R. Kinney Williams - Yennik, Inc.®
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

April 15, 2012

CONTENT Internet Compliance Information Systems Security
IT Security
 
Internet Privacy
 
Website for Penetration Testing
 
Does Your Financial Institution need an affordable Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our penetration testing audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) The penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world weaknesses.  For more information, give R. Kinney Williams a call today at 806-798-7119 or visit http://www.internetbankingaudits.com/.


REMINDER - This newsletter is available for the Android smart phones and tablets.  Go to the Market Store and search for yennik.

FYI - Organizations in dark as employees party on with BYOD - Organizations know that employees’ personal mobile devices are sometimes getting onto their networks, but the extent of the problem could be worse than they thought. http://gcn.com/articles/2012/04/05/byod-sans-report-organizations-in-the-dark.aspx

FYI - UK hacker jailed for nicking PayPal, banking data from MILLIONS - But York-based cybercrook only made £2.4k, court hears - A UK cybercrook has been jailed for 26 months following his conviction for stealing millions of banking and PayPal identities, the Southwark Crown court confirmed to the Reg. http://www.theregister.co.uk/2012/04/04/cybercrook_jailed/

FYI - Weak passwords render major power supplier vulnerable to hackers, audit finds - A federal utility in the Pacific Northwest that powers 30 percent of the region, including key military installations, is vulnerable to computer breaches, according to an internal Energy Department audit. http://www.nextgov.com/nextgov/ng_20120404_8857.php

FYI - VA Ramps Up Security Training - Will Deny Network Access to Those Lacking Updated Education - The Department of Veterans Affairs is ramping up its privacy and security training efforts and plans to eventually deny network access to those who have not had training within the past year. http://www.govinfosecurity.com/articles.php?art_id=4629

FYI - GAO - Federal Reserve Banks: Areas for Improvement in Information Systems Controls. http://www.gao.gov/products/GAO-12-615R

FYI - Are security basics getting lost under the cover of cloud and mobile? - Few would argue that the major themes at the recently wrapped RSA Conference 2012 in San Francisco were cloud, mobile and Big Data. http://www.scmagazine.com/are-security-basics-getting-lost-under-the-cover-of-cloud-and-mobile/article/236285/?DCMP=EMC-SCUS_Newswire 

ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - Sky News admits hacking emails of 'canoe man' John Darwin - Sky News has admitted senior executives authorised a journalist to hack into the emails of John Darwin, the "canoe man" accused of faking his own death in 2002. The broadcaster revealed a member of staff was cleared to carry out the hacking, a breach of the Computer Misuse Act, on two separate occasions that it believed were "in the public interest". http://www.telegraph.co.uk/news/uknews/crime/9188402/Sky-News-admits-hacking-emails-of-canoe-man-John-Darwin.html

FYI - Accused LulzSec member pleads guilty to hacking Sony - Accused LulzSec hacker pleaded guilty today in a federal court in Los Angeles, California, to felony charges associated with the breach of Sony Pictures Entertainment that occurred in mid-2011. http://arstechnica.com/tech-policy/news/2012/04/accused-lulzsec-member-pleads-guilty-to-hacking-sony.ars

FYI - Hackers Access Medicaid Records - Claims for Utah Patients Accessed - Hackers, believed to be from Eastern Europe, recently accessed 24,000 Medicaid claims for Utah patients.
http://www.govinfosecurity.com/articles.php?art_id=4654
http://www.scmagazine.com/number-of-victims-in-state-of-utah-breach-significantly-rises/article/235759/?DCMP=EMC-SCUS_Newswire http://gcn.com/articles/2012/04/09/utah-hackers-medicaid-chip-medical-recoreds-breached.aspx

FYI - Commerce agency still offline 12 weeks after virus hits - What would you do without Google, or some other search engine, always ready to find what you need on the Internet? How could you do your job without e-mail and the attachments it carries? http://gcn.com/articles/2012/04/09/commerce-agency-offline-12-weeks-after-virus-hits.aspx

FYI - New security flaws detected in mobile devices - Those cool mobile devices beloved by consumers carry deep-rooted security flaws that are only now being discovered and addressed. http://www.usatoday.com/tech/news/story/2012-04-08/smartphone-security-flaw/54122468/1

FYI - Intel engineer turned chip spy pleads guilty - The roadmap to jail - A former Intel engineer who worked on the company's Itanium processors for servers and who is accused of stealing documents relating to future processor designs and chip fabrication processes has pleaded guilty to the charges. http://www.theregister.co.uk/2012/04/09/intel_ex_engineer_spy_pleads_guilty/ 

Return to the top of the newsletter

WEB SITE COMPLIANCE -
We continue covering some of the issues discussed in the "Risk Management Principles for Electronic Banking" published by the Basel Committee on Bank Supervision.

