Cyber Threat Modeling for Mixed-Reality Applications in Financial Services: A Comprehensive Framework for Virtual and Augmented Reality Banking Environments

Authors

  • Tolulope Awobeku Department of Technology, Eastern Illinois University, USA
  • Olajide Adebayo Department of Technology, Eastern Illinois University, USA

DOI:

https://doi.org/10.61424/jcsit.v1i1.397

Abstract

The integration of mixed-reality (MR) technologies, encompassing both virtual reality (VR) and augmented reality (AR), into financial services represents a paradigm shift that introduces unprecedented cybersecurity challenges. This research explores the unique threat landscape emerging from the deployment of immersive technologies in banking services, including virtual branches, immersive financial analytics, and augmented customer interaction platforms. Through systematic analysis of existing literature and empirical evaluation of current MR implementations in the US financial sector, this study proposes a comprehensive threat modeling framework specifically tailored for mixed-reality banking applications. The research identifies critical vulnerabilities spanning authentication mechanisms, data privacy, immersive interface manipulation, and cross-reality attack vectors. Our proposed framework integrates traditional cybersecurity controls with novel MR-specific security measures, providing financial institutions with actionable guidance for secure implementation of immersive technologies. The findings reveal that conventional security models are insufficient for addressing the multi-dimensional nature of mixed-reality threats, necessitating a holistic approach that considers the convergence of physical, digital, and virtual attack surfaces.

Downloads

Published

2023-11-21

How to Cite

Awobeku, T., & Adebayo, O. (2023). Cyber Threat Modeling for Mixed-Reality Applications in Financial Services: A Comprehensive Framework for Virtual and Augmented Reality Banking Environments. Journal of Computer Science and Information Technology, 1(1), 64–86. https://doi.org/10.61424/jcsit.v1i1.397