R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

May 20, 2012

CONTENT Internet Compliance Web Site Audits
IT Security
 
Internet Privacy
 
Penetration Testing
 
Does Your Financial Institution need an affordable Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our penetration testing audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) The penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world weaknesses.  For more information, give R. Kinney Williams a call today at 806-798-7119 or visit http://www.internetbankingaudits.com/.


REMINDER - This newsletter is available for the Android smart phones and tablets.  Go to the Market Store and search for yennik.

FYI - FBI warns globe trotters about malware lurking in hotel room connections - The FBI is warning individuals who travel abroad that cybercriminals are installing malware through bogus software updates when users connect to the internet in their hotel rooms. http://www.infosecurity-magazine.com/view/25671/fbi-warns-globe-trotters-about-malware-lurking-in-hotel-room-connections/

FYI - Queen's speech confirms government internet snooping plans still in place - The government has used the Queen's Speech to confirm it intends to press ahead with controversial snooping plans that will make it easier for the police and intelligence agencies to access communications data. http://www.v3.co.uk/v3-uk/news/2173470/queens-speech-confirms-government-internet-snooping-plans

FYI - GAO - Social Security Administration: Improved Planning and Performance Measures Are Needed to Help Ensure Successful Technology Modernization. http://www.gao.gov/products/GAO-12-495

FYI - Pentagon expands cybersecurity exchange - The Pentagon predicts that as many as 1,000 defense contractors may join a voluntary effort to share classified information on cyberthreats under an expansion of a first-ever initiative to protect computer networks. http://www.washingtonpost.com/politics/pentagon-expands-cybersecurity-exchange/2012/05/13/gIQAwPyQOU_story.html

FYI - Georgia Man Admits Role in $1.3 Million Global Cyberscam - An online criminal pleaded guilty last week to participating in a cybercrime ring that deployed fake bank and payroll processing websites to steal more than $1.3 million. http://www.msnbc.msn.com/id/47342263/ns/technology_and_science-security/t/georgia-man-admits-role-million-global-cyberscam/

FYI - Trade in sensitive personal data uncovered by secret investigation - C4's Dispatches records private investigator selling bank details and criminal and medical records to reporters - The ease with which private investigators can access highly personal and sensitive information stored in secure government databases has been exposed by a report that will intensify calls to regulate the industry. http://www.guardian.co.uk/technology/2012/may/12/trade-personal-data-secret-investigation

FYI - Mounties Bust Disciplined, Multi-Million-Dollar Carding Ring - More than 40 people were arrested on Wednesday in Canada in a sting operation against what authorities say was a well-organized international bank card ring that stole at least $7 million and possibly hundreds of millions more. http://www.wired.com/threatlevel/2012/05/mounties-bust-carders/

FYI - IT head fired, ombudsman hired in wake of Utah breach - The governor of Utah has fired the head of the state's Department of Technology Services (DTS) following a Medicaid breach announced last month that quickly grew into a public relations disaster. http://www.scmagazine.com/it-head-fired-ombudsman-hired-in-wake-of-utah-breach/article/241473/?DCMP=EMC-SCUS_Newswire

FYI - Pros of managing security in cloud make it attractive - Small to midsize businesses (SMBs) looking to allocate more funds toward areas that directly affect their growth should be looking to the cloud, a new study from Microsoft reveals. http://www.scmagazine.com/pros-of-managing-security-in-cloud-make-it-attractive/article/241437/?DCMP=EMC-SCUS_Newswire

ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - Twitter warns users to reset passwords after hacking scare - Twitter has attempted to assure its users after reports circulated of 55,000 accounts being hacked and login credentials publicly disclosed. http://www.scmagazineuk.com/twitter-warns-users-to-reset-passwords-after-hacking-scare/article/240264/

FYI - 350,000 SSNs exposed in UNC-Charlotte breach - The Social Security numbers and financial account information of students and staff at the University of North Carolina at Charlotte (UNC-Charlotte) was exposed during an online security breach. http://www.scmagazine.com/350000-social-security-numbers-exposed-in-university-breach/article/240864/?DCMP=EMC-SCUS_Newswire

FYI - Data on 700K California home care workers, recipients lost - The personal information of home care workers and their elderly and disabled recipients may have been compromised when the storage device on which it was contained was lost in the mail.
http://www.scmagazine.com/data-on-700k-california-home-care-workers-recipients-lost/article/241124/?DCMP=EMC-SCUS_Newswire
http://arstechnica.com/security/2012/05/ca-social-services-office-looses-hundreds-of-thousands-of-recordson-microfiche/

FYI - Soca website attack: Norway arrests two youths - Two teenagers in Norway have been arrested in connection with a series of computer attacks. Britain's Serious Organised Crime Agency (Soca) is believed to have been among their suspected targets. http://www.bbc.com/news/technology-18005505

FYI - The Pirate Bay hits out at DDoS attacks on ISPs - File-sharing website The Pirate Bay has called distributed denial of service (DDoS) and similar attacks "forms of censorship". In a statement posted on its Facebook group, The Pirate Bay responded to actions by Anonymous against internet service providers (ISPs) that were instructed to block access to the file-sharing website. http://www.scmagazineuk.com/the-pirate-bay-hits-out-at-ddos-attacks-on-isps/article/240265/

FYI - Team Poison hacking inquiry: UK teenager arrested - Police have arrested a 17-year-old boy alleged to be the spokesman for a notorious hacking group. The boy is said to be a member of Team Poison, a group which claimed responsibility for more than 1,400 illegal activities. http://www.bbc.com/news/technology-18017387

FYI - Six indicted over Population Registry data theft - Former Social Affairs Ministry contractor allegedly stole database, passed it to haredi charity, from where it was sold abroad. http://www.jpost.com/NationalNews/Article.aspx?id=269728

Return to the top of the newsletter

WEB SITE COMPLIANCE -
We continue covering some of the issues discussed in the "Risk Management Principles for Electronic Banking" published by the Basel Committee on Bank Supervision.

While the Board of Directors has the responsibility for ensuring that appropriate security control processes are in place for e-banking, the substance of these processes needs special management attention because of the enhanced security challenges posed by e-banking.
  Over the next number of weeks we will cover the principles of Security Controls.

Security Controls - P
rinciple 1: Banks should take appropriate measures to authenticate the identity and authorization of customers with whom it conducts business over the Internet. (Part 1 of 2)

It is essential in banking to confirm that a particular communication, transaction, or access request is legitimate. Accordingly, banks should use reliable methods for verifying the identity and authorization of new customers as well as authenticating the identity and authorization of established customers seeking to initiate electronic transactions.

Customer verification during account origination is important in reducing the risk of identity theft, fraudulent account applications and money laundering. Failure on the part of the bank to adequately authenticate customers could result in unauthorized individuals gaining access to e-banking accounts and ultimately financial loss and reputational damage to the bank through fraud, disclosure of confidential information or inadvertent involvement in criminal activity.

Establishing and authenticating an individual's identity and authorization to access banking systems in a purely electronic open network environment can be a difficult task. Legitimate user authorization can be misrepresented through a variety of techniques generally known as "spoofing." Online hackers can also take over the session of a legitimate authorized individual through use of a "sniffer" and carry out activities of a mischievous or criminal nature. Authentication control processes can in addition be circumvented through the alteration of authentication databases.

Accordingly, it is critical that banks have formal policy and procedures identifying appropriate methodology(ies) to ensure that the bank properly authenticates the identity and authorization of an individual, agent or system by means that are unique and, as far as practical, exclude unauthorized individuals or systems. Banks can us a variety of methods to establish authentication, including PINs, passwords, smart cards, biometrics, and digital certificates. These methods can be either single factor or multi-factor (e.g. using both a password and biometric technology to authenticate). Multi-factor authentication generally provides stronger assurance.

Return to the top of the newsletter
 
INFORMATION TECHNOLOGY SECURITY
-
We continue our series on the FFIEC interagency Information Security Booklet.  

INTRUSION DETECTION AND RESPONSE

Automated Intrusion Detection Systems
(IDS) (Part 2 of 4)

"Tuning" refers to the creation of signatures that can distinguish between normal network traffic and potentially malicious traffic. Proper tuning of these IDS units is essential to reliable detection of both known attacks and newly developed attacks. Tuning of some signature - based units for any particular network may take an extended period of time, and involve extensive analysis of expected traffic. If an IDS is not properly tuned, the volume of alerts it generates may degrade the intrusion identification and response capability.

Signatures may take several forms. The simplest form is the URL submitted to a Web server, where certain references, such as cmd.exe, are indicators of an attack. The nature of traffic to and from a server can also serve as a signature. An example is the length of a session and amount of traffic passed. A signature method meant to focus on sophisticated attackers is protocol analysis, when the contents of a packet or session are analyzed for activity that violates standards or expected behavior. That method can catch, for instance, indicators that servers are being attacked using Internet control message protocol (ICMP).

Switched networks pose a problem for network IDS. Switches ordinarily do not broadcast traffic to all ports, and a network IDS may need to see all traffic to be effective. When switches do not have a port that receives all traffic, the financial institution may have to alter their network to include a hub or other device to allow the IDS to monitor traffic.

Encrypted network traffic will drastically reduce the effectiveness of a network IDS. Since a network IDS only reads traffic and does not decrypt the traffic, encrypted traffic will avoid detection.

Return to the top of the newsletter

INTERNET PRIVACY
- We continue our series listing the regulatory-privacy examination questions.  When you answer the question each week, you will help ensure compliance with the privacy regulations.


Content of Privacy Notice

15. If the institution provides a short-form initial privacy notice with the opt out notice, does the institution do so only to consumers with whom the institution does not have a customer relationship? [6(d)(1)]We continue our series listing the regulatory-privacy examination questions.  When you answer the question each week, you will help ensure compliance with the privacy regulations.


Content of Privacy Notice

15. If the institution provides a short-form initial privacy notice with the opt out notice, does the institution do so only to consumers with whom the institution does not have a customer relationship? [6(d)(1)]

 

PLEASE NOTE:  Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.  



Company Information
Yennik, Inc.

4409 101st Street
Lubbock, Texas 79424
Office 806-798-7119
Examiner@yennik.com

 

Please visit our other web sites:
VISTA penetration-vulnerability testing
The Community Banker - Bank FFIEC & ADA Web Site Audits
Credit Union FFIEC & ADA Web Site Audits - Bank Auditing Services
US Banks on the Internet  
US Credit Unions on the Internet

All rights reserved; Our logo is registered with the United States Patent and Trademark Office.
Terms and Conditions, Privacy Statement, Copyright Yennik, Incorporated