Project: Threat Modeling Overview This homework will allow you to demonstrate your understanding of the purpose and execution of a Threat Model for an ATM system. Assignment Details Following the...

1 answer below »
Project: Threat Modeling

Overview This homework will allow you to demonstrate your understanding of the purpose and execution of a Threat Model for an ATM system.

Assignment Details Following the directions provided by the OWASP website, Threat Modeling, model the threats to an ATM system that was the subject of an earlier assignment. Make assumptions where necessary. You will have to develop, if you haven’t already, a high-level architectural design of the ATM system. The link provides steps to execute for threat modeling analysis. Suggest mitigations for your threats. You are not required to rank the threats.

Your report should provide the information recommended by the OWASP website. Your report should be well-organized and provide references for all resources used.

Deliverable You should create a word or PDF document with your report on Threat Modeling. The document should be well-written and include references for all sources you used support your work. Be sure to include your name, date and course number on the document in the title page. Be sure to include your name, date and course number on the document in the title page.




Project: Threat Modeling Overview This homework will allow you to demonstrate your understanding of the purpose and execution of a Threat Model for an ATM system. Assignment Details Following the directions provided by the OWASP website, Threat Modeling, model the threats to an ATM system that was the subject of an earlier assignment. Make assumptions where necessary. You will have to develop, if you haven’t already, a high-level architectural design of the ATM system. The link provides steps to execute for threat modeling analysis. Suggest mitigations for your threats. You are not required to rank the threats. Your report should provide the information recommended by the OWASP website. Your report should be well-organized and provide references for all resources used. Deliverable You should create a word or PDF document with your report on Threat Modeling. The document should be well-written and include references for all sources you used support your work. Be sure to include your name, date and course number on the document in the title page. Be sure to include your name, date and course number on the document in the title page. Grading Rubric Attribute Meets Does not meet Threat model 80 points Models the threats to an ATM system. Develops a high-level architectural design. Suggest mitigations for your threats. Provides the information recommended by the OWASP website. 0 points Does not model the threats to an ATM system. Does not develop a high-level architectural design. Does not suggest mitigations for your threats. Does not provide the information recommended by the OWASP website. Documentation 20 points Document contains minimal spelling and grammar errors. References included using APA style. Title page includes Name, date and course number. 0 points Document contains multiple spelling and grammar errors. References were not included. Title page missing or did not include name, date and course number.
Answered Same DayNov 15, 2019

Answer To: Project: Threat Modeling Overview This homework will allow you to demonstrate your understanding of...

David answered on Nov 30 2019
127 Votes
Automatic teller machine
Threat Modeling
Automatic teller machine
Threat Modeling
Table of Contents
Introduction    2
Overview    2
Assets    2
Risks and Vulnerabilities    2
Physical Risks    2
PIN ca
rd transactions Vulnerability    2
Hardware tempering Vulnerability    2
Skimming    2
Logical Risk    3
Mitigations and Controls    3
Cardholder Data Protection    3
Host-based Firewall    3
Application Control    4
Full Hard Disk Encryption    4
Patch Management    4
Device-specific Requirements    4
Conclusion    4
References    5
Introduction
Automatic Teller Machine (ATM) is a computerized device that works on the basis of real-time data and allowed the users to carry out financial transactions. There machines are setup in markets, malls, travel stations and other public places for use. ATM machines are a part of new generation banking mechanisms and incorporate a centralized database system for data storage and processing.
Overview
A host processes is involved in ATM for connection and communication which acts as a gateway to make all the ATM networks available to the users. With the increase in the demand and usage of ATMs, the customer hardware architecture of these machines has been replaced with the architecture that is similar to that of a personal computer. The operating systems, such as Windows and Linux can now be used on the ATMs. This has led to the reduction in prices; however, the vulnerability to the risks has enhanced (Khalifa, 2013).
Assets
The primary assets associated with ATMs include sensitive data, financial details and reputation of the company. Personal Identification Numbers (PINs), account data and information, secret keys etc. come in the category of sensitive data.
Risks and Vulnerabilities
Physical Risks
PIN card transactions Vulnerability
The information present on the magnetic strip of the card is easy to copy. In this manner, the information may get exposed to unauthorized entities. This information can be used by fraudulent entities...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here