0% found this document useful (0 votes)
54 views3 pages

Proposed OSI Security Architecture For An ATM System

The proposed OSI security architecture for an ATM system outlines security measures across all OSI layers to ensure Confidentiality, Integrity, and Availability (CIA). Each layer addresses specific threats, such as card skimming and session hijacking, with corresponding security measures like encryption, firewalls, and multi-factor authentication. The architecture emphasizes the importance of maintaining secure communication and operational reliability for ATM systems.

Uploaded by

samrethidivima
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views3 pages

Proposed OSI Security Architecture For An ATM System

The proposed OSI security architecture for an ATM system outlines security measures across all OSI layers to ensure Confidentiality, Integrity, and Availability (CIA). Each layer addresses specific threats, such as card skimming and session hijacking, with corresponding security measures like encryption, firewalls, and multi-factor authentication. The architecture emphasizes the importance of maintaining secure communication and operational reliability for ATM systems.

Uploaded by

samrethidivima
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Proposed OSI Security Architecture for an ATM System

The OSI security architecture ensures that all security aspects


of an ATM system are covered, aligning with the OSI (Open
Systems Interconnection) model. Security mechanisms are
applied at different layers to provide Confidentiality, Integrity,
and Availability (CIA). Below is how security can be integrated
at various OSI layers for an ATM system:

1. Physical Layer Security

 Threats: Card skimming, eavesdropping on PIN entry


(shoulder surfing), ATM hardware tampering.
 Security Measures:
o Use of tamper-resistant ATMs.

o CCTV cameras and physical security guards.

o Anti-skimming devices and encrypted PIN pads.

2. Data Link Layer Security

 Threats: Network sniffing, MAC spoofing.


 Security Measures:
o Use of MAC address filtering to allow only authorized

ATM terminals.
o Encryption at link-level (e.g., WPA2 for wireless

connections).

3. Network Layer Security

 Threats: Man-in-the-middle (MITM) attacks, IP spoofing.


 Security Measures:
o Firewall to prevent unauthorized access.

o IPsec (Internet Protocol Security) for secure

communication.

4. Transport Layer Security

 Threats: Session hijacking, unauthorized data interception.


 Security Measures:
o TLS (Transport Layer Security) for encrypting

communication between the ATM and bank server.


o Session authentication and timeout mechanisms.

5. Session Layer Security

 Threats: Unauthorized session establishment, session


hijacking.
 Security Measures:
o Secure login mechanisms with encrypted session

tokens.
o Automatic session termination after inactivity.

6. Presentation Layer Security

 Threats: Data interception, format manipulation attacks.


 Security Measures:
o Data encryption standards (AES, RSA) for secure data

representation.
o Tokenization of sensitive user information.

7. Application Layer Security


 Threats: Malware, phishing attacks, unauthorized access.
 Security Measures:
o Multi-factor authentication (MFA) for account

access.
o Real-time fraud detection and transaction

monitoring.

Examples of CIA (Confidentiality, Integrity, and Availability) in


an ATM System

Security
ATM Example
Aspect
Ensuring that the user’s PIN is encrypted and
Confidentiality not exposed during transmission. Card details
should not be stored in plain text.
The ATM system should verify that the user’s
entered PIN matches the bank records without
Integrity unauthorized modifications. If a transaction is
initiated, it must be completed without
tampering.
The ATM should be operational 24/7. Even
during high traffic, system failures should be
Availability
minimized using redundant servers and backup
power.

You might also like