R. Kinney Williams & Associates
R. Kinney Williams
& Associates

Internet Banking News

June 22, 2003

CONTENT
INTERNET COMPLIANCE INFORMATION SYSTEMS SECURITY INFORMATION SECURITY QUESTION
INTERNET PRIVACY PENETRATION TESTS - WEB SITE AUDITS


Kinney's comment:  As many of you know, I maintain a web site that list the financial institutions on the Internet at http://www.thecommunitybanker.com/bank_links/index.htm for banks and http://www.thecommunitybanker.com/cu_links/ for credit unions.  I receive at least one notification a month that an institution's link goes to an adult web site.  Unfortunately, this happens is when an institution changes its domain name. The adult businesses take over the old domain name because of all the hits the institution's old domain name received.  We strongly recommend that if you change your domain name, that you do not let the old domain name expire.  The cost to maintain the old domain name is relatively inexpensive compared to the possible reputational risk.  If your link is not correct, please notify me immediately at examiner@yennik.com, and I will make any necessary changes.

FYI  - Newest BugBear virus targets financial institutions - The latest variant of the BugBear computer virus is being investigated by the FBI after the virus was found to be specifically targeting banks among its many potential victims.  http://www.computerworld.com/printthis/2003/0,4814,82015,00.html 

FYI
 -
The General Accounting Office today released its report on the FDIC Information Security: Progress Made but Existing Weaknesses Place Data 
http://www.gao.gov/cgi-bin/getrpt?GAO-03-630 
Highlights - http://www.gao.gov/highlights/d03630high.pdf 

FYI  - Revised Compliance Examination Process - The Federal Deposit Insurance Corporation has revised its process for examining FDIC-supervised depository institutions to determine their compliance with consumer protection laws and regulations. The revised process focuses increased attention on an institution's compliance management system. Examiners will begin to use these procedures for all examinations for which an on-site review is scheduled to begin on or after June 30, 2003. www.fdic.gov/news/news/financial/2003/fil0352.html

FYI - What happens when an institution does not following BSA, OFAC, etc.  The Federal Reserve Board on Monday announced the execution of a Written Agreement by and between Southern Commercial Bank, St. Louis, Missouri and the Federal Reserve Bank of St. Louis. www.federalreserve.gov/boarddocs/press/Enforcement/2003/20030616/default.htm


FYI - Securities group: Treat IM like e-mail - Instant messages should be treated the same as e-mail messages and archived for three years, the Nasdaq's regulator is telling its members.  http://news.com.com/2100-1032-1018960.html?part=dht&tag=ntop 
http://www.pcworld.com/news/article/0,aid,111234,00.asp 


FYI - Intrusion Detection On The Way Out - The research firm says the software, which attempts to spot and report attacks against information systems, will no longer be necessary in a couple of years.  http://www.informationweek.com/shared/printableArticle.jhtml?articleID=10300918 
http://www.eweek.com/print_article/0,3668,a=43256,00.asp  
Kinney's comment:  Do not throw away your IDS.  Best practices will always require some type of detection system in case the firewall is not functioning properly.

FYI - E-mail's up--is the boss watching? - U.S. workers spend nearly a quarter of their day dealing with e-mail, according to a new study.  http://news.com.com/2100-1032_3-1018562.html?tag=fd_top 

Return to the top of the newsletter

INTERNET COMPLIANCERecord Retention

Record retention provisions apply to electronic delivery of disclosures to the same extent required for non-electronic delivery of information. For example, if the web site contains an advertisement, the same record retention provisions that apply to paper-based or other types of advertisements apply. Copies of such advertisements should be retained for the time period set out in the relevant regulation. Retention of electronic copies is acceptable.
 

Return to the top of the newsletter

INFORMATION SYSTEMS SECURITY
We continue our series on the FFIEC interagency Information Security Booklet.  

INFORMATION SECURITY STRATEGY (2 of 2)

Any particular approach should consider: (1) policies, standards, and procedures; (2) technology and architecture; (3) resource dedication; (4) training; and (5) testing.


For example, an institution’s management may be assessing the proper strategic approach to intrusion detection for an Internet environment. Two potential approaches were identified for evaluation. The first approach uses a combination of network and host intrusion detection sensors with a staffed monitoring center. The second approach consists of daily access log review. The former alternative is judged much more capable of detecting an attack in time to minimize any damage to the institution and its data, albeit at a much greater cost. The added cost is entirely appropriate when customer data and institution processing capabilities are exposed to an attack, such as in an Internet banking environment. The latter approach may be appropriate when the primary risk is reputational damage, such as when the only information being protected is an information-only Web site, and the Web site is not connected to other financial institution systems.

