List of Security Features (2024)

Australian banknotes are printed on polymer, a type of plastic, and they have a distinctive feel.Polymer banknotes were developed to make our currency more difficult to counterfeit. The polymermakes it possible to include a range of security features on our banknotes.

The security features that can be used to check a banknote are:

  • Polymer Substrate

    Australian banknotes are printed on polymer, a type of plastic, and theyhave a distinctive feel. A genuine banknote should return back to shapeafter it is scrunched up.

  • Top-to-bottom window

    There are multiple security features in the clear top-to-bottom window.The window should be an integral part of the banknote and not anaddition. Check that the security features in the window cannot beeasily rubbed off.

  • 3D image

    Tilt the banknote to see a three-dimensional image with a colourfulborder. The image will appear raised or recessed.

  • Flying bird

    Tilt the banknote to see a bird move its wings and change colour in thetop-to-bottom window.

  • Colourful bird

    Tilt the banknote to see colours change within a bird.

  • Reversing number

    Tilt the banknote to see a number change direction within the building.The number alternately appears forwards, disappears, then appearsbackwards.

  • Rolling colour effect

    Tilt the banknote to see a rolling colour effect. On one side of thebanknote it is a prominent patch near the top corner; on the other sideit is within a bird shape.

  • Image in small window

    Look for an image in a small clear window. The image is embossed and hasa light and dark effect. The window should be an integral part of thebanknote and not an addition.

  • Intaglio print

    Feel the distinctive texture of the dark printing. The slightly raisedprint can be felt by running a finger across the portraits andnumerals.

  • Background print (offset)

    Multi-coloured and multi-directional fine-line patterns appear on eachside of the banknote. This background printing should be very sharp.Check for irregularities such as less clearly defined patterns, thickeror thinner lines, or colour differences.

  • Microprint

    There is microprint, or tiny, clearly defined text, in multiple locationson the banknote.

  • Fluorescent Ink

    A bird, the serial number and year of print fluoresce under UVlight.

    To validate the UV fluorescent features on Australia's banknotes, it isrecommended that a UV black light with a wavelength that is centred around365nm be used, and that it is done so in low ambient lighting conditions.Many UV black lights that use Light Emitting Diodes (LEDs) emit wavelengthsbetween 395–400nm, which are not suitable for viewing the UV features

  • Polymer Substrate

    List of Security Features (14)

    The plastic that Australian banknotes are printed on gives them adistinctive feel. A suspect banknote may feel thicker or thinner andlighter than a genuine banknote. Most counterfeits are printed on paperand can be easily torn. It is difficult to start a tear along the edgeof a genuine banknote. A genuine banknote should return back to shapeafter it is scrunched up.

  • Clear Window

    List of Security Features (15)

    The clear window should be an integral part of the banknote and not anaddition. Check that the white image printed on the window cannot beeasily rubbed off. Also look for the embossing – there is a wavepattern in the window of the $10 banknote, and the value of the banknotein the windows of $20, $50 and $100 banknotes. There is no embossing inthe window of the $5 banknote.

  • See-through Registration Device

    List of Security Features (16)

    Diamond-shaped patterns are printed inside a circle on both sides of abanknote. When a genuine banknote is held up to the light, the patternsshould line up perfectly to form a seven-pointed star within thecircle.

  • Shadow Image

    List of Security Features (17)

    When a genuine banknote is held up to the light, the Australian Coat ofArms should be visible under the print. This ‘shadow image’is created by variations in the background printing on the plasticsubstrate.

  • Intaglio Print

    List of Security Features (18)

    Intaglio is raised dark printing with a distinct feel. On genuineAustralian banknotes, the slightly raised print can be felt by running afinger across the portraits and other major design elements.

  • Background Print (offset)

    List of Security Features (19)

    Multi-coloured and multi-directional fine-line patterns appear on eachside of the banknote. This background printing should be very sharp.Check for irregularities such as less clearly defined patterns, thickeror thinner lines, or colour differences.

  • Microprinting

    List of Security Features (20)

    Tiny, clearly defined words are printed in the top left corner of the $5banknote, and near the portraits on the other denominations. Most peopleneed the help of a magnifying glass to read the microprinting. Mostbanknotes have their denomination microprinted in words (e.g. ‘FIFTYDOLLARS’), but the $10 banknote has poems by AB ‘Banjo’Paterson and Dame Mary Gilmore microprinted on it.

  • Fluorescent Ink

    List of Security Features (21)

    The serial numbers of an Australian banknote should fluoresce underultraviolet light. Also, a rectangularpatch showing the value becomes visible on the $20, $50 and $100banknotes, and a square patch appears on the $5 banknote.

    To validate the UV fluorescent features on Australia'sbanknotes, it is recommended that a UV black light with a wavelengththat is centred around 365nm be used, andthat it is done so in low ambient lighting conditions. Many UV blacklights that use Light Emitting Diodes(LEDs) emit wavelengths between 395 – 400nm, which are notsuitable for viewing the UV features.

List of Security Features (2024)

FAQs

What should I put for security questions and answers? ›

The best security questions and answers are safe, memorable, consistent, specific and unpredictable.
  • Safe: Ensure that the answer to your security question is confidential and cannot be easily guessed by others. ...
  • Memorable: You should be able to recall the answer to your security question without writing it down.
May 17, 2024

What are examples of security features? ›

Security Features means any security feature, including any encryption, pseudonymisation, key, PIN, password, token or smartcard. Security Features . All attempts at logging into the system are recorded and monitored.

