R. Kinney Williams - Yennik, Inc.®
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

April 1, 2018

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration study complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at 806-798-7119 or visit http://www.internetbankingaudits.com/.


FFIEC information technology audits - As a former bank examiner with over 40 years IT audit experience, I will bring an examiner's perspective to the FFIEC information technology audit for bankers in Texas, New Mexico, Colorado, and Oklahoma.  For more information go to On-site FFIEC IT Audits.

FYI
- Leaking cloud buckets - How to protect your information in the cloud - Imagine you're an IT executive responsible for the safekeeping of tens of millions of customer data records. You're storing this data in the cloud because it's unsustainable to maintain it in your own data center. But, just now, you received an email from hackers stating they have gained control of your cloud data and are demanding a hefty ransom to give it back. What do you do? https://www.scmagazine.com/leaking-cloud-buckets--how-to-protect-your-information-in-the-cloud/article/749931/

NIST targets APTs with resilience strategies - From the Office of Personnel Management data breach to the Russian hacking of the 2016 elections, cyberattacks from hostile nation-states, criminal and terrorist groups and rogue individuals are becoming more frequent. https://gcn.com/articles/2018/03/21/nist-cyber-resilience-apt.aspx

The Debate is Over: Artificial Intelligence is the Future for Cybersecurity - Last week, Google's parent company, Alphabet, announced the launch of Chronicle – an artificial intelligence-based solution for the cybersecurity industry – promising “the power to fight cyber crime on a global scale.” https://www.scmagazine.com/the-debate-is-over-artificial-intelligence-is-the-future-for-cybersecurity/article/749603/

Hackers exploit old flaw to turn Linux servers into cryptocurrency miners - The malicious actors who installed and ran a cryptocurrency mining operation on hacked Tesla ASW servers and Jenkins servers is now targeting servers running Linux and has so far generated more than $74,000 in Monero. https://www.scmagazine.com/hackers-exploit-old-flaw-to-turn-linux-servers-into-cryptocurrency-miners/article/753144/

SC Media calls for Women in Security recommendations - As the world celebrated International Women's Day this week, SC Media kicked off its annual search for women who have made notable contributions to the cybersecurity community over the past year. https://www.scmagazine.com/sc-media-calls-for-women-in-security-recommendations/article/750091/

San Diego is suing Experian over data breach - The city of San Diego is suing Experian over the data breach that compromised millions of records including those of 250,000 people in San Diego. https://www.scmagazine.com/san-diego-city-attorney-mara-elliott-filed-a-lawsuit-against-experian-claiming-the-firm-failed-to-notify-citizens-of-the-breach/article/753111/

US mulls drafting gray-haired hackers during times of crisis - Shortage of tech talent has government pondering end to age, gender restrictions - A US government commission has asked the public for its thoughts on possible changes to the military's selective service rules to allow the conscription of technical talent, including those with computer-oriented skills, regardless of sex or age. http://www.theregister.co.uk/2018/03/21/uncle_sam_mulls_drafting_grayhaired_hackers_during_times_of_crisis/

Security industry reacts to UK police cyber-crime budget revelations - As UK police forces are revealed to have spent just £1.3 million on cyber-crime training in the last three years, security industry response is damning. https://www.scmagazine.com/security-industry-reacts-to-uk-police-cyber-crime-budget-revelations/article/753254/


ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - Atlanta computer systems under siege in possible ransomware attack - A ransomware attack possibly bearing the markings of SamSam may be responsible for outages in the City of Atlanta's computer systems. https://www.scmagazine.com/atlanta-computer-systems-under-siege-in-possible-ransomware-attack/article/753123/

Criminal behind $1 billion cyber bank robberies arrested in Spain - The leader of the crime gang behind the Carbanak and Cobalt malware attacks targeting more than 100 financial institutions worldwide has been arrested in Alicante, Spain. https://www.scmagazine.com/criminal-behind-1-billion-cyber-bank-robberies-arrested-in-spain/article/753598/

Vanderbilt University researcher's claim breaches linked to patient deaths - A Vanderbilt University researcher is claiming more than 2,100 patient deaths are linked to hospital data breaches each year. https://www.scmagazine.com/sung-choi-of-the-universitys-owen-graduate-school-of-management-said-data-breaches-trigger-a-decline-in-customer-care/article/753772/

