Title: Information Security Update Threats
1Information Security UpdateThreats
Opportunities
- Atlanta ARMA Meeting
- May 20, 2008
- Brad Joiner
- Information Security Officer
- Federal Reserve Bank of Atlanta
2Information Security Update Threats
Opportunities
- Agenda
- Federal Reserve System Overview
- Functions
- Structure
- Information Security Threats
- 2008 Trends and Observations
- Information Security Opportunities
- People
- Processes
- Technology
- Questions and Answers
3Information Security Update Threats
Opportunities
- Federal Reserve System Overview
- Functions
- Monetary Policy
- What
- Manage the availability and cost of money and
credit - Why
- Protect dollar purchasing power, encourage
economic growth and high levels of employment,
and foster reasonable balance in transactions
with other nations - How
- Open Market Operations
- Purchase and sale of government securities in the
open market - Discount Rate
- Interest rate charged to depository institutions
for short-term loans - Reserve Requirements
- Percentage of deposits that depository
institutions must set aside as reserves
4Information Security Update Threats
Opportunities
- Federal Reserve System Overview
- Functions
- Bank Supervision
- What
- Oversee the safety and soundness of US commercial
banks - Why
- Ensure commercial banks serve their depositors
and communities and are operated in accordance
with sound banking principles - How
- Regulation
- In conjunction with other federal and state
regulatory agencies, create regulations
applicable to commercial banks - Approve mergers and acquisitions
- Regulate US bank foreign activity and activities
of foreign banks operating in US - Supervision
- In conjunction with other federal and state
regulatory agencies, examine commercial bank
compliance with all applicable regulations and
laws
5Information Security Update Threats
Opportunities
- Federal Reserve System Overview
- Functions
- Services to Depository Institutions
- What
- Provide payment system services and assist with
safekeeping and transfer of securities - Why
- Ensure the safe and efficient operations of US
payment system services - How
- Check Collection
- Collect and process inter-bank checks
- Electronic Payments and Funds Transfers
- Process automated clearinghouse electronic
payments - Facilitate inter-bank electronic funds transfer
activity - Cash
- Store and distribute notes and coins to
depository institutions
6Information Security Update Threats
Opportunities
- Federal Reserve System Overview
- Functions
- Services to the US Treasury
- What
- Serve as US Treasurys checking account and
fiscal agent - Why
- Ensure efficient operations of US Treasury
- How
- Checking Account
- Facilitate the transfer of funds between the US
Treasury and depository institutions - Fiscal Agent
- Facilitate the auction of US Treasury securities
and bonds
7Information Security Update Threats
Opportunities
- Federal Reserve System Overview
- Structure
- Board of Governors
- Independent government agency led by 7 governors
- Participates in formulation of monetary policy,
sets reserve requirements, and approves discount
rate changes - Establishes and administers financial safety and
soundness and consumer protection regulations,
and administers bank consolidation regulations - Oversees Reserve Banks services to depository
institutions, bank supervision functions, and
accounting procedures and approves Reserve Banks
budgets
8Information Security Update Threats
Opportunities
- Federal Reserve System Overview
- Structure
- Reserve Banks
- Decentralized element of the US central bank
comprised of 12 separately incorporated Banks - Boston, New York, Philadelphia, Cleveland,
Richmond, Atlanta, Chicago, St. Louis,
Minneapolis, Kansas City, Dallas, and San
Francisco - Monitor national and international economic
conditions and provide monetary policy input - Hold reserve requirements, set the discount rate,
and serve as the lender of last resort to
depository institutions - Provide payment services to depository
institutions and the US Treasury - Examine and supervise certain types of depository
institutions
9Information Security Update Threats
Opportunities
- Information Security Threats
- 2008 Trends and Observations
- Hackers
- Increased involvement of organized crime,
state-sponsored, and terrorist groups from across
the world - Less experience required due to increased
availability of tools and shared knowledge - Increased emphasis on for profit and political
hacking activities - Vulnerabilities
- Commoditization
- Increased number of market places where security
research is bought and sold - Zero-Day
- Increased number of previously unknown computer
system vulnerabilities for which no patch or fix
is currently available
10Information Security Update Threats
Opportunities
- Information Security Threats
- 2008 Trends and Observations
- Malware
- Proliferation
- Six-fold increase in identified malware from 2006
to 2007 with 2008 expected to surpass all
previous years - Sophistication
- Anti-virus and malware scanning tool
effectiveness greatly reduced as the number of
stealthy and sophisticated malware exponentially
increases - Commoditization
- Increased number of market places where malware
is bought and sold
11Information Security Update Threats
Opportunities
- Information Security Threats
- 2008 Trends and Observations
- Client-side Attacks
- Web browser exploitation increasingly used as a
means of compromising computer systems - Wireless Networks
- Increased usage of corporate and private wireless
networks provides additional opportunities for
hackers to attack mobile computers - Remote Access
- Remote access connectivity via virtual private
networks (VPN) increases risk of compromise for
both mobile devices and corporate computer
systems - Denial of Service (DoS)
- Proliferation of unknowingly compromised systems
(botnets) and broadband connectivity increases
risk of attacks designed to prevent legitimate
users from accessing a systems services
12Information Security Update Threats
Opportunities
- Information Security Threats
- 2008 Trends and Observations
- Spear Phishing
- Increased use of email attacks leveraging readily
available personal data and common file
attachments (Word, Excel, PowerPoint) to gain
confidential information or compromise computer
systems - Mobile Devices
- Increased use of laptop computers and portable
storage devices raises risk of stolen or lost data
13Information Security Update Threats
Opportunities
- Information Security Opportunities
- People
- Training and Awareness
- Mandatory on-line information security training
and acknowledgment of computer roles,
responsibilities, and policies for all staff - Processes
- Information Security Policy
- Comprehensive body of information security
principles, practices, standards, and controls - Risk Management Structure
- Standardized processes for identifying