What if I forgot the answer to my security question? ›

If you forgot both your security question answers, there are two things you can do. If you have a computer that you have chosen to “Remember computer” on, you can log in on that computer and reset your security questions.

What is the security question and answer in banking? ›

Security Question & Answer means an answer used to verify the identity of a User when the User resets the User's Compliant Password.

What are the three features of security? ›

Objectives of the Security Features
  • Protect encrypted data from disclosure.
  • Minimize exposure to attacks.
  • Provide sufficiently high reliability and availability.

What is a good security answer? ›

According to the Good Security Questions website, answers to a good security question should meet these criteria: Safe: Cannot be guessed or researched. Stable: Does not change over time. Memorable: Can be remembered.

What do you write in a security answer? ›

For example, good security questions produce answers that are:
  • Safe: Cannot be guessed or researched.
  • Stable: Do not change over time.
  • Memorable: Can be remembered easily.
  • Simple: Are precise, simple, consistent.
  • Many: Have many possible answers.
Jun 3, 2019

What are the 7 types of security? ›

What are the 7 types of Cyber Security?
  • Network Security. ...
  • Endpoint Security. ...
  • Information Security. ...
  • Cloud Security. ...
  • IoT Security. ...
  • Mobile Security. ...
  • Identity & Access Management (IAM)
Sep 21, 2023

What are the primary features of a security information? ›

SECURITY POLICIES-RESPONDING TO REQUIREMENTS FOR CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY. The weight given to each of the three major requirements describing needs for information security—confidentiality, integrity, and availability—depends strongly on circ*mstances.

What are the security features of application? ›

Different types of application security features include authentication, authorization, encryption, logging, and application security testing. Developers can also code applications to reduce security vulnerabilities.

What is the answer of security question and answer? ›

The answer to a good security question should be obvious. In addition, it should be easy to remember, but at the same time remain secret to others. The answer should be immediately remembered as soon as the user receives the security question.

How many security questions should be asked? ›

The purpose of security questions is to protect your business against cyberattacks, so ask as many questions as possible and confirm the user's identity before letting them in. Hackers may breach a single security question. However, asking multiple questions improves your security system.

What are the 4 C's security? ›

The 4 C's security refers to a framework comprising four essential elements: Concealment, Control, Communication, and Continuity. These elements collectively contribute to fortifying security measures and safeguarding assets, premises, and individuals against potential threats and risks.

What is security question hint? ›

A security question is form of shared secret used as an authenticator. It is commonly used by banks, cable companies and wireless providers as an extra security layer.

What is a security questionnaire? ›

A security questionnaire is a set of questions designed to help an organization identify potential cybersecurity weaknesses among its third-party and fourth-party vendors, business partners, and service providers.

What if I forgot the security question? ›

To deal with forgotten security questions:

If the first attempt does not succeed, try again. Keep trying the most logical answers to your security questions. Tip: Case does not matter, so do not waste an attempt by changing some characters to a different case.

What are secret questions and answers? ›

To help verify a user's identity in the case of a lost password, many Web applications use secret questions. By answering a pre-selected question, a user can demonstrate some personal knowledge of the account owner. A classic example is asking to provide a mother's maiden name.

What is the most secure question to choose in the event you forgot your password? ›

Given the above suggested criteria, you might try to come up with more challenging security questions that have answers not typically revealed on social media, such as the following: When you were young, what did you want to be when you grew up? Who was your childhood hero? Where was your best family vacation as a kid?

What is a security feature? ›

What are security features? Security features, in the context of processors, refer to the built-in mechanisms and functionalities designed to enhance the security and protection of the software applications that run on it, the data it processes, and the system that it operates within.

What are the 3 C's in security? ›

The 3 Cs of Enterprise Security: Communicate, Coordinate and Collaborate. As technology continues to evolve and become more interconnected, the line between cyber and physical security is increasingly blurred.

What are the 3 basic security requirements? ›

The importance of the security model speaks for itself: Confidentiality, integrity and availability are considered the three most important concepts in infosec. Considering these three principles together within the triad framework guides the development of security policies for organizations.

What does it mean when it says security question? ›

A security question is form of shared secret used as an authenticator. It is commonly used by banks, cable companies and wireless providers as an extra security layer.

What are the questions for security? ›

10 good Security Guard interview questions
  • What, in your opinion, are the responsibilities of a security guard?
  • Describe your experience with computers.
  • What surveillance systems are you familiar with?
  • What would you do if you caught a fellow security officer sleeping on the job?
Sep 6, 2023

What is security and an example? ›

Security means safety, as well as the measures taken to be safe or protected. In order to provide adequate security for the parade, town officials often hire extra guards. A small child will sometimes latch on to a blanket or stuffed animal that gives him or her the feeling of security.

Should you answer security questions truthfully? ›

Because of this, you shouldn't answer security questions truthfully and especially don't use your common passwords as the answer either. Even if the security question answers are hashed, they're most likely not using the best hashing.

Top Articles
Latest Posts
Article information

Author: Msgr. Benton Quitzon

Last Updated:

Views: 6255

Rating: 4.2 / 5 (43 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Msgr. Benton Quitzon

Birthday: 2001-08-13

Address: 96487 Kris Cliff, Teresiafurt, WI 95201

Phone: +9418513585781

Job: Senior Designer

Hobby: Calligraphy, Rowing, Vacation, Geocaching, Web surfing, Electronics, Electronics

Introduction: My name is Msgr. Benton Quitzon, I am a comfortable, charming, thankful, happy, adventurous, handsome, precious person who loves writing and wants to share my knowledge and understanding with you.