Vanderbilt University researcher's claim breaches linked to patient deaths - A Vanderbilt University researcher is claiming more than 2,100 patient deaths are linked to hospital data breaches each year. https://www.scmagazine.com/sung-choi-of-the-universitys-owen-graduate-school-of-management-said-data-breaches-trigger-a-decline-in-customer-care/article/753772/

Fancy Bear suspected in United Kingdom's Anti-Doping Agency cyberattack - Fancy Bear hackers are suspected of launching a foiled cyber-attack on the U.K.'s Anti-Doping Agency. https://www.scmagazine.com/ukad-said-it-believes-its-systems-are-robust-with-appropriate-levels-of-cybersecurity/article/754115/

Boeing hit and recovering from possible WannaCry attack - Aerospace manufacturer Boeing is reporting that the company has mitigated what may have been a small outbreak of WannaCry ransomware that hit one of its manufacturing facilities on March 28. https://www.scmagazine.com/boeing-hit-and-recovering-from-possible-wannacry-attack/article/754599/

Unsecured N.Y. medical practice server exposes 42,000 records - A Long Island, N.Y., medical practice left an exposed port normally used for remote synchronization open exposing at least 42,000 medical records. https://www.scmagazine.com/unsecured-ny-medical-practice-server-exposes-42000-records/article/754284/

Grindr flaws spill personal info on users, reveals locations - Security flaws in Grindr can expose the personal information and location of its three million or so users. https://www.scmagazine.com/grindr-flaws-spill-personal-info-on-users-reveals-locations/article/754486/

Return to the top of the newsletter

WEB SITE COMPLIANCE -
We continue our review of the FFIEC interagency statement on "Weblinking: Identifying Risks and Risk Management Techniques."
  (Part 8 of 10)
  

  B. RISK MANAGEMENT TECHNIQUES
  
  Implementing Weblinking Relationships
  
  
The strategy that financial institutions choose when implementing weblinking relationships should address ways to avoid customer confusion regarding linked third-party products and services. This includes disclaimers and disclosures to limit customer confusion and a customer service plan to address confusion when it occurs.
  
  Disclaimers and Disclosures
  
  
Financial institutions should use clear and conspicuous webpage disclosures to explain their limited role and responsibility with respect to products and services offered through linked third-party websites. The level of detail of the disclosure and its prominence should be appropriate to the harm that may ensue from customer confusion inherent in a particular link. The institution might post a disclosure stating it does not provide, and is not responsible for, the product, service, or overall website content available at a third-party site. It might also advise the customer that its privacy polices do not apply to linked websites and that a viewer should consult the privacy disclosures on that site for further information. The conspicuous display of the disclosure, including its placement on the appropriate webpage, by effective use of size, color, and graphic treatment, will help ensure that the information is noticeable to customers. For example, if a financial institution places an otherwise conspicuous disclosure at the bottom of its webpage (requiring a customer to scroll down to read it), prominent visual cues that emphasize the information's importance should point the viewer to the disclosure.
  
  In addition, the technology used to provide disclosures is important. While many institutions may simply place a disclaimer notice on applicable webpages, some institutions use "pop-ups," or intermediate webpages called "speedbumps," to notify customers they are leaving the institution's website. For the reasons described below, financial institutions should use speedbumps rather than pop-ups if they choose to use this type of technology to deliver their online disclaimers.
  
  A "pop up" is a screen generated by mobile code, for example Java or Active X, when the customer clicks on a particular hyperlink. Mobile code is used to send small programs to the user's browser. Frequently, those programs cause unsolicited messages to appear automatically on a user's screen. At times, the programs may be malicious, enabling harmful viruses or allowing unauthorized access to a user's personal information. Consequently, customers may reconfigure their browsers or install software to block disclosures delivered via mobile codes.
  
  In contrast, an intermediate webpage, or "speedbump," alerts the customer to the transition to the third-party website. Like a pop-up, a speedbump is activated when the customer clicks on a particular weblink. However, use of a speedbump avoids the problems of pop-up technology, because the speedbump is not generated externally using mobile code, but is created within the institution's operating system, and cannot be disabled by the customer.


Return to the top of the newsletter

FFIEC IT SECURITY - We continue the series  from the FDIC "Security Risks Associated with the Internet." 
  
