FYI -
Study finds software piracy growing - Piracy rates are down in
roughly half countries surveyed, but cost is up - Software piracy
grew last year, accounting for 41 percent of all PC software
installed, with losses to companies estimated at $53 billion, the
Business Software Alliance.
http://www.msnbc.msn.com/id/30699735/
FYI -
DHS data centers at risk - Centers have multiple vulnerabilities -
The Homeland Security Department set up a huge data center on the
Mississippi Gulf Coast in 2006 without considering protections
against hurricanes, power outages and perimeter security threats,
according to a new report from DHS Inspector General Richard
Skinner.
http://fcw.com/Articles/2009/05/13/DHS-data-centers-at-risks-says-IG.aspx
FYI -
Majority of adolescents online have tried hacking - While the
majority of adults surveyed revealed that they are concerned about
their children being exposed to strangers or illicit content online,
the data in a new report indicated that the adolescents themselves
are more interested in hacking into their friends' instant messaging
or social network accounts.
http://www.scmagazineus.com/Study-Majority-of-adolescents-online-have-tried-hacking/article/136926/?DCMP=EMC-SCUS_Newswire
http://www.techworld.com/security/news/index.cfm?newsID=115913
FYI -
GAO - Agencies Make Progress in Implementation of Requirements, but
Significant Weaknesses Persist.
Report -
http://www.gao.gov/new.items/d09701t.pdf
Highlights -
http://www.gao.gov/highlights/d09701thigh.pdf
FYI -
Mystery virus strikes FBI, U.S. Marshals - The FBI and the U.S.
Marshals Service were forced to shut down parts of their computer
networks after a mystery virus struck the law-enforcement agencies
Thursday, according to an Associated Press report.
http://news.cnet.com/8301-1009_3-10247388-83.html?tag=mncol
ATTACKS, INTRUSIONS, DATA THEFT & LOSS
FYI -
Information-sharing platform hacked - Homeland Security Information
Network suffers intrusions - The Homeland Security Department's
platform for sharing sensitive but unclassified data with state and
local authorities was hacked recently, a DHS official has confirmed.
http://fcw.com/Articles/2009/05/13/Web-DHS-HSIN-intrusion-hack.aspx
FYI -
California water company insider steals $9 million, flees country -
An insider at the California Water Service Company in San Jose broke
into the company's computer system and transferred $9 million into
offshore bank accounts and fled the country.
http://www.scmagazineus.com/California-water-company-insider-steals-9-million-flees-country/article/136923/?DCMP=EMC-SCUS_Newswire
FYI -
Defense Department insider charged with espionage - A Defense
Department official has been charged with espionage conspiracy after
allegedly selling classified U.S. government information to an agent
of the People's Republic of China (PRC).
http://www.scmagazineus.com/Defense-Department-insider-charged-with-espionage/article/136743/?DCMP=EMC-SCUS_Newswire
FYI -
MoD loses 28 laptops this year - The Ministry of Defence has
admitted to losing 28 laptops since the beginning of the year.
Defence minister Bob Ainsworth revealed the figure on Thursday in
response to a written parliamentary question by shadow secretary of
state for defence Liam Fox.
http://news.zdnet.co.uk/security/0,1000000189,39652594,00.htm
FYI -
California water company insider steals $9 million, flees country -
An insider at the California Water Service Company in San Jose broke
into the company's computer system and transferred $9 million into
offshore bank accounts and fled the country.
http://www.scmagazineus.com/California-water-company-insider-steals-9-million-flees-country/article/136923/
FYI -
Facebook users warned over renewed phishing assault As Gray Lady's
fashion blog gets pwned - Facebook users are facing a new wave of
phishing attacks following a previous barrage in April. Fraudulent
messages from already compromised accounts on the social networking
website attempt to trick users into handing over their login details
to one of a series of fake sites. The assault follows the pattern of
a previous similarly-focused attack last month.
http://www.theregister.co.uk/2009/05/15/facebook_phishing_scam/
FYI -
"Gumblar" website compromises increase 188 percent this week -
Thousands of legitimate websites have been infected since late March
with code that is silently infecting visitors with malware. And as
of this week, the number of compromised websites has skyrocketed.
http://www.scmagazineus.com/Gumblar-website-compromises-increase-188-percent-this-week/article/136836/
Return to the top
of the newsletter
WEB SITE COMPLIANCE -
We continue covering some of the issues discussed in the "Risk
Management Principles for Electronic Banking" published by the Basel
Committee on Bank Supervision.
