FYI -
U.S. Army gets tough with desktop software policy - U.S. Army goes
after unauthorized software - Since early this year, the U.S. Army
Information Management Support Center, which supports the Pentagon
staff, has deployed software on about 11,000 desktop machines that
watches for unauthorized applications.
http://www.networkworld.com/news/2008/100708-army-desktop-software.html?fsrc=netflash-rss
FYI -
Shell fingers IT contractor in theft of employee data - Oil company
says outside IT worker used info from database to file fake
unemployment claims - Shell Oil Co. is warning its employees that an
IT contractor used the personal data of four Shell workers as part
of an unemployment insurance claims scam in Texas.
http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=cybercrime_and_hacking&articleId=9116421&taxonomyId=82&intsrc=kc_top
FYI -
NRI Secure Technologies Web Application Security Assessment Trend
analysis report 2008 - Roles played by web sites in sales
improvement and their ratio are increasingly expanding in
organizations' business. The functions and convenience of web sites
have significantly improved to meet users' needs and diversity of
their usage. Web payments have become common nowadays and the amount
of damage and the scope of impact caused by unauthorized access to
such web sites are expanding.
http://www.nri-secure.co.jp/news/2008/1010_report.html
FYI -
Red Flags rules can help stop identity theft - Identity theft
continues to accelerate, and protecting against it has become a
multimillion dollar business, says Deloitte's Mark Steinhoff.
http://www.scmagazineus.com/Red-Flags-rules-can-help-stop-identity-theft/article/119405/?DCMP=EMC-SCUS_Newswire
ATTACKS, INTRUSIONS, DATA THEFT & LOSS
FYI -
World Bank under cyberattack? - The computer network used by the
World Bank Group has suffered a series of at least six intrusions
since mid-2007, according to a report. The World Bank Group was
first notified of the intrusions by the FBI in September 2007, when
the bureau was investigating another cybercrime case involving
transactions out of Johannesburg, South Africa. Fox News said it has
an internal memo (PDF) describing the initial intrusion to World
Bank Group employees.
http://news.cnet.com/8301-1009_3-10063522-83.html
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9116933&source=rss_topic17
http://www.usatoday.com/money/industries/banking/2008-10-12-world-bank-hackers_N.htm
FYI -
MoD loses most of the armed forces - The Ministry of Defence and
contractor EDS are frantically checking the bins this morning for a
missing hard drive containing records of 100,000 servicemen and
women and their families.
http://www.theregister.co.uk/2008/10/10/mod_data_loss/
FYI -
Deloitte loses hundreds of thousands of pension details - Deloitte
has admitted losing a laptop containing thousands of people's
pension details, but said the data was encrypted and the machine
password-protected, and it had no evidence the data had been
misused.
http://www.theregister.co.uk/2008/10/13/deloitte_data_loss_vodafone/
Return to the top
of the newsletter
WEB SITE COMPLIANCE -
We continue our review of the FFIEC interagency statement on "Weblinking:
Identifying Risks and Risk Management Techniques."
(Part 8 of 10)
B. RISK MANAGEMENT TECHNIQUES
Implementing Weblinking Relationships
The strategy that financial institutions choose when
implementing weblinking relationships should address ways to avoid
customer confusion regarding linked third-party products and
services. This includes disclaimers and disclosures to limit
customer confusion and a customer service plan to address confusion
when it occurs.
Disclaimers and Disclosures
Financial institutions should use clear and conspicuous webpage
disclosures to explain their limited role and responsibility with
respect to products and services offered through linked third-party
websites. The level of detail of the disclosure and its prominence
should be appropriate to the harm that may ensue from customer
confusion inherent in a particular link. The institution might post
a disclosure stating it does not provide, and is not responsible
for, the product, service, or overall website content available at a
third-party site. It might also advise the customer that its privacy
polices do not apply to linked websites and that a viewer should
consult the privacy disclosures on that site for further
information. The conspicuous display of the disclosure, including
its placement on the appropriate webpage, by effective use of size,
color, and graphic treatment, will help ensure that the information
is noticeable to customers. For example, if a financial institution
places an otherwise conspicuous disclosure at the bottom of its
webpage (requiring a customer to scroll down to read it), prominent
visual cues that emphasize the information's importance should point
the viewer to the disclosure.
