FYI - Best Practices for
Wireless Network Security - Wireless
technology is dramatically changing the world of computing, creating
new business opportunities but also increasing security risks.
http://www.computerworld.com/printthis/2003/0,4814,86951,00.html
FYI - The Risks of Outsourcing - Outsourcing IT development
and services has suddenly become a big issue among business
executives, IT professionals, and politicians in Europe and North
America. http://www.theiia.org/itaudit/index.cfm?fuseaction=forum&fid=5465
FYI
-
Brazil cracks down on hackers
- Brazilian police arrested 18 Internet hackers in a massive effort
to dismantle a gang operating across four northern states,
authorities said. http://news.com.com/2102-7355_3-5103010.html?tag=st_util_print
FYI - Australia - RUBBISH tips were searched by Telstra
staff in a desperate attempt to recover classified government emails
stored in a wheelie bin and accidentally dumped, a Senate committee
has been told. http://news.com.au/common/story_page/0,4057,7759335^15319,00.html
FYI
- Keeping up with the latest security updates is a
full-time job. Dale Sweitzer, a network administrator
for Crossville Ceramics in Crossville, Tennessee, has hit a rough
patch--or a series of rough patches to be exact. http://www.pcworld.com/news/article/0,aid,113296,00.asp
FYI - For the National Guard Bureau, the ability
to share data for disaster planning and first response has been
hampered by a constant stream of hacker intrusions on its
unclassified networks over the past two years. http://www.gcn.com/vol1_no1/daily-updates/24059-1.html
FYI - Execs aim to teach better security - Ten security executives
have formed a group to help companies and the government create a
secure information infrastructure. http://news.com.com/2100-7355-5106573.html?tag=cd_top
Return to the top of the
newsletter
INTERNET
COMPLIANCE - Non-Deposit Investment Products
Financial institutions advertising or selling non-deposit investment
products on-line should ensure that consumers are informed of the
risks associated with non-deposit investment products as discussed
in the "Interagency Statement on Retail Sales of Non Deposit
Investment Products." On-line systems should comply with
this Interagency Statement, minimizing the possibility of customer
confusion and preventing any inaccurate or misleading impression
about the nature of the non-deposit investment product or its lack
of FDIC insurance.
Return to the top of the
newsletter
INFORMATION SYSTEMS SECURITY
- We
continue our series on the FFIEC interagency Information Security
Booklet.
SECURITY
CONTROLS - IMPLEMENTATION -
NETWORK
ACCESS
Network Configuration
Computer networks often extend connectivity far beyond the financial
institution and its data center. Networks provide system access and
connectivity between business units, affiliates, TSPs, business
partners, customers, and the public. This increased connectivity
requires additional controls to segregate and restrict access
between various groups and information users.
A typical approach to securing a large network involves dividing the
network into logical security domains. A logical security domain is
a distinct part of a network with security policies that differ from
other domains. The differences may be far broader than network
controls, encompassing personnel, host, and other issues.
Typical network controls that distinguish security domains include
access control software permissions, dedicated lines, filtering
routers, firewalls, remote - access servers, and virtual private
networks. This booklet will discuss additional access controls
within the applications and operating systems residing on the
network in other sections. Before selecting the appropriate
controls, financial institutions should map and configure the
network to identify and control all access control points. Network
configuration considerations could include the following actions:
! Identifying the various applications and user - groups accessed
via the network;
! Identifying all access points to the network including various
telecommunications channels (e.g., wireless, Ethernet, frame relay,
dedicated lines, remote dial - up access, extranets, Internet);
! Mapping the internal and external connectivity between various
network segments;
! Defining minimum access requirements for network services (i.e.,
most often referenced as a network services access policy); and
! Determining the most appropriate network configuration to ensure
adequate security and performance.
With a clear understanding of network connectivity, the financial
institution can avoid introducing security vulnerabilities by
minimizing access to less - trusted domains and employing encryption
for less secure connections. Institutions can then determine the
most effective deployment of protocols, filtering routers,
firewalls, gateways, proxy servers, and/or physical isolation to
restrict access. Some applications and business processes may
require complete segregation from the corporate network (e.g., no
connectivity between corporate network and wire transfer system).
Others may restrict access by placing the services that must be
accessed by each zone in their own security domain, commonly called
a “demilitarized zone” (DMZ).
Return to the top of the
newsletter
IT SECURITY
QUESTION:
B. NETWORK
SECURITY
18.
Determine whether an appropriate archive of boot disks, distribution
media, and security patches exists.
Return to the top of the
newsletter
INTERNET PRIVACY - We continue
our series listing the regulatory-privacy examination questions.
When you answer the question each week, you will help ensure
compliance with the privacy regulations.
Content of Privacy Notice
15. If the institution provides a short-form initial privacy notice
with the opt out notice, does the institution do so only to
consumers with whom the institution does not have a customer
relationship? [§6(d)(1)]
Return to the top of the
newsletter
INTERNET AUDITING SERVICES
- R.
Kinney Williams & Associates is recognized as a leader in independent
Internet auditing for financial institutions. With
clients in 37 states, and an outstanding record of successful
expedient testing, R. Kinney Williams & Associates is your ideal
choice as an independent entity to perform your
penetration assessment study, which includes the Vulnerability
Internet Security Test Audit (VISTA). You will
find information about VISTA at http://www.internetbankingaudits.com/
or email Kinney Williams at examiner@yennik.com.
|