早教吧作业答案频道 -->英语-->
用英文介绍ATM柜员机的方便与不便快啊!我没时间啦!上课要用啊!
题目详情
用英文介绍ATM柜员机的方便与不便
快啊!我没时间啦!上课要用啊!
快啊!我没时间啦!上课要用啊!
▼优质解答
答案和解析
An automated teller machine (ATM) is a computerized telecommunications device that provides the customers of a financial institution with access to financial transactions in a public space without the need for a human clerk or bank teller.On most modern ATMs,the customer is identified by inserting a plastic ATM card with a magnetic stripe or a plastic smartcard with a chip,that contains a unique card number and some security information,such as an expiration date or CVC (CVV).Security is provided by the customer entering a personal identification number (PIN).
Using an ATM,customers can access their bank accounts in order to make cash withdrawals (or credit card cash advances) and check their account balances.ATMs are known by various casual terms including automated banking machine,money machine,bank machine,cash machine,hole-in-the-wall,cashpoint or Bancomat (in Europe and Russia).
Fraud
As with any device containing objects of value,ATMs and the systems they depend on to function are the targets of fraud.Fraud against ATMs and people's attempts to use them takes several forms.
The first known instance of a fake ATM was installed at a shopping mall in Manchester,Connecticut in 1993.By modifying the inner workings of a Fujitsu model 7020 ATM,a criminal gang known as The Bucklands Boys were able to steal information from cards inserted into the machine by customers.[67]
In some cases,bank fraud could occur at ATMs whereby the bank accidentally stocks the ATM with bills in the wrong denomination,therefore giving the customer more money than should be dispensed.[68] The result of receiving too much money may be influenced on the Card Holder Agreement in place between the customer and the Bank.[69][70]
In a variation of this,WAVY-TV reported an incident in Virginia Beach of September 2006 where a hacker who had probably obtained a factory-default admin password for a gas station's white label ATM caused the unit to assume it was loaded with $5 USD bills instead of $20s,enabling himself--and many subsequent customers--to walk away with four times the money they said they wanted to withdraw.[71][72]
ATM behavior can change during what is called "stand-in" time,where the Bank's cash dispensing network is unable to access databases that contain account information (possibly for database maintenance).In order to give customers access to cash,customers may be allowed to withdraw cash up to a certain amount that may be less than their usual daily withdrawal limit,but may still exceed the amount of available money in their account,which could result in fraud.[73]
[edit] Card fraud
In an attempt to prevent criminals from shoulder surfing the customer's PINs,some banks draw privacy areas on the floor.
For a low-tech form of fraud,the easiest is to simply steal a customer's card.A later variant of this approach is to trap the card inside of the ATM's card reader with a device often referred to as a Lebanese loop.When the customer gets frustrated by not getting the card back and walks away from the machine,the criminal is able to remove the card and withdraw cash from the customer's account.
Another simple form of fraud involves attempting to get the customer's bank to issue a new card and stealing it from their mail.[74]
Some ATMs may put up warning messages to customers to not use them when it detects possible tampering.The concept and various methods of copying the contents of an ATM card's magnetic stripe on to a duplicate card to access other people's financial information was well known in the hacking communities by late 1990.[75]
In 1996 Andrew Stone,a computer security consultant from Hampshire in the UK was convicted of stealing in excess of £1 million Sterling (at the time equivalent to US$1.6 million) by pointing high definition video cameras at ATMs from a considerable distance,and by recording the card numbers,expiry dates,etc.from the embossed detail on the ATM cards along with video footage of the PINs being entered.After getting all the information from the videotapes,he was able to produce clone cards which not only allowed him to withdraw the full daily limit for each account,but also allowed him to sidestep withdrawal limits by using multiple copied cards.In court,it was shown that he could withdraw as much as £10,000 per hour by using this method.Stone was sentenced to five years and six months in prison.[76]
By contrast,a newer high-tech modus operandi involves the installation of a magnetic card reader over the real ATM's card slot and the use of a wireless surveillance camera or a modified digital camera to observe the user's PIN.Card data is then cloned onto a second card and the criminal attempts a standard cash withdrawal.The availability of low-cost commodity wireless cameras and card readers has made it a relatively simple form of fraud,with comparatively low risk to the fraudsters.[77]
In an attempt to stop these practices,countermeasures against card cloning have been developed by the banking industry,in particular by the use of smart cards which cannot easily be copied or spoofed by un-authenticated devices,and by attempting to make the outside of their ATMs tamper evident.Older chip-card security systems include the French Carte Bleue,Visa Cash,Mondex,Blue from American Express[78] and EMV '96 or EMV 3.11.The most actively developed form of smart card security in the industry today is known as EMV 2000 or EMV 4.x.
EMV is widely used in the UK (Chip and PIN) and parts of Europe,but when it is not available in a specific area,ATMs must fallback to using the easy to copy magnetic stripe to perform transactions.This fallback behaviour can be exploited.[79] However the fallback option has been removed by several UK banks,meaning if the chip is not read,the transaction will be declined.
Using an ATM,customers can access their bank accounts in order to make cash withdrawals (or credit card cash advances) and check their account balances.ATMs are known by various casual terms including automated banking machine,money machine,bank machine,cash machine,hole-in-the-wall,cashpoint or Bancomat (in Europe and Russia).
Fraud
As with any device containing objects of value,ATMs and the systems they depend on to function are the targets of fraud.Fraud against ATMs and people's attempts to use them takes several forms.
