Skip to main content

Applying the Cybersecurity Game to a Point-of-Sale System

  • Conference paper
  • First Online:
Disciplinary Convergence in Systems Engineering Research

Abstract

The objective of this chapter is to describe the application of the cybersecurity game (CSG) to a point-of-sale (PoS) system and the knowledge discovered from these activities. All PoS systems process over 195 billion electronic transactions with a volume of over US $28.8 trillion per year. In 2014, there were 79,790 cybersecurity incidents reported affecting PoS. There exists a pressing need to understand the cost-benefit for cybersecurity risk reduction investments; however, risk reduction investments face resource limitations. CSG was applied to a PoS to address this need. CSG is a methodology and software tool that models the cyber risk of information and communication technology (ICT) systems. CSG produces security portfolios that are Pareto optimal against quantitative cyber risk and investment costs. CSG identifies the set of defensive methods that best reduce cyber risk for any given investment level. The nominal risk score without employing any defensive methods is 8,492,934. The best risk reduction can be achieved using all of the tools at a cost of ~250,000; however, 89% of the risk reduction is achieved by spending only ~16% of the cost. Additionally, two defense methods were found to provide major reductions in risk. The first is to segment the network between PoS systems and the remainder of the merchant’s ICT system. The second was to encrypt information throughout the merchant’s ICT system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. The Nilson Report, Charts & Graphs Archive, 2016. [Online]. Available: https://www.nilsonreport.com/publication_chart_and_graphs_archive.php?1=1&year=2016#. Accessed 25 March 2016

  2. MarketWatch, “Global Card Fraud Losses Reach $16.31 Billion — Will Exceed $35 Billion in 2020 According to The Nilson Report,” 4 Aug 2015. [Online]. Available: http://www.marketwatch.com/story/global-card-fraud-losses-reach-1631-billion-will-exceed-35-billion-in-2020-according-to-the-nilson-report-2015-08-04. Accessed 25 March 2016

  3. MasterCard (2015) Supplemental operational performance 2015Q2– 2013Q1. MasterCard

    Google Scholar 

  4. VISA (2015) Operational performance data 2Q2015. VISA

    Google Scholar 

  5. Verizon (2015) 2015 data breach investigation report. Verizon

    Google Scholar 

  6. Ponemon Institute, (2015) 2015 cost of data breach study: global analysis. Ponemon Institute

    Google Scholar 

  7. Musman S (2015) Playing the cyber security game: a rational approach to cyber security and resilience decision making. MITRE Technical Report, MTR-150371, McLean, VA

    Google Scholar 

  8. Roy S, Ellis C, Shiva S, Dasgupta D, Shandilya V, Wu Q (2010) A survey of game theory as applied to network security. In 43rd Hawaii International Conference on System Sciences (HICSS), Koloa, HI

    Google Scholar 

  9. Musman S, Agbolosu-Amison S (2014) A measurable definition of resiliency using “mission risk” as a metric. The MITRE Corporation, McLean, VA

    Google Scholar 

  10. Clemens PL, Swallom DW (2005) Summing risk — an international workshop and its results. 41(6)

    Google Scholar 

  11. Musman S, Temin A (2015) A cyber mission impact assessment tool. In IEEE International Symposium on Technologies for Homeland Security, Waltham, MA

    Google Scholar 

  12. Turner AJ, Musman S (2016) Using cyber impacts to assess cyber risk mitigation on point of sale systems using CMIA and CSG. MITRE Technical Report, MTR-160339, Bedford, MA

    Google Scholar 

  13. Temin A, Musman S (2010) A language for capturing cyber impact effects. MITRE Technical Report MTR-10344. MITRE Corporation, Washington, DC

    Google Scholar 

  14. Garvey PR, Patel SH (2014) Analytical frameworks to assess the effectiveness and economic-returns of cybersecurity investments. In Military Communications Conference (MILCOM), 2014 IEEE, Baltimore, MD

    Google Scholar 

  15. Carin L, Cybenko G, Hughes J (2008) Cybersecurity strategies: the QuERIES methodology. Computer 41(8):20–26

    Article  Google Scholar 

  16. Buckshaw D, Parnell G, Unkenholz W, Parks D, Wallner J, Saydjari O (2005) Mission oriented risk and design analysis. 2

    Google Scholar 

Download references

Disclaimer

The authors’ affiliation with The MITRE Corporation is provided for identification purposes only and is not intended to convey or imply MITRE’s concurrence with, or support for, the positions, opinions, or viewpoints expressed by the authors. 16-3460

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrew J. Turner .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Turner, A.J., Musman, S. (2018). Applying the Cybersecurity Game to a Point-of-Sale System. In: Madni, A., Boehm, B., Ghanem, R., Erwin, D., Wheaton, M. (eds) Disciplinary Convergence in Systems Engineering Research. Springer, Cham. https://doi.org/10.1007/978-3-319-62217-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-62217-0_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-62216-3

  • Online ISBN: 978-3-319-62217-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics