R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

July 6, 2008

CONTENT Internet Compliance Information Systems Security
IT Security Question
Internet Privacy
Website for Penetration Testing
Does Your Financial Institution need an affordable Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our penetration testing audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, OTS, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) The penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world weaknesses.  For more information, give R. Kinney Williams a call today at 806-798-7119 or visit http://www.internetbankingaudits.com/.

Court protects privacy of work emails, texts - A federal appeals court in San Francisco has made it more difficult for employers to legally access emails and text messages sent by their workers on company accounts. Under Wednesday's ruling by the 9th U.S. Circuit Court of Appeals, employers that contract an outside business to transmit text messages can't read them unless the worker agrees. http://www.usatoday.com/tech/news/techpolicy/2008-06-19-privacy-work-communications_N.htm?csp=34

FSA fines stockbrokers for poor data security - A firm of stockbrokers has been fined for failing to adequately protect its customers from the risk of identity fraud. The Financial Services Authority (FSA) said its mistakes included failing to manage the risks introduced by staff using instant messaging and web-based email. http://www.theregister.co.uk/2008/06/19/fsa_fines_msgl/print.html

If you can't trust the compliance officer, whom can you trust? - I often wonder if I'll get to an age where I'm not disillusioned by the world around me. After having thought I'd seen it all, I just found out that compliance officers cannot be trusted! http://www.scmagazineus.com/If-you-cant-trust-the-compliance-officer-whom-can-you-trust/article/111536/?DCMP=EMC-SCUS_Newswire

PCI standard 'ignores' insider threat - Database security firm warns of gaping holes - PCI is generally inadequate for addressing the sort of internal threat that can be exploited easily - New measures implemented in section 6.6 of the Payment Card Industry (PCI) standard, which come into force on 30 June, do nothing to address the threat of insiders, according to a database security firm.
News article - http://www.vnunet.com/vnunet/news/2219820/pci-standard-lacking-secerno
PCI standard - https://www.pcisecuritystandards.org/pdfs/infosupp_6_6_applicationfirewalls_codereviews.pdf

On the tracks of medical data: Electronic records pressure - Privacy breaches related to electronic medical records seem to appear in the news regularly. The Walter Reed Army Medical Center started to notify 1,000 patients of a privacy breach in June. A few days earlier, the University of California San Francisco (UCSF) disclosed that it had to notify more than 3,000 patients of a privacy breach in the Department of Pathology. http://www.scmagazineus.com/On-the-tracks-of-medical-data-Electronic-records-pressure/article/111447/?DCMP=EMC-SCUS_Newswire

Laptop searches in airports draw fire at Senate hearing - Advocacy groups and some legal experts told Congress on Wednesday that it was unreasonable for federal officials to search the laptops of United States citizens when they re-enter the country from traveling abroad. http://news.cnet.com/Laptop-searches-in-airports-draw-fire-at-Senate-hearing/2100-7348_3-6242603.html?tag=cd.top


Fraudulent ATM transactions overseas could be tied to Indiana bank breach - A server intrusion at 1st Source Bank in South Bend took place in May - A flurry of fraudulent ATM transactions in recent days in countries such as Russia, Ukraine, Turkey and the Czech Republic may be tied to a server intrusion at 1st Source Bank in South Bend, Ind. http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9101158&source=rss_topic17

Citibank Hack Blamed for Alleged ATM Crime Spree - A computer intrusion into a Citibank server that processes ATM withdrawals led to two Brooklyn men making hundreds of fraudulent withdrawals from New York City cash machines in February, pocketing at least $750,000 in cash, according to federal prosecutors.

Photobucket tipped over by Turkish hacker - Photobucket, the popular photo sharing website, became the target of a DNS hack. As a result of the attack some (but not all) surfers hoping to check out pictures were involuntarily redirected to a greeting from hacker NetDeliz and a message in Turkish. http://www.theregister.co.uk/2008/06/18/photobucket_dns_hack/print.html

Thousands of confidential patient records lost - Courier company TNT loses disc containing details of 900,000 calls to Scottish Ambulance ServiceLorraine Davidson - Nicola Sturgeon, the Scottish Health Secretary, was under pressure last night to make an emergency statement to MSPs after the embarrassing loss of confidential patient data from the Scottish Ambulance Service. http://www.timesonline.co.uk/tol/news/uk/scotland/article4201288.ece

CNET Employees Notified After Data Breach - More than 6,500 CNET Networks employees and relatives are being notified of a possible data breach after burglars stole computer systems from the offices of the company that administers the Internet publisher's benefit plans. http://www.pcworld.com/businesscenter/article/147460/cnet_employees_notified_after_data_breach.html

Data breach at Bay Area bank - Customers of one Bay Area bank should check their bank statements and apply for a new debit card after a data breach last week. Bank Atlantic confirms they had a data loss, involving their MasterCard debit cards. http://www.myfoxtampabay.com/myfox/pages/News/Detail?contentId=6830565&version=1&locale=EN-US&layoutCode=TSTY&pageId=3.2.1