Board and Management Oversight
 

The Board of Directors and senior management are responsible for developing the banking institution's business strategy. An explicit strategic decision should be made as to whether the Board wishes the bank to provide e-banking transactional services before beginning to offer such services. Specifically, the Board should ensure that e-banking plans are clearly integrated within corporate strategic goals, a risk analysis is performed of the proposed e-banking activities, appropriate risk mitigation and monitoring processes are established for identified risks, and ongoing reviews are conducted to evaluate the results of e-banking activities against the institution's business plans and objectives.

In addition, the Board and senior management should ensure that the operational and security risk dimensions of the institution's e-banking business strategies are appropriately considered and addressed. The provision of financial services over the Internet may significantly modify and/or even increase traditional banking risks (e.g. strategic, reputational, operational, credit and liquidity risk). Steps should therefore be taken to ensure that the bank's existing risk management processes, security control processes, due diligence and oversight processes for outsourcing relationships are appropriately evaluated and modified to accommodate e-banking services.

Return to the top of the newsletter
 
INFORMATION TECHNOLOGY SECURITY
-  
We continue our series on the FFIEC interagency Information Security Booklet.  

LOGGING AND DATA COLLECTION (Part 2 of 2)

When evaluating whether and what data to log, institutions should consider the importance of the related system or information, the importance of monitoring the access controls, the value of logged data in restoring a compromised system, and the means to effectively analyze the data. Generally, logs should capture source identification information; session ID; terminal ID; and the date, time, and the nature of the access attempt, service request, or process. Many hardware and software products come with logging disabled and may have inadequate log analysis and reporting capabilities. Institutions may have to enable the logging capabilities and then verify that logging remains enabled after rebooting. In some cases, additional software will provide the only means to analyze the log files effectively.

Many products such as firewall and intrusion detection software can simplify the security monitoring by automating the analysis of the logs and alerting the appropriate personnel of suspicious activity. Log files are critical to the successful investigation and prosecution of security incidents and can potentially contain sensitive information. Intruders will often attempt to conceal any unauthorized access by editing or deleting log files. Therefore, institutions should strictly control and monitor access to log files. Some considerations for securing the integrity of log files include:

! Encrypting log files that contain sensitive data or that are transmitting over the network,
! Ensuring adequate storage capacity to avoid gaps in data gathering,
! Securing backup and disposal of log files,
! Logging the data to a separate, isolated computer,
! Logging the data to write - only media like a write - once/read - many (WORM) disk or drive,
! Utilizing centralized logging, such as the UNIX "SYSLOG" utility, and
! Setting logging parameters to disallow any modification to previously written data.

The financial institution should have an effective means of tracing a security event through their system. Synchronized time stamps on network devices may be necessary to gather consistent logs and a consistent audit trail. Additionally, logs should be available, when needed, for incident detection, analysis and response.

When using logs to support personnel actions, management should consult with counsel about whether the logs are sufficiently reliable to support the action.


Return to the top of the newsletter

INTERNET PRIVACY
- We continue our series listing the regulatory-privacy examination questions.  When you answer the question each week, you will help ensure compliance with the privacy regulations.


Content of Privacy Notice

10)  Does the institution list the following categories of nonpublic personal information that it discloses, as applicable, and a few examples of each, or alternatively state that it reserves the right to disclose all the nonpublic personal information that it collects:

a)  information from the consumer;

b)  information about the consumer's transactions with the institution or its affiliates;

c)  information about the consumer's transactions with nonaffiliated third parties; and

d)  information from a consumer reporting agency? [§6(c)(2)]

 

PLEASE NOTE:  Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.  



Company Information
Yennik, Inc.

4409 101st Street
Lubbock, Texas 79424
Office 806-798-7119
Examiner@yennik.com

 

Please visit our other web sites:
VISTA penetration-vulnerability testing
The Community Banker - Bank FFIEC & ADA Web Site Audits
Credit Union FFIEC & ADA Web Site Audits - Bank Auditing Services
US Banks on the Internet  
US Credit Unions on the Internet

All rights reserved; Our logo is registered with the United States Patent and Trademark Office.
Terms and Conditions, Privacy Statement, © Copyright Yennik, Incorporated