Preview

Significance of the Study Sample

Powerful Essays
Open Document
Open Document
2544 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Significance of the Study Sample
ATM Case Study Part 1

A requirements document specifies the purpose of the ATM system and what it must do. Requirements Document A local bank intends to install a new automated teller machine (ATM) to allow users (i.e., bank customers) to perform basic transactions Each user can have only one account at the bank. ATM users view their account balance withdraw cash deposit funds

ATM user interface: a screen that displays messages to the user a keypad that receives numeric input from the user a cash dispenser that dispenses cash to the user and a deposit slot that receives deposit envelopes from the user.

The cash dispenser begins each day loaded with 500 $20 bills.

Develop software to perform the financial transactions initiated by bank customers through the ATM.
The bank will integrate the software with the ATM’s hardware at a later time.

Software should encapsulate the functionality of the hardware devices within software components, but it need not concern itself with how these devices perform their duties. Use the computer’s monitor to simulate the ATM’s screen, and the computer’s keyboard to simulate the ATM’s keypad.

An ATM session consists of authenticating a user based on an account number and personal identification number (PIN) creating and executing financial transactions

To authenticate a user and perform transactions interact with the bank’s account information database For each account, the database stores an account number, a PIN and a balance indicating the amount of money in the account.

Simplifying Assumptions: the bank plans to build only one ATM, so we need not worry about multiple ATMs accessing this database at the same time the bank does not make any changes to the information in the database while a user is accessing the ATM. an ATM faces reasonably complicated security issues that are beyond our scope. the bank trusts the ATM to access and manipulate the information in the database without significant security

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Exam Fin4324

    • 594 Words
    • 3 Pages

    A so-called PIN gives a bank customer access to his or her account through a(n):…

    • 594 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    4. What information is generated as part of ATM business processes and how are they…

    • 459 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Mis 589 11 & 12 Mini Cases

    • 1102 Words
    • 5 Pages

    Belmont State Bank is a large bank with hundreds of branches that are connected to a central computer system. Some branches are connected over dedicated circuits and others use the dial-up telephone network. Each branch has a variety of client computers and ATMs connected to a server. The server stores the branch’s daily transaction data and transmits it several times during the day to the central computer system. Tellers at each branch use a four-digit numeric password, and each teller’s computer is transaction-coded to accept only its authorized transactions. Perform a risk assessment.…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Although the operating system of the kiosk possibly will be capable of additional tasks such as signifying that a keystroke was performed correctly, the use of these features may not be wanted by all users. It would be easy, and probably desirable, to design the system so features can be utilized or not as the user wishes. Through the use of messages, sounds or lighting a key or button when activated for those individuals who need confirmation of an action or others who simply desire a comforting feeling. Actions such as these can be designed as part of the system and provisions made for the user to activate them as desired or needed.…

    • 1152 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Bank Of America

    • 505 Words
    • 3 Pages

    2. List the sequential steps required in a typical ATM transaction, such as drawing out cash or transferring funds from one account to another, and briefly explain why each of these steps is necessary. Use a table to organize your response and do not overlook steps in the process that are performed either by the ATM system or by information systems housed within the Bank’s centralized data center.…

    • 505 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Mis589 Wk7 Mini-Cases

    • 487 Words
    • 2 Pages

    Belmont State Bank is a large bank with hundreds of branches that are connected to a central computer system. Some branches are connected over dedicated circuits and others use the dial-up telephone network. Each branch has a variety of client computers and ATMs connected to a server. The server stores the branch’s daily transaction data and transmits it several times during the day to the central computer system. Tellers at each branch use a four-digit numeric password, and each teller’s computer is transaction-coded to accept only its authorized transactions. Perform a risk assessment.…

    • 487 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    JP Morgan Chase

    • 1665 Words
    • 7 Pages

    5. With the advent of mobile banking, discuss how banks have protected the software that allows for online transaction to occur through automation.…

    • 1665 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Bis/220 It Acts Paper

