R. Kinney Williams & Associates
R. Kinney Williams
& Associates

Internet Banking News

August 3, 2003

CONTENT
INTERNET COMPLIANCE INFORMATION SYSTEMS SECURITY INFORMATION SECURITY QUESTION
INTERNET PRIVACY PENETRATION TESTS - WEB SITE AUDITS


FYI - The Federal Reserve Bank of Boston has published an educational video and booklet on identity theft that explains what identity theft is, how consumers can protect themselves from becoming victims, and what they should do if they do become victims. These materials also explain the importance of checking consumer reports regularly, provide tips for how to read a consumer report, and list appropriate contact information for the three major consumer reporting agencies and certain federal government agencies. A copy of the Boston Reserve Bank's identity theft booklet can be viewed online at the Federal Reserve Bank of Boston's public web site. www.bos.frb.org/consumer/identity/index.htm 

FYI - Any organization looking to ensure software compliance, reduce its total cost of ownership, or increase its optimization of expensive computer software should be using some form of electronic tool to accurately locate and monitor its software assets. Dedicated tools have the ability to locate and identify a wide range of software, to "learn" the characteristics of software that is new or unique to the organization, and to analyze and report their findings in a variety of ways.  http://www.theiia.org/itaudit/index.cfm?fuseaction=forum&fid=5434 

FYI - Committee calls for better e-banking security management - Report lists 14 "best practices" for financial institutions  http://www.infoworld.com/article/03/07/23/HNebanking_1.html  
The Basel report can be found at http://www.bis.org/publ/bcbs98.pdf 

FYI- Windows passwords cracked in seconds -
If your passwords consist of letters and numbers, beware.  Swiss researchers released a paper on Tuesday outlining a way to speed the cracking of alphanumeric Windows passwords, reducing the time to break such codes to an average of 13.6 seconds, from 1 minute 41 seconds.  http://zdnet.com.com/2102-1105_2-5053063.html?tag=printthis 

FYI - A federal judge has ordered financial firm UBS to pay most of the cost of restoring lost e-mail in a gender discrimination suit against it, but she did shift some of the burden to the plaintiff.
  In a decision with wide-ranging ramifications for any company that keeps electronic records, U.S. District Judge Shira Scheindlin outlined and applied a set of legal principles that judges and parties in a lawsuit must consider when deciding who should pay for electronic evidence retrieval.  http://news.com.com/2100-1023_3-5056365.html?tag=cd_mh 

FYI - Guilty Plea in Kinko's Keystroke Caper
- For nearly two years ending last December, Jiang's makeshift surveillance net raked in over 450 online banking passwords and user names from hapless Kinko's customers, according to the plea.  http://www.securityfocus.com/news/6447 

FYI - Cybersecurity laws spread - At least 34 states are considering bills or have enacted laws on security for computers and networks, according to a new report.  http://www.fcw.com/geb/articles/2003/0721/web-ncs-07-23-03.asp 

Return to the top of the newsletter

INTERNET COMPLIANCE - We continue our review of the FFIEC interagency statement on "Weblinking: Identifying Risks and Risk Management Techniques." 

B. RISK MANAGEMENT TECHNIQUES

Introduction

Management must effectively plan, implement, and monitor the financial institution's weblinking relationships. This includes situations in which the institution has a third-party service provider create, arrange, or manage its website. There are several methods of managing a financial institution's risk exposure from third-party weblinking relationships. The methods adopted to manage the risks of a particular link should be appropriate to the level of risk presented by that link as discussed in the prior section.

Planning Weblinking Relationships

In general, a financial institution planning the use of weblinks should review the types of products or services and the overall website content made available to its customers through the weblinks. Management should consider whether the links support the institution's overall strategic plan. Tools useful in planning weblinking relationships include:

1)  due diligence with respect to third parties to which the financial institution is considering links; and

2)  written agreements with significant third parties.

Return to the top of the newsletter

INFORMATION SYSTEMS SECURITY
- We continue our series on the FFIEC interagency Information Security Booklet.  


SECURITY CONTROLS - IMPLEMENTATION

LOGICAL AND ADMINISTRATIVE ACCESS CONTROL 

AUTHENTICATION

Action Summary - Financial institutions should use effective authentication methods appropriate to the level of risk. Steps include

1)  Selecting authentication mechanisms based on the risk associated with the particular application or services;
2)  Considering whether multi - factor authentication is appropriate for each application, taking into account that multifactor authentication is increasingly necessary for many forms of electronic banking and electronic payment activities; and
3)  Encrypting the transmission and storage of authenticators (e.g., passwords, PINs, digital certificates, and biometric templates).

Authentication is the verification of identity by a system based on the presentation of unique credentials to that system. The unique credentials are in the form of something the user knows, something the user has, or something the user is. Those forms exist as shared secrets, tokens, or biometrics. More than one form can be used in any authentication process. Authentication that relies on more than one form is called multi - factor authentication and is generally stronger than any single authentication method. Authentication contributes to the confidentiality of data and the accountability of actions performed on the system by verifying the unique identity of the system user.

Authentication is not identification as that term is used in the USA PATRIOT Act (31 U.S.C. 5318(l)). Authentication does not provide assurance that the initial identification of a system user is proper. Authentication only provides assurance that the user of the system is the same user that was initially identified. Procedures for the initial identification of a system user are beyond the scope of this booklet.

Return to the top of the newsletter

INFORMATION SECURITY QUESTION:

B. NETWORK SECURITY

3. Evaluate controls over the management of remote equipment.

4. Determine if effective procedures and practices are in place to secure network services, utilities, and diagnostic ports, consistent with the overall risk assessment.

Return to the top of the newsletter

INTERNET PRIVACY
- We continue our series listing the regulatory-privacy examination questions.  When you answer the question each week, you will help ensure compliance with the privacy regulations.

Initial Privacy Notice

2)  Does the institution provide a clear and conspicuous notice that accurately reflects its privacy policies and practices to all consumers, who are not customers, before any nonpublic personal information about the consumer is disclosed to a nonaffiliated third party, other than under an exception in §§14 or 15? [§4(a)(2)]?

Return to the top of the newsletter

INTERNET AUDITING SERVICES - We offer independent Internet auditing regarding web sites compliance and penetration-vulnerability  testing.  Visit http://www.bankwebsiteaudits.com for more information about web site audits.  For information regarding penetration-vulnerability testing visit http://www.internetbankingaudits.com/ or email Kinney Williams at examiner@yennik.com.  We have clients in 37 states and more than 40 years banking and bank examining experience.

 

PLEASE NOTE:  Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.  

Back Button

Company Information
Yennik, Inc.

4409 101st Street
Lubbock, Texas 79424
Office 806-798-7119
Examiner@yennik.com

 

Please visit our other web sites:
VISTA penetration-vulnerability testing
The Community Banker - Bank FFIEC & ADA Web Site Audits
Credit Union FFIEC & ADA Web Site Audits - Bank Auditing Services
US Banks on the Internet  
US Credit Unions on the Internet

All rights reserved; Our logo is registered with the United States Patent and Trademark Office.
Terms and Conditions, Privacy Statement, © Copyright Yennik, Incorporated