  
Data Transmission and Types of Firewalls 
  
  Data traverses the Internet in units referred to as packets. Each packet has headers which contain information for delivery, such as where the packet is from, where it is going, and what application it contains. The varying firewall techniques examine the headers and either permit or deny access to the system based on the firewall's rule configuration. 
  
  There are different types of firewalls that provide various levels of security. For instance, packet filters, sometimes implemented as screening routers, permit or deny access based solely on the stated source and/or destination IP address and the application (e.g., FTP). However, addresses and applications can be easily falsified, allowing attackers to enter systems. Other types of firewalls, such as circuit-level gateways and application gateways, actually have separate interfaces with the internal and external (Internet) networks, meaning no direct connection is established between the two networks. A relay program copies all data from one interface to another, in each direction. An even stronger firewall, a stateful inspection gateway, not only examines data packets for IP addresses, applications, and specific commands, but also provides security logging and alarm capabilities, in addition to historical comparisons with previous transmissions for deviations from normal context.

  
  Implementation 

  
  When evaluating the need for firewall technology, the potential costs of system or data compromise, including system failure due to attack, should be considered. For most financial institution applications, a strong firewall system is a necessity. All information into and out of the institution should pass through the firewall. The firewall should also be able to change IP addresses to the firewall IP address, so no inside addresses are passed to the outside. The possibility always exists that security might be circumvented, so there must be procedures in place to detect attacks or system intrusions. Careful consideration should also be given to any data that is stored or placed on the server, especially sensitive or critically important data.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
 
 Chapter 15 - PHYSICAL AND ENVIRONMENTAL SECURITY
 
 15.5 Plumbing Leaks
 

 While plumbing leaks do not occur every day, they can be seriously disruptive. The building's plumbing drawings can help locate plumbing lines that might endanger system hardware. These lines include hot and cold water, chilled water supply and return lines, steam lines, automatic sprinkler lines, fire hose standpipes, and drains. If a building includes a laboratory or manufacturing spaces, there may be other lines that conduct water, corrosive or toxic chemicals, or gases.
 
 As a rule, analysis often shows that the cost to relocate threatening lines is difficult to justify. However, the location of shutoff valves and procedures that should be followed in the event of a failure must be specified. Operating and security personnel should have this information immediately available for use in an emergency. In some cases, it may be possible to relocate system hardware, particularly distributed LAN hardware.
 
 15.6 Interception of Data
 

 Depending on the type of data a system processes, there may be a significant risk if the data is intercepted. There are three routes of data interception: direct observation, interception of data transmission, and electromagnetic interception.
 
 Direct Observation. System terminal and workstation display screens may be observed by unauthorized persons. In most cases, it is relatively easy to relocate the display to eliminate the exposure.
 
 Interception of Data Transmissions. If an interceptor can gain access to data transmission lines, it may be feasible to tap into the lines and read the data being transmitted. Network monitoring tools can be used to capture data packets. Of course, the interceptor cannot control what is transmitted, and so may not be able to immediately observe data of interest. However, over a period of time there may be a serious level of disclosure. Local area networks typically broadcast messages.106 Consequently, all traffic, including passwords, could be retrieved. Interceptors could also transmit spurious data on tapped lines, either for purposes of disruption or for fraud.
 
 Electromagnetic Interception. Systems routinely radiate electromagnetic energy that can be detected with special-purpose radio receivers. Successful interception will depend on the signal strength at the receiver location; the greater the separation between the system and the receiver, the lower the success rate. TEMPEST shielding, of either equipment or rooms, can be used to minimize the spread of electromagnetic signals. The signal-to-noise ratio at the receiver, determined in part by the number of competing emitters will also affect the success rate. The more workstations of the same type in the same location performing "random" activity, the more difficult it is to intercept a given workstation's radiation. On the other hand, the trend toward wireless (i.e., deliberate radiation) LAN connections may increase the likelihood of successful interception.


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.  



Company Information
Yennik, Inc.

4409 101st Street
Lubbock, Texas 79424
Office 806-798-7119
Examiner@yennik.com

 

Please visit our other web sites:
VISTA penetration-vulnerability testing
The Community Banker - Bank FFIEC & ADA Web Site Audits
Credit Union FFIEC & ADA Web Site Audits - Bank Auditing Services
US Banks on the Internet  
US Credit Unions on the Internet

All rights reserved; Our logo is registered with the United States Patent and Trademark Office.
Terms and Conditions, Privacy Statement, © Copyright Yennik, Incorporated