R. Kinney Williams & Associates
R. Kinney Williams
& Associates

Internet Banking News

January 2, 2005

CONTENT Internet Compliance Information Systems Security
IT Security Question Internet Privacy Website for Penetration Testing


VISTA - Did you know that there are over 3,900 known vulnerabilities As we begin the New Year, the time is right to schedule penetration-vulnerability testing for Yennik, Inc.The FFIEC interagency Information Security Booklet states in part that financial institutions should have at least an annual independent penetration test.  Since we are IT auditors, we can provide the independent penetration-vulnerability testing required by your examiners.  For more information, please visit our web site at http://www.internetbankingaudits.com/ or email Kinney Williams at examiner@yennik.com.

FYI - 'Phishing' attacks rocket in November - Fraudsters ramped up "phishing" attacks by 29 percent in November, according to a new report. http://asia.cnet.com/news/security/printfriendly.htm?AT=39209629-39037064t-39000005c

FYI -
Agencies Announce Final Rules on Disposal of Consumer Information - The federal bank and thrift regulatory agencies today announced interagency final rules to require financial institutions to adopt measures for properly disposing of consumer information derived from credit reports.
Press Release: www.federalreserve.gov/boarddocs/press/bcreg/2004/20041221/default.htm 
Press Release: http://www.ots.treas.gov/docs/7/77452.html 
Press Release: www.fdic.gov/news/news/press/2004/pr12804.html 
Press Release: www.occ.treas.gov/scripts/newsrelease.aspx?JNR=1&Doc=H3RLP4BE.xml 
Attachment: www.occ.treas.gov/ftp/release/2004-113a.pdf 

FYI -
Automated Clearing House - This bulletin advises national banks and examiners about three amendments to National Automated Clearing House Association Operating Rules that became effective in 2004. The bulletin supplements guidance on Automated Clearing House activities outlined in the FFIEC IT Handbook, "Retail Payment Systems," dated March 2004. www.occ.treas.gov/ftp/bulletin/2004-58.txt 

FYI
-
FDIC Receives Technology Award - The Federal Deposit Insurance Corporation recently received a 2004 Enterprise Architecture Excellence Award from the Zachman Institute for Framework Advancement for its initiative to manage corporate data collaboratively. www.fdic.gov/news/news/press/2004/pr13104.html 

Return to the top of the newsletter

INTERNET COMPLIANCE -  
Guidance on Safeguarding Customers Against E-Mail and Internet-Related Fraudulent Schemes (Part 1 of 3)

E-mail and Internet-related fraudulent schemes, such as "phishing" (pronounced "fishing"), are being perpetrated with increasing frequency, creativity and intensity. Phishing involves the use of seemingly legitimate e-mail messages and Internet Web sites to deceive consumers into disclosing sensitive information, such as bank account information, Social Security numbers, credit card numbers, passwords, and personal identification numbers (PINs). The perpetrator of the fraudulent e-mail message may use various means to convince the recipient that the message is legitimate and from a trusted source with which the recipient has an established business relationship, such as a bank. Techniques such as a false "from" address or the use of seemingly legitimate bank logos, Web links and graphics may be used to mislead e-mail recipients.

In most phishing schemes, the fraudulent e-mail message will request that recipients "update" or "validate" their financial or personal information in order to maintain their accounts, and direct them to a fraudulent Web site that may look very similar to the Web site of the legitimate business. These Web sites may include copied or "spoofed" pages from legitimate Web sites to further trick consumers into thinking they are responding to a bona fide request. Some consumers will mistakenly submit financial and personal information to the perpetrator who will use it to gain access to financial records or accounts, commit identity theft or engage in other illegal acts.

The Federal Deposit Insurance Corporation (FDIC) and other government agencies have also been "spoofed" in the perpetration of e-mail and Internet-related fraudulent schemes. For example, in January 2004, a fictitious e-mail message that appeared to be from the FDIC was widely distributed, and it told recipients that their deposit insurance would be suspended until they verified their identity. The e-mail message included a hyperlink to a fraudulent Web site that looked similar to the FDIC's legitimate Web site and asked for confidential information, including bank account information.

Return to the top of the newsletter

INFORMATION SYSTEMS SECURITY
- We continue our series on the FFIEC interagency Information Security Booklet.

SECURITY TESTING - TESTING CONCEPTS AND APPLICATION

Testing Risks to Data Integrity, Confidentiality, and Availability. Management is responsible for carefully controlling information security tests to limit the risks to data integrity, confidentiality, and system availability. Because testing may uncover nonpublic customer information, appropriate safeguards to protect the information must be in place. Contracts with third parties to provide testing services should require that the third parties implement appropriate measures to meet the objectives of section 501(b) of the GLBA. Management also is responsible for ensuring that employee and contract personnel who perform the tests or have access to the test results have passed appropriate background checks, and that contract personnel are appropriately bonded. Because certain tests may pose more risk to system availability than other tests, management is responsible for considering whether to require the personnel performing those tests to maintain logs of their testing actions. Those logs can be helpful should the systems react in an unexpected manner.

Confidentiality of Test Plans and Data. Since knowledge of test planning and results may facilitate a security breach, institutions should carefully limit the distribution of their testing information. Management is responsible for clearly identifying the individuals responsible for protecting the data and provide guidance for that protection, while making the results available in a useable form to those who are responsible for following up on the tests. Management also should consider requiring contractors to sign nondisclosure agreements and to return to the institution information they obtained in their testing.

Return to the top of the newsletter

IT SECURITY QUESTION: 
ENCRYPTION

4. Determine whether adequate provision is made for different cryptographic keys for different uses and data..

Return to the top of the newsletter

INTERNET PRIVACY
- We continue our series listing the regulatory-privacy examination questions.  When you answer the question each week, you will help ensure compliance with the privacy regulations.


Initial Privacy Notice

1)  Does the institution provide a clear and conspicuous notice that accurately reflects its privacy policies and practices to all customers not later than when the customer relationship is established, other than as allowed in paragraph (e) of section four (4) of the regulation? [§4(a)(1))]?

(Note: no notice is required if nonpublic personal information is disclosed to nonaffiliated third parties only under an exception in Sections 14 and 15, and there is no customer relationship. [§4(b)] With respect to credit relationships, an institution establishes a customer relationship when it originates a consumer loan. If the institution subsequently sells the servicing rights to the loan to another financial institution, the customer relationship transfers with the servicing rights. [§4(c)])

 

PLEASE NOTE:  Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.  

Back Button

Company Information
Yennik, Inc.

4409 101st Street
Lubbock, Texas 79424
Office 806-798-7119
Examiner@yennik.com

 

Please visit our other web sites:
VISTA penetration-vulnerability testing
The Community Banker - Bank FFIEC & ADA Web Site Audits
Credit Union FFIEC & ADA Web Site Audits - Bank Auditing Services
US Banks on the Internet  
US Credit Unions on the Internet

All rights reserved; Our logo is registered with the United States Patent and Trademark Office.
Terms and Conditions, Privacy Statement, © Copyright Yennik, Incorporated