In addition, the technology used to provide disclosures is
important. While many institutions may simply place a disclaimer
notice on applicable webpages, some institutions use
"pop-ups," or intermediate webpages called
"speedbumps," to notify customers they are leaving the
institution's website. For the reasons described below, financial
institutions should use speedbumps rather than pop-ups if they
choose to use this type of technology to deliver their online
disclaimers.
A "pop up" is a screen generated by mobile code, for
example Java or Active X, when the customer clicks on a particular
hyperlink. Mobile code is used to send small programs to the user's
browser. Frequently, those programs cause unsolicited messages to
appear automatically on a user's screen. At times, the programs may
be malicious, enabling harmful viruses or allowing unauthorized
access to a user's personal information. Consequently, customers may
reconfigure their browsers or install software to block disclosures
delivered via mobile codes.
In contrast, an intermediate webpage, or "speedbump,"
alerts the customer to the transition to the third-party website.
Like a pop-up, a speedbump is activated when the customer clicks on
a particular weblink. However, use of a speedbump avoids the
problems of pop-up technology, because the speedbump is not
generated externally using mobile code, but is created within the
institution's operating system, and cannot be disabled by the
customer.
Return to
the top of the newsletter
INFORMATION TECHNOLOGY SECURITY -
We
continue our series on the FFIEC interagency Information Security
Booklet.
SECURITY
CONTROLS - IMPLEMENTATION -
NETWORK
ACCESS
Application - Level Firewalls
Application-level firewalls perform application-level screening,
typically including the filtering capabilities of packet filter
firewalls with additional validation of the packet content based on
the application. Application-level firewalls capture and compare
packets to state information in the connection tables. Unlike a
packet filter firewall, an application-level firewall continues to
examine each packet after the initial connection is established for
specific application or services such as telnet, FTP, HTTP, SMTP,
etc. The application-level firewall can provide additional screening
of the packet payload for commands, protocols, packet length,
authorization, content, or invalid headers. Application-level
firewalls provide the strongest level of security, but are slower
and require greater expertise to administer properly.
The primary disadvantages of application - level firewalls are:
! The time required to read and interpret each packet slows network
traffic. Traffic of certain types may have to be split off before
the application level firewall and passed through different access
controls.
! Any particular firewall may provide only limited support for new
network applications and protocols. They also simply may allow
traffic from those applications and protocols to go through the
firewall.
Return to the top of the
newsletter
IT SECURITY
QUESTION:
C. HOST SECURITY
9.
Determine whether logs are sufficient to affix accountability for
host activities and to support intrusion forensics and IDS and are
appropriately secured for a sufficient time period.
Return to the top of
the newsletter
INTERNET PRIVACY - We continue
our review of the issues in the "Privacy of Consumer Financial
Information" published by the financial regulatory agencies.
The Exceptions
Exceptions to the opt out right are detailed in sections 13, 14,
and 15 of the regulations. Financial institutions need not comply
with opt-out requirements if they limit disclosure of nonpublic
personal information:
1) To a nonaffiliated third party to perform services for the
financial institution or to function on its behalf, including
marketing the institution's own products or services or those
offered jointly by the institution and another financial
institution. The exception is permitted only if the financial
institution provides notice of these arrangements and by contract
prohibits the third party from disclosing or using the information
for other than the specified purposes. In a contract for a joint
marketing agreement, the contract must provide that the parties to
the agreement are jointly offering, sponsoring, or endorsing a
financial product or service. However, if the service or function is
covered by the exceptions in section 14 or 15 (discussed below), the
financial institution does not have to comply with the additional
disclosure and confidentiality requirements of section 13.
Disclosure under this exception could include the outsourcing of
marketing to an advertising company. (Section 13)
2) As necessary to effect, administer, or enforce a
transaction that a consumer requests or authorizes, or under certain
other circumstances relating to existing relationships with
customers. Disclosures under this exception could be in connection
with the audit of credit information, administration of a rewards
program, or to provide an account statement. (Section 14)
3) For specified other disclosures that a financial
institution normally makes, such as to protect against or prevent
actual or potential fraud; to the financial institution's attorneys,
accountants, and auditors; or to comply with applicable legal
requirements, such as the disclosure of information to regulators.
(Section 15) |