dc.contributor.author | Kumar, Rajesh | |
dc.date.accessioned | 2023-01-09T08:56:56Z | |
dc.date.available | 2023-01-09T08:56:56Z | |
dc.date.issued | 2016-10 | |
dc.identifier.uri | https://link.springer.com/chapter/10.1007/978-3-319-48393-1_24 | |
dc.identifier.uri | http://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/8395 | |
dc.description.abstract | Securing automated teller machines (ATMs), as critical and complex infrastructure, requires a precise understanding of the associated threats. This paper reports on the application of attack-defense trees to model and analyze the security of ATMs. We capture the most dangerous multi-stage attack scenarios applicable to ATM structures, and establish a practical experience report, where we reflect on the process of modeling ATM threats via attack-defense trees. In particular, we share our insights into the benefits and drawbacks of attack-defense tree modeling, as well as best practices and lessons learned. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Attack-defense trees | en_US |
dc.subject | Security modeling | en_US |
dc.subject | ATM security | en_US |
dc.title | Using Attack-Defense Trees to Analyze Threats and Countermeasures in an ATM: A Case Study | en_US |
dc.type | Article | en_US |
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |