HAPPY HOLIDAYS - We
appreciate your readership and wish you a wonderful Holiday Season
and prosperity in the New Year.
FYI - The Legal Realities
of Computer Logs - Computer-generated logs, once a source of data
that only the most die-hard techie could appreciate, have emerged as
a key component in corporate information assurance - be it privacy,
systems security, or legal risk management.
http://www.theiia.org/itaudit/index.cfm?fuseaction=forum&fid=5569
FYI - 'Phishing' attacks rocket
in November - The number of phishing sites, or fake Web sites set up
to fool victims into handing over personal information, reached
1,518 last month, the Anti-Phishing Working Group said in a report
released on Wednesday. The total was up almost a third over October
and three times the level in September.
http://news.com.com/Phishing+attacks+rocket+in+November/2100-7349_3-5491794.html?tag=nefd.top
FYI - The Internet can be a
dangerous place to do business these days. No one knows this better
than Dave Thomas, chief of the FBI's Computer Intrusion Section,
which oversees the FBI's counter-terrorism and criminal computer
intrusion investigations.
http://www.nwfusion.com/supp/2004/cybercrime/112904qanda.html
FYI - The Treasury Department
today released a study commissioned by the Department in
coordination with BITS, the technology branch of the Financial
Services Roundtable. The study will provide a model for the nation's
regional financial centers to protect and strengthen their critical
financial services infrastructure at the local level.
Press release:
http://www.treas.gov/press/releases/js2130.htm
Handbook:
http://www.treas.gov/press/releases/reports/chicagofirst_handbook.pdf
FYI - Consumers reportedly
dissatisfied with online security - Passwords are not enough, study
says - The results of a survey conducted by Gartner and shared with
IDG News Service show that online consumers are growing frustrated
with the lack of security provided by banks and online retailers,
and feel that passwords are no longer sufficient to secure their
online transactions.
http://www.infoworld.com/article/04/12/06/HNdissatisfied_1.html
FYI -
Identity Theft Study on
"Account-Hijacking" Identity Theft and Suggestions for Reducing
Online Fraud - The FDIC has issued a study on "account-hijacking"
identity theft, which outlines the problem and suggests steps to
reduce online fraud for both bank and regulatory agency
consideration. The FDIC hopes to use the study to formulate guidance
to bankers next year. Comments on the study are due on February 11,
2005.
www.fdic.gov/news/news/financial/2004/fil13204.html
FYI - FDIC Issues
Study on Identity Theft and Seeks Comments on Possible Guidance to
Bankers - The Federal Deposit Insurance Corporate today released a
study on a type of identity theft known as account-hijacking, one of
the fastest growing forms of identity theft in the country. The
agency is soliciting comments on the study that it hopes to use to
formulate guidance to bankers next year.
www.fdic.gov/news/news/press/2004/pr12504.html
Return to the top
of the newsletter
INTERNET COMPLIANCE -
Expedited Funds Availability Act (Regulation CC)
Generally, the rules pertaining to the duty of an institution to
make deposited funds available for withdrawal apply in the
electronic financial services environment. This includes rules on
fund availability schedules, disclosure of policy, and payment of
interest. Recently, the FRB published a commentary that clarifies
requirements for providing certain written notices or disclosures to
customers via electronic means. Specifically, the commentary to the
regulations states that a financial institution satisfies the
written exception hold notice requirement, and the commentary to the
regulations states that a financial institution satisfies the
general disclosure requirement by sending an electronic version that
displays the text and is in a form that the customer may keep.
However, the customer must agree to such means of delivery of
notices and disclosures. Information is considered to be in a form
that the customer may keep if, for example, it can be downloaded or
printed by the customer. To reduce compliance risk, financial
institutions should test their programs' ability to provide
disclosures in a form that can be downloaded or printed.
Return to
the top of the newsletter
INFORMATION SYSTEMS SECURITY
- We continue our series on the
FFIEC interagency Information Security Booklet.
SECURITY TESTING
Information security is an integrated process that reduces
information security risks to acceptable levels. The entire process,
including testing, is driven by an assessment of risks. The greater
the risk, the greater the need for the assurance and validation
provided by effective information security testing.
In general, risk increases with system accessibility and the
sensitivity of data and processes. For example, a high-risk system
is one that is remotely accessible and allows direct access to
funds, fund transfer mechanisms, or sensitive customer data.
Information only Web sites that are not connected to any internal
institution system or transaction capable service are lower-risk
systems. Information systems that exhibit high risks should be
subject to more frequent and rigorous testing than low-risk systems.
Because tests only measure the security posture at a point in time,
frequent testing provides increased assurance that the processes
that are in place to maintain security over time are functioning.
A wide range of tests exists. Some address only discrete controls,
such as password strength. Others address only technical
configuration, or may consist of audits against standards. Some
tests are overt studies to locate vulnerabilities. Other tests can
be designed to mimic the actions of attackers. In many situations,
management may decide to perform a range of tests to give a complete
picture of the effectiveness of the institution's security
processes. Management is responsible for selecting and designing
tests so that the test results, in total, support conclusions about
whether the security control objectives are being met.
Return to
the top of the newsletter
IT SECURITY QUESTION:
ENCRYPTION
3. Determine if cryptographic key controls are adequate.
! Identify where cryptographic keys are stored.
! Review security where keys are stored and when they are used
(e.g., in a hardware module).
! Review cryptographic key distribution mechanisms to secure the
keys against unauthorized disclosure, theft, and diversion.
! Verify that two persons are required for a cryptographic key to
be used, where appropriate.
! Review audit and security reports that review the adequacy of
cryptographic key controls.
Return to the top of
the newsletter
INTERNET PRIVACY - We continue our
series listing the regulatory-privacy examination questions. When
you answer the question each week, you will help ensure compliance
with the privacy regulations.
Account number sharing
A. If available, review a sample of telemarketer scripts used
when making sales calls to determine whether the scripts indicate
that the telemarketers have the account numbers of the institution's
consumers ('12).
B. Obtain and review a sample of contracts with agents or service
providers to whom the financial institution discloses account
numbers for use in connection with marketing the institution's own
products or services. Determine whether the institution shares
account numbers with nonaffiliated third parties only to perform
marketing for the institution's own products and services. Ensure
that the contracts do not authorize these nonaffiliated third
parties to directly initiate charges to customer's accounts
('12(b)(1)).
C. Obtain a sample of materials and information provided to the
consumer upon entering a private label or affinity credit card
program. Determine if the participants in each program are
identified to the customer when the customer enters into the program
('12(b)(2)).
IN CLOSING - The FFIEC interagency
Internet guidelines require financial institution web sites to comply
with consumer compliance, advertising, notifications, weblinking, and other federal
regulations. We have identified 17 federal regulations and over 130 issues
that relate to an institution's web site. We also verify weblinks for
functionality and appropriateness. As a former bank examiner with
over 40 year experience, we audit web sites following the FFIEC Internet
guidelines for financial institutions across the country. Visit
http://www.bankwebsiteaudits.com
and learn how we can assist your financial institution. |