FYI - FDIC Issues Guidance to
Banks On Risks of "Spyware" - The Federal Deposit Insurance
Corporation today issued guidance to financial institutions on how
they can protect themselves against "spyware" - an increasingly
prevalent form of software that collects personal or confidential
information about a person or organization without their prior
knowledge or informed consent, and reports it to a third party.
http://www.fdic.gov/news/news/press/2005/pr6805.html
FYI - Cost of computer attacks
down, says survey by CSI, FBI - While the cost of fending off
hackers appears to be dropping for U.S. companies, attacks that
involved unauthorized access to information are becoming much more
costly, according to a survey by the Computer Security Institute
(CSI) and the FBI.
http://www.computerworld.com/printthis/2005/0,4814,103301,00.html
FYI - British hacker shines
light on poor IT security - He claims that in one system he found
that the local system administrator's password was blank.
http://www.zdnet.co.uk/print/?TYPE=story&AT=39208859-39020375t-10000025c
FYI - Microsoft said two people
who helped identify the creator of last year's Sasser worm will
share a reward of $250,000.
http://www.scmagazine.com/news/index.cfm?fuseaction=newsDetails&newsUID=cb0bdf3c-0cc1-495a-bb33-fc3474bc76d2&newsType=Latest%20News&s=n
FYI - Feds lay down draft rules
on system security - The U.S. Commerce Department's National
Institute of Standards and Technology, or NIST, has released a draft
version of the minimal security requirements for federal agencies.
The report comes one month after government auditors found that the
agencies are not prepared to deal with the triple Internet menaces
of spam, phishing and spyware.
http://msn-cnet.com.com/Feds+lay+down+draft+rules+on+system+security/2100-7348_3-5793815.html?part=msn-cnet&subj=ns_2510&tag=mymsn
FYI - Hackers get into USC
database - A University of Southern California database containing
about 270,000 records of past applicants was hacked last month.
http://news.com.com/2102-7349_3-5795373.html?tag=st.util.print
FYI -
"Home Mortgage Disclosure," Comptroller's Handbook for Consumer
Compliance Revised booklet incorporates Federal Reserve Board
changes to Regulation C requiring lenders to include additional
information on their HMDA loan application register.
www.occ.treas.gov/handbook/hmda.pdf
Return to the top
of the newsletter
WEB SITE COMPLIANCE -
Disclosures/Notices (Part 1 of 2)
Several regulations require disclosures and notices to be given at
specified times during a financial transaction. For example, some
regulations require that disclosures be given at the time an
application form is provided to the consumer. In this situation,
institutions will want to ensure that disclosures are given to the
consumer along with any application form. Institutions may
accomplish this through various means, one of which may be through
the automatic presentation of disclosures with the application form.
Regulations that allow disclosures/notices to be delivered
electronically and require institutions to deliver disclosures in a
form the customer can keep have been the subject of questions
regarding how institutions can ensure that the consumer can "keep"
the disclosure. A consumer using certain electronic devices, such as
Web TV, may not be able to print or download the disclosure. If
feasible, a financial institution may wish to include in its on-line
program the ability for consumers to give the financial institution
a non-electronic address to which the disclosures can be mailed.
Return to
the top of the newsletter
INFORMATION TECHNOLOGY SECURITY - We
continue the series
from the FDIC "Security Risks Associated with the Internet."
Logical Access Controls (Part 2 of 2)
Tokens
Token technology relies on a separate physical device, which is
retained by an individual, to verify the user's identity. The token
resembles a small hand-held card or calculator and is used to
generate passwords. The device is usually synchronized with security
software in the host computer such as an internal clock or an
identical time based mathematical algorithm. Tokens are well suited
for one‑time password generation and access control. A separate PIN
is typically required to activate the token.
Smart Cards
Smart cards resemble credit cards or other traditional magnetic
stripe cards, but contain an embedded computer chip. The chip
includes a processor, operating system, and both read only memory
(ROM) and random access memory (RAM). They can be used to generate
one-time passwords when prompted by a host computer, or to carry
cryptographic keys. A smart card reader is required for their use.
Biometrics
Biometrics involves identification and verification of an individual
based on some physical characteristic, such as fingerprint analysis,
hand geometry, or retina scanning. This technology is advancing
rapidly, and offers an alternative means to authenticate a user.
Return to
the top of the newsletter
IT SECURITY QUESTION:
Core application user access controls: (Part 1 of 2)
a. Is there a written procedure for password administration?
b. If a username is required, does the system automatically enter
the username?
c. Is the password length six or greater?
d. Is the use of proper nouns and dictionary words discouraged?
e. Is the password required to include upper and lower case letters,
special characters, and numbers?
f. Are passwords required to be changed at least every 30 days?
Return to the top of
the newsletter
INTERNET PRIVACY - We continue our
series listing the regulatory-privacy examination questions.
When you answer the question each week, you will help ensure
compliance with the privacy regulations.
34. Does the institution deliver a
revised privacy notice when it:
a. discloses a new category of nonpublic personal information to a
nonaffiliated third party; [§8(b)(1)(i)]
b. discloses nonpublic personal information to a new category of
nonaffiliated third party; [§8(b)(1)(ii)] or
c. discloses nonpublic personal information about a former customer
to a nonaffiliated third party, if that former customer has not had
the opportunity to exercise an opt out right regarding that
disclosure? [§8(b)(1)(iii)]
(Note: a revised
notice is not required if the institution adequately described the
nonaffiliated third party or information to be disclosed in the
prior privacy notice. [§8(b)(2)])
VISTA - Does
{custom4} need an affordable Internet security
penetration-vulnerability test?
Our clients in 41 states rely on
VISTA
to ensure their IT security settings, as well as
meeting the independent diagnostic test
requirements of FDIC, OCC, OTS, FRB, and NCUA, which provides
compliance with
Gramm-Leach Bliley Act 501(b).
The VISTA penetration study and
Internet security test is an affordable-sophisticated process than
goes far beyond the simple
scanning of ports and
testing focuses on
a hacker's perspective, which will help
you identify real-world weaknesses. For more information, give Kinney Williams a call
today at 806-798-7119 or visit
http://www.internetbankingaudits.com/. |