The first known instance of a fake ATM was installed at a shopping mall in Manchester,Connecticut in 1993.By modifying the inner workings of a Fujitsu model 7020 ATM,a criminal gang known as The Bucklands Boys were able to steal information from cards inserted into the machine by customers.[67]
In some cases,bank fraud could occur at ATMs whereby the bank accidentally stocks the ATM with bills in the wrong denomination,therefore giving the customer more money than should be dispensed.[68] The result of receiving too much money may be influenced on the Card Holder Agreement in place between the customer and the Bank.[69][70]
In a variation of this,WAVY-TV reported an incident in Virginia Beach of September 2006 where a hacker who had probably obtained a factory-default admin password for a gas station's white label ATM caused the unit to assume it was loaded with $5 USD bills instead of $20s,enabling himself--and many subsequent customers--to walk away with four times the money they said they wanted to withdraw.[71][72]
ATM behavior can change during what is called "stand-in" time,where the Bank's cash dispensing network is unable to access databases that contain account information (possibly for database maintenance).In order to give customers access to cash,customers may be allowed to withdraw cash up to a certain amount that may be less than their usual daily withdrawal limit,but may still exceed the amount of available money in their account,which could result in fraud.[73]
[edit] Card fraud
In an attempt to prevent criminals from shoulder surfing the customer's PINs,some banks draw privacy areas on the floor.
For a low-tech form of fraud,the easiest is to simply steal a customer's card.A later variant of this approach is to trap the card inside of the ATM's card reader with a device often referred to as a Lebanese loop.When the customer gets frustrated by not getting the card back and walks away from the machine,the criminal is able to remove the card and withdraw cash from the customer's account.
Another simple form of fraud involves attempting to get the customer's bank to issue a new card and stealing it from their mail.[74]
Some ATMs may put up warning messages to customers to not use them when it detects possible tampering.The concept and various methods of copying the contents of an ATM card's magnetic stripe on to a duplicate card to access other people's financial information was well known in the hacking communities by late 1990.[75]
In 1996 Andrew Stone,a computer security consultant from Hampshire in the UK was convicted of stealing in excess of £1 million Sterling (at the time equivalent to US$1.6 million) by pointing high definition video cameras at ATMs from a considerable distance,and by recording the card numbers,expiry dates,etc.from the embossed detail on the ATM cards along with video footage of the PINs being entered.After getting all the information from the videotapes,he was able to produce clone cards which not only allowed him to withdraw the full daily limit for each account,but also allowed him to sidestep withdrawal limits by using multiple copied cards.In court,it was shown that he could withdraw as much as £10,000 per hour by using this method.Stone was sentenced to five years and six months in prison.[76]
By contrast,a newer high-tech modus operandi involves the installation of a magnetic card reader over the real ATM's card slot and the use of a wireless surveillance camera or a modified digital camera to observe the user's PIN.Card data is then cloned onto a second card and the criminal attempts a standard cash withdrawal.The availability of low-cost commodity wireless cameras and card readers has made it a relatively simple form of fraud,with comparatively low risk to the fraudsters.[77]
In an attempt to stop these practices,countermeasures against card cloning have been developed by the banking industry,in particular by the use of smart cards which cannot easily be copied or spoofed by un-authenticated devices,and by attempting to make the outside of their ATMs tamper evident.Older chip-card security systems include the French Carte Bleue,Visa Cash,Mondex,Blue from American Express[78] and EMV '96 or EMV 3.11.The most actively developed form of smart card security in the industry today is known as EMV 2000 or EMV 4.x.
EMV is widely used in the UK (Chip and PIN) and parts of Europe,but when it is not available in a specific area,ATMs must fallback to using the easy to copy magnetic stripe to perform transactions.This fallback behaviour can be exploited.[79] However the fallback option has been removed by several UK banks,meaning if the chip is not read,the transaction will be declined.
看了 用英文介绍ATM柜员机的方便...的网友还看了以下:
船务基本知识求解~~~船务基本知识求解~~~我想知道一般装柜的流程与柜子的一个常见规格。比如多少方 2020-04-06 …
两个铁展柜电人,怎么办啊一个人如果接触到两个柜子,就会有被电我试着把其中一个铁柜子用跟电线连到水管 2020-05-15 …
百货商场的营业场的防火要求中要求:柜台的布置应充分留出顾客的活动余地和安全疏散通道,柜台与柜台之间 2020-05-16 …
(2009•海珠区一模)小明打开正在工作的消毒碗柜门时感到手“麻”,原因是()A.消毒碗柜使用的是 2020-06-20 …
欢迎各种答题方式.木工做一个衣柜比做一个书桌要多花2天的时间,做3个书桌与2个衣柜的时间相等.现做 2020-06-27 …
做一个长方体衣柜,长1米,宽0.5米,衣柜内用木板分成三层(如图).①衣柜的占地面积是多少平方米? 2020-06-27 …
银行有200个保险柜,分别编号1-200号.为了保险起见,每个保险柜的钥匙不能编上与柜相同的号码. 2020-06-30 …
英语翻译抱歉的通知你,由于我们货,1个20柜装不下了,由于时间紧迫,现在已经先装满一个20柜出货了 2020-07-10 …
小明打开正在工作的消毒碗柜门时感到手“麻”,原因是()A.消毒碗柜使用的是两插的插座B.消毒碗柜使 2020-07-16 …
小明打开正在工作的消毒碗柜门时,感到手“发麻”,原因可能是()A.电流经过消毒碗柜时会发热B.消毒 2020-07-16 …