Return to the top of the newsletter

WEB SITE COMPLIANCE - We conclude the series regarding FDIC Supervisory Insights regarding
Incident Response Programs.  (12 of 12)

What the Future Holds

In addition to meeting regulatory requirements and addressing applicable industry best practices, several characteristics tend to differentiate banks. The most successful banks will find a way to integrate incident response planning into normal operations and business processes. Assimilation efforts may include expanding security awareness and training initiatives to reinforce incident response actions, revising business continuity plans to incorporate security incident responses, and implementing additional security monitoring systems and procedures to provide timely incident notification. Ultimately, the adequacy of a bank's IRP reflects on the condition of the information security program along with management's willingness and ability to manage information technology risks. In essence, incident response planning is a management process, the comprehensiveness and success of which provide insight into the quality and attentiveness of management. In this respect, the condition of a bank's IRP, and the results of examiner review of the incident response planning process, fit well within the objectives of the information technology examination as described in the Information Technology-Risk Management Program. 

An IRP is a critical component of a well-formed and effective information security program and has the potential to provide tangible value and benefit to a bank. Similar to the importance of a business continuity planning program as it relates to the threat of natural and man-made disasters, sound IRPs will be necessary to combat new and existing data security threats facing the banking community. Given the high value placed on the confidential customer information held within the financial services industry, coupled with the publicized success of known compromises, one can reasonably assume that criminals will continue to probe an organization's defenses in search of weak points. The need for response programs is real and has been recognized as such by not only state and Federal regulatory agencies (through passage of a variety of legal requirements), but by the banking industry itself. The challenges each bank faces are to develop a reasonable IRP providing protections for the bank and the consumer and to incorporate the IRP into a comprehensive, enterprise-wide information security program. The most successful banks will exceed regulatory requirements to leverage the IRP for business advantages and, in turn, improved protection for the banking industry as a whole.

Return to the top of the newsletter
We continue our series on the FFIEC interagency Information Security Booklet.  



Biometrics (Part 1 of 2)

Biometrics can be implemented in many forms, including tokens. Biometrics verifies the identity of the user by reference to unique physical or behavioral characteristics. A physical characteristic can be a thumbprint or iris pattern. A behavioral characteristic is the unique pattern of key depression strength and pauses made on a keyboard when a user types a phrase. The strength of biometrics is related to the uniqueness of the physical characteristic selected for verification. Biometric technologies assign data values to the particular characteristics associated with a certain feature. For example, the iris typically provides many more characteristics to store and compare, making it more unique than facial characteristics. Unlike other authentication mechanisms, a biometric authenticator does not rely on a user's memory or possession of a token to be effective. Additional strengths are that biometrics do not rely on people to keep their biometric secret or physically secure their biometric. Biometrics is the only authentication methodology with these advantages.

Enrollment is a critical process for the use of biometric authentication. The user's physical characteristics must be reliably recorded. Reliability may require several samples of the characteristic and a recording device free of lint, dirt, or other interference. The enrollment device must be physically secure from tampering and unauthorized use.

When enrolled, the user's biometric is stored as a template. Subsequent authentication is accomplished by comparing a submitted biometric against the template, with results based on probability and statistical confidence levels. Practical usage of biometric solutions requires consideration of how precise systems must be for positive identification and authentication. More precise solutions increase the chances a person is falsely rejected. Conversely, less precise solutions can result in the wrong person being identified or authenticated as a valid user (i.e., false acceptance rate). The equal error rate (EER) is a composite rating that considers the false rejection and false acceptance rates. Lower EERs mean more consistent operations. However, EER is typically based upon laboratory testing and may not be indicative of actual results due to factors that can include the consistency of biometric readers to capture data over time, variations in how a user presents their biometric sample (e.g., occasionally pressing harder on a finger scanner), and environmental factors.

Return to the top of the newsletter



12. Determine whether logs of security-related events are sufficient to affix accountability for network activities, as well as support intrusion forensics and IDS. Additionally, determine that adequate clock synchronization takes place.

Return to the top of the newsletter

- We continue our series listing the regulatory-privacy examination questions.  When you answer the question each week, you will help ensure compliance with the privacy regulations.

39.  Does the institution use an appropriate means to ensure that notices may be retained or obtained later, such as:

a. hand-delivery of a printed copy of the notice; [9(e)(2)(i)]

b. mailing a printed copy to the last known address of the customer; [9(e)(2)(ii)] or

c. making the current privacy notice available on the institution's web site (or via a link to the notice at another site) for the customer who agrees to receive the notice at the web site? [9(e)(2)(iii)]


PLEASE NOTE:  Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.  

Back Button

Company Information
Yennik, Inc.

4409 101st Street
Lubbock, Texas 79424
Office 806-798-7119


Please visit our other web sites:
VISTA penetration-vulnerability testing
The Community Banker - Bank FFIEC & ADA Web Site Audits
Credit Union FFIEC & ADA Web Site Audits - Bank Auditing Services
US Banks on the Internet  
US Credit Unions on the Internet

All rights reserved; Our logo is registered with the United States Patent and Trademark Office.
Terms and Conditions, Privacy Statement, Copyright Yennik, Incorporated