0% found this document useful (0 votes)
80 views

Embedded System Term Paper

This document proposes researching the security of ATM machines using Kali Linux. It will involve installing Kali Linux, conducting simulated attacks against an ATM to identify vulnerabilities, and determining how to mitigate the vulnerabilities found in order to enhance ATM security. The research will review concepts like penetration testing and security audits. It will use tools in Kali Linux to detect vulnerabilities in the ATM and evaluate how severe they are. The goal is to help make ATMs more secure against the billions lost annually to ATM crimes.

Uploaded by

Md Zahid Hossain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
80 views

Embedded System Term Paper

This document proposes researching the security of ATM machines using Kali Linux. It will involve installing Kali Linux, conducting simulated attacks against an ATM to identify vulnerabilities, and determining how to mitigate the vulnerabilities found in order to enhance ATM security. The research will review concepts like penetration testing and security audits. It will use tools in Kali Linux to detect vulnerabilities in the ATM and evaluate how severe they are. The goal is to help make ATMs more secure against the billions lost annually to ATM crimes.

Uploaded by

Md Zahid Hossain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Research paper proposal

Department of Computer Science


American International University, Bangladesh (AIUB)

Title: ATM Security Audit using Kali Linux


Abstract: ATMs are attractive targets for criminals, and crimes against them are
constantly evolving. In fact, criminals who target ATMs cost the industry billions
of dollars every year. The ATM are connected to BANK are exposed to numerous
threats and exploits. With the utilization of penetration testing, vulnerabilities of a
system can be identified and simulated attack can be launched to determine how
severe the vulnerabilities are. This paper reviewed some of the security concepts,
including penetration testing, security analysis, and security audit. On the other
hand, Kali Linux is the most popular penetration testing and security audit
platform with advanced tools to detect any vulnerabilities uncovered in the target
machine. For this purpose, Kali Linux setup and installation will be described in
more details. Further research including simulated attacks to ATM machine will be
conducted and process to mitigate the vulnerabilities.

Introduction: Automated Teller Machines (ATMs) are one of the highest value
customer touch points in the banking industry. ATM are increasing day by day in
banking industry. Providing a direct interface to cash inevitably makes ATMs a
target in a numerous and sophisticated ways with new methods being regularly
exposed. Attack methods extend from physical (such as skimming and pin
cameras) to virtual through malware. Above all, the customer must trust the
ATM. Banks and ATM operators must protect their ATMs and meet their
compliance obligations for operating in a heavily regulated industry sector. But
doing so can be challenge. They are subject to vulnerabilities and often exploited
in similar fashion to a laptop or workstation.
This document identifies security audit for ATMs, considering the protection that
can be provided by the hardware and the software of the ATM itself against
attacks aimed at compromising sensitive data acquired, stored, exported, or in
any way processed by the device. This document is aligned with the security
approach and modularity of the set of security requirements.

Methodology: Kali Linux is the most popular software package for penetration
testing and security audit, in which many books have been written in this topic.
The objective of this paper is to provide a comprehensive review on the security
penetration and security audit using Kali Linux. Section 2 describes the
penetration testing, while Section 3 explains about the role of security analysis.
Section 4 describes security audit, while Section 5 describes the setup of Kali
Linux, Section 6 describes vulnerability assessment of live ATM, and Section 7
describe how to mitigate the vulnerabilities for enhancing ATM security. The last
section concludes this paper.

Conclusion: This paper will be presented a review of penetration testing,


security analysis, and security audit of ATM. On the penetration testing, we will
review the most popular techniques including SQLi, XSS, LFI, RFI, DDoS, MITM,
and zero-day vulnerabilities. On the other hand, Kali Linux is the most popular
penetration testing and security audit platform with advanced tools to detect any
vulnerabilities uncovered in the target machine.

You might also like