    • 590 Words
    • 3 Pages

    The increasing popularity of online shopping, automated teller machines (ATMs), online banking, point-of-sale terminals, telephone bill payments, and many other monetary devices that use the internet created major security issues. The threat of identity theft, stolen banking information, and other personal information was cause for major concern. With these threats looming, the Electronic Fund Transfer Act (EFTA) was created to protect people who were entering a new age of technology. This act protects people while using access devices. According to The Federal Reserve (2008), an “Access device is a card, code, or other means of access to a consumer’s account or a combination used by the consumer to initiate EFTs. Access devised include debit cards, personal…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    MKTG 315 Study guide

    • 10251 Words
    • 42 Pages

    — Technology facilitates basic customer service functions (online bill-paying, e-mail questions, online banking, order tracking), transaction (both retail and business-to-business, Cisco Systems), and learning or information seeking.…

    • 10251 Words
    • 42 Pages
    Powerful Essays
  • Satisfactory Essays

    Paper

    • 408 Words
    • 2 Pages

    Well basically, you can identify who is accessing data and using a two-factor authentication strategy, a physical device that contains their credentials and password, like a debit card and PIN number. A debit card is something you have and a pin is something you know. Most banks the require users to authenticate each computer they want to access their accounts through. If an account is locked, the bank require users to call in to reset their pin then the agent requires more proof of identity.…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Atm Case

    • 964 Words
    • 4 Pages

    ("ADT Code of Conduct," 2013, Chapter 3) Billions of dollars have been stolen from hardworking citizens over the past few years without much of a outcry from the general public. If someone broke into a house and stole thousands of dollars and terrified the family living there then they would be front page news on every major local news channel. The money stolen from ATMs is insured thru the Federal Deposit Insurance Corporation (FDIC) so much of the monies are recovered and no face to face contact between criminal and victim ever occurs. ("Consumer Protection," 2013, p. 12) Maybe to failing economy over the past few years and the opinions the public has of the banks as a result of their treatment of families who could no longer afford their mortgage. Many fell that we paid in the taxes that bailed out the banks so that they could reposes the American dream and pull the foundation from in under so many. So does the public view the billions of dollars stolen each year from ATM’s differently since the banks and FICA must…

    • 964 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Srs for Bank Management

    • 708 Words
    • 3 Pages

    This Bank Management System replaces the conventional, traditional file and record based system with the help of which a lot of paper work will be reduced. Thus the manual work of maintaining files which are subjected to physical wear and tear can be avoided. The employee must be able to view all the information of customers such as name, account number, date of birth, gender, address, initial balance. Also it must be able to record different transactions such as withdrawal, deposit or transfer of funds from one account to another.…

    • 708 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Smart Card Access Control

    • 3570 Words
    • 15 Pages

    Gives out a sound recommendation based on which Access Control System would be suitable for Yale Bank…

    • 3570 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    SRS for Banking

    • 4997 Words
    • 20 Pages

    Software Requirements Document for BANK System Author: Andrew Laird, John Chargo, Guillermo Hernandez, John Leacox Version Date Author Change 0.1 09/05/04 SM Initial Document 0.2 02/01/06 JC Wrote 1.1-1.3, 2 Overview-2.1.3, 2.3 Designed sequence diagrams for 2.2.5 - 2.2.8 0.3 02/01/06 AL Designed 2.2.3 - 2.2.5 Designed sequence diagrams for 2.2.3 and 2.2.4 0.4 02/01/06 GH Designed 2.2.1, 2.2.2, 2.2.6 – 2.2.8 Designed sequence diagrams for 2.2.1-2.2.2 0.5 02/02/06 JL Wrote Feature Outline 0.6 02/06/06 AL Wrote sections 3.3 and 3.5 0.7 02/06/06 GH Wrote Sections 3.1 and 3.6 0.8 02/06/06 JL Wrote sections 3.2 0.9 02/06/06 JC Wrote Sections 3.1 Table of Contents 1 Introduction........................................................................................................................................…

    • 4997 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Salami Attack

    • 830 Words
    • 4 Pages

    A company that protects personal account information of a customer has to be on the lookout for individuals who wish to put them in a compromising situation when it comes to another’s funds. Raj B Lon sane states that it is important to know how to tackle this from an angle that is highly sophisticated.…

    • 830 Words
    • 4 Pages
    Good Essays