into a skimmer which is placed in the card slot and it will take all.
By Kieran and Zak.  The Lebanese fraud is when.a loop of tape is inserted in to the card slot.the customer inserts card and the x- ray film tape is put.
ATM THEFTS  In our first slide you see an individual who apparently is making a bank transaction at the ATM.
{ How to Use An ATM A simple tutorial to teach how to use ATM Machines.
CARD THEFT USING ATMS PERSONAL OPSEC. ATM THEFTS  In the first slide you see an individual who appears to be making a bank transaction at the ATM.
Membership Card Research Marta Kaptur. Card 1 The purpose of this card is to hold personal information. It is a personal business card which is given.
Press Esc to exit programme at any time Profit & Loss Accounts The calculation of profit and loss is one of the most important objectives of accounting.
3. 18 Methods of making and receiving payments Methods of making and receiving payments Banks and bank accounts  All businesses have bank accounts.
CS 352, W12 Eric Happe, Daniel Sills, Daniel Thornton, Marcos Zavala, Ben Zoon ANDROID/IOS RPG GAME UI.
Identity Theft Your Problem, Not Mine. What can an identity thief do with your info? 1. Apply for a new driver’s license 2. Open a new bank account and.
P HI SH I NG !. WHAT IS PHISHING ? In computer security phishing is trying to acquire important information such as; passwords, usernames and credit card.
Use Cases 2 ENGR ♯10 Peter Andreae
ATM ROBBERY  In first instance, there is a person who apparently is making a transaction at the ATM. Translated by: S.L. de Sánchez.
This portion will demonstrate how to track customers with SimPOS! Retail Point of Sale. You may track a few or all of your customers if you wish. Reasons.
Welcome to the SPAA Online Exam Tutorial This short presentation aims to demystify the online exam process and give you peace of mind as you undertake.
SFWR ENG 3KO4 Software Development Fall 2009 Instructor: Dr. Kamran Sartipi Software Requirement Specification (SRS) for the Automated Banking Machine.
Section 3.1 CHECKING ACCOUNTS. How do people gain access to money they keep in a bank?  How many of you have a savings account?  How many of you have.
What are Sequence Diagrams? Collaboration Diagrams allow designer to specify message flow between collaborating objects –Focus on relationship between.
After a moment you will enter the world of magic...
January Ron McFadyen1 January 2004 Assignment 1 Due: Friday Jan 23, Implement the ProductSpecification and Payment classes in any OO.
ICT & Crime Identity theft & fraud. Homework Worksheet – due back on Monday.
Introduction to Business Analytics & Business Intelligence Information Systems Functions i-Clicker Demo IS vs IT IPO Model Note Taking.
Business Math 3-2 Electronic Banking. Start up Marc uses his charge card to pay for almost everything he buys. Lenore pays for most of her purchases with.
Learning Intentions Explain what an ATM is and the facilities offered Identify the stages of withdrawing cash from an ATM List the advantages and disadvantages.
1 Requirements Engineering From System Goals to UML Models to Software Specifications Axel Van Lamsweerde.
When the program is first started a wizard will start to setup your Lemming App. Enter your company name and owner in the fields designated “Company Name”
Topic sentence--2. People need to get a bank card if they want to use an ATM. bank card In order to apply, you must fill out an application. Once you.
Lecture Outline Monday 23 rd February (Week 4) 3 – 3:10pm Review of Requirements Eng. and use cases 3:10 – 3:40pm Exercise on Use Case 3:40-4:40 Class.
ATM Fraud. Lost/stolen cards The Lost or Stolen physical card is becoming less of a target The data that can be skimmed is much more valuable and any.
© Thomson/South-Western ECONOMIC EDUCATION FOR CONSUMERS Slide 1 Chapter 7 LESSON 7.3 Electronic Banking Objectives: By the end of class, students will.
Protecting Your Money in Today’s Economy
Teens 2 lesson six using banking services presentation slides 04/09.
ATM SCAM At first glance it would appear as though this individual is simply performing a simple ATM transaction.
Copyright Lessons Learned Ltd 2016
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
How An ATM Work's Prepaid by, kakani Dinesh.
Chapter 8: Modelling Interactions and Behaviour UML Activity Diagram
the first card insert text here.
CAR Phase 23 Release Notes
ATM SCAM At first glance it would appear as though this individual is simply performing a simple ATM transaction.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
#1 #2 Click on Infinite Campus Parent Portal
Participant Online Access
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
SECTION 4-4 Bank Statements pp
using banking services
using banking services
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
I am about to give you a lot of information.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
FRAUD AWARENESS FOR SENIORS
Presentation transcript:

ATM SCAM  At first glance it would appear as though this individual is simply performing a simple ATM transaction.

Setting the Trap  What he is in fact doing is rigging the slot on the machine so as to capture the card of the next person who uses the ATM.

The Lookout  Rigging the machine is very risky business therefore the services of a “lookout” is required in order to warn of possible witnesses and/or potential victims.

The Victim  Here we see the next customer to use the machine after the trap has been set. He inserts his card and attempts a transaction.

The Capture  The card has been captured and the customer is confused as to why this is so. However in the background we see that help is on its’ way……or is it?

The Con  Here we see the Fraudster pretending to render assistance. What he is in fact trying to do is obtain the customer’s P.I.N now that he has captured the card

Obtaining the P.I.N  He convinces the customer that he would be able to retrieve his card if he entered his P.I.N while he holds down both the “cancel” and the “enter” buttons.

The Surrender  After several attempts the customer is convinced that the machine has captured his card. Both he and the Fraudster leave the ATM.

The Pickup  Satisfied that the coast is clear the Fraudster returns to retrieve the card that has been captured by his trap. He not only has the customers card he also has his P.I.N.

The Exit  Armed with card and P.I.N he left and was able to withdraw $1000 from the account.