Strategies should consider the layering of controls. Excessive reliance on a single control could create a false sense of confidence. For example, a financial institution that depends solely on a firewall can still be subject to numerous attack methodologies that exploit authorized network traffic. Financial institutions should design multiple layers of security controls and testing to establish several lines of defense between the attacker and the asset being attacked. To successfully attack the data, each layer must be penetrated. With each penetration, the probability of detecting the attacker increases.

Policies are the primary embodiment of strategy, guiding decisions made by users, administrators, and managers, and informing those individuals of their security responsibilities. Policies also specify the mechanisms through which responsibilities can be met, and provide guidance in acquiring, configuring, and auditing information systems. Key actions that contribute to the success of a security policy are:

1)  Implementing through ordinary means, such as system administration procedures and acceptable - use policies;

2)  Enforcing policy through security tools and sanctions;

3)  Delineating the areas of responsibility for users, administrators, and managers;

4)  Communicating in a clear, understandable manner to all concerned;

5)  Obtaining employee certification that they have read and understood the policy;

6)  Providing flexibility to address changes in the environment; and

7)  Conducting annually a review and approval by the board of directors.


Return to the top of the newsletter

INFORMATION SECURITY QUESTION:

A. AUTHENTICATION AND ACCESS CONTROLS
- Authentication

10. Determine whether PKI (Public Key Infrastructure)-based authentication mechanisms

• Securely issue and update keys,

• Securely unlock the secret key,

• Provide for expiration of keys at an appropriate time period,

• Ensure the certificate is valid before acceptance,

• Update the list of revoked certificates at an appropriate frequency,

• Employ appropriate measures to protect private and root keys, and


• Appropriately log use of the root key.

Return to the top of the newsletter

INTERNET PRIVACY
- We continue covering various issues in the "Privacy of Consumer Financial Information" published by the financial regulatory agencies in May 2001.

Sharing nonpublic personal information with nonaffiliated third parties under Sections 13, and 14 and/or 15 but not outside of these exceptions
(Part 2 of 2)

B. Presentation, Content, and Delivery of Privacy Notices 

1)  Review the financial institution's initial and annual privacy notices. Determine whether or not they:

a.  Are clear and conspicuous (§§3(b), 4(a), 5(a)(1)); 

b.  Accurately reflect the policies and practices used by the institution (§§4(a), 5(a)(1)). Note, this includes practices disclosed in the notices that exceed regulatory requirements; and

c.  Include, and adequately describe, all required items of information and contain examples as applicable (§§6, 13).

2)  Through discussions with management, review of the institution's policies and procedures, and a sample of electronic or written consumer records where available, determine if the institution has adequate procedures in place to provide notices to consumers, as appropriate. Assess the following:

a.  Timeliness of delivery (§4(a)); and

b.  Reasonableness of the method of delivery (e.g., by hand; by mail; electronically, if the consumer agrees; or as a necessary step of a transaction) (§9).

c.  For customers only, review the timeliness of delivery (§§4(d), 4(e), and 5(a)), means of delivery of annual notice §9(c)), and accessibility of or ability to retain the notice (§9(e)).

Return to the top of the newsletter

PENETRATION TESTS - WEB SITE AUDITS - We offer independent Internet auditing regarding web sites compliance and penetration-vulnerability  testing. 
Visit http://www.bankwebsiteaudits.com for more information about web site audits.  For information regarding penetration-vulnerability testing visit http://www.internetbankingaudits.com/ or email Kinney Williams at examiner@yennik.com.

 

PLEASE NOTE:  Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.  

Back Button

Company Information
Yennik, Inc.

4409 101st Street
Lubbock, Texas 79424
Office 806-798-7119
Examiner@yennik.com

 

Please visit our other web sites:
VISTA penetration-vulnerability testing
The Community Banker - Bank FFIEC & ADA Web Site Audits
Credit Union FFIEC & ADA Web Site Audits - Bank Auditing Services
US Banks on the Internet  
US Credit Unions on the Internet

All rights reserved; Our logo is registered with the United States Patent and Trademark Office.
Terms and Conditions, Privacy Statement, © Copyright Yennik, Incorporated