Attacking a System


For this assignment, you job is to figure out how best to attack a system. I leave it up to you to figure out which component to attack and what the goals of the attack should be—the goal or goals merely have to be plausible. (Why do I leave it up to you? One of the jobs of a security analyst is figuring out the threat model—the system developers may not have thought about it.)

The (hypothetical) system in question is the banking network. There are a number of parties and interconnections.

There are a number of aspects I've deliberately left unspecified. Make any reasonable assumptions you like, but document them. If there is a more secure option than the one you choose, explain why your choice is better under the circumstances, given the usual tradeoffs of cost, usability, etc.

You may find this diagram useful. Dotted lines are manual operations; solid lines are electronic transfers. The arrows show the direction of a connection initiation. (Yes, this is oversimplified…)

Out of scope: physically stealing ATMs, walking into a bank branch with a gun, etc. This is a computer security class; you can invoke physical security issues if and only if they're relevant to a computer security issue. Avoid heist movie scenarios!