Security Controls
While the Board of Directors has the responsibility for ensuring
that appropriate security control processes are in place for
e-banking, the substance of these processes needs special management
attention because of the enhanced security challenges posed by
e-banking. This should include establishing appropriate authorization
privileges and authentication measures, logical and physical access
controls, adequate infrastructure security to maintain appropriate
boundaries and restrictions on both internal and external user
activities and data integrity of transactions, records and
information. In addition, the existence of clear audit trails for
all e-banking transactions should be ensured and measures to
preserve confidentiality of key e-banking information should be
appropriate with the sensitivity of such information.
Although customer protection and privacy regulations vary from
jurisdiction to jurisdiction, banks generally have a clear
responsibility to provide their customers with a level of
comfort. Regarding information disclosures, protection of
customer data and business availability that approaches the level
they can expect when using traditional banking distribution
channels. To minimize legal and reputational risk associated with
e-banking activities conducted both domestically and cross-border,
banks should make adequate disclosure of information on their web
sites and take appropriate measures to ensure adherence to customer
privacy requirements applicable in the jurisdictions to which the
bank is providing e-banking services.
Return to
the top of the newsletter
INFORMATION TECHNOLOGY SECURITY -
We continue our series on the FFIEC interagency Information Security
Booklet.
ELECTRONIC AND PAPER - BASED MEDIA HANDLING
DISPOSAL
Financial institutions need appropriate disposal procedures for both
electronic and paper based media. Policies should prohibit employees
from discarding sensitive media along with regular garbage to avoid
accidental disclosure. Many institutions shred paper - based media
on site and others use collection and disposal services to ensure
the media is rendered unreadable and unreconstructable before
disposal. Institutions that contract with third parties should use
care in selecting vendors to ensure adequate employee background
checks, controls, and experience.
Computer - based media presents unique disposal problems. Residual
data frequently remains on media after erasure. Since that data can
be recovered, additional disposal techniques should be applied to
sensitive data. Physical destruction of the media, for instance by
subjecting a compact disk to microwaves, can make the data
unrecoverable. Additionally, data can sometimes be destroyed after
overwriting. Overwriting may be preferred when the media will be re
- used. Institutions should base their disposal policies on the
sensitivity of the information contained on the media and, through
policies, procedures, and training, ensure that the actions taken to
securely dispose of computer-based media adequately protect the data
from the risks of reconstruction. Where practical, management should
log the disposal of sensitive media, especially computer - based
media.
TRANSIT
Financial institutions should maintain the security of media while
in transit or when shared with third parties. Policies should
include:
! Restrictions on the carriers used and procedures to verify the
identity of couriers,
! Requirements for appropriate packaging to protect the media from
damage,
! Use of encryption for transmission of sensitive information,
! Security reviews or independent security reports of receiving
companies, and
! Use of nondisclosure agreements between couriers and third
parties.
Financial institutions should address the security of their back -
up tapes at all times, including when the tapes are in transit from
the data center to off - site storage.
Return to the top of the
newsletter
IT SECURITY
QUESTION:
SOFTWARE DEVELOPMENT AND ACQUISITION
5. Evaluate whether the software contains appropriate authentication
and encryption.
6. Evaluate the adequacy of the change control process.
7.
Evaluate the appropriateness of software libraries and their access
controls.
Return to the top of
the newsletter
INTERNET PRIVACY - We continue
our series listing the regulatory-privacy examination questions.
When you answer the question each week, you will help ensure
compliance with the privacy regulations.
Content of Privacy Notice
8) Do the initial, annual, and revised privacy notices include
each of the following, as applicable: (Part 2 of 2)
e) if the institution discloses nonpublic personal information
to a nonaffiliated third party under §13, and no exception under §14
or §15 applies, a separate statement of the categories of
information the institution discloses and the categories of third
parties with whom the institution has contracted; [§6(a)(5)]
f) an explanation of the opt out right, including the method(s)
of opt out that the consumer can use at the time of the notice; [§6(a)(6)]
g) any disclosures that the institution makes under §603(d)(2)(A)(iii)
of the Fair Credit Reporting Act (FCRA); [§6(a)(7)]
h) the institution's policies and practices with respect to
protecting the confidentiality and security of nonpublic personal
information; [§6(a)(8)] and
i) a general statement--with no specific reference to the
exceptions or to the third parties--that the institution makes
disclosures to other nonaffiliated third parties as permitted by
law? [§6(a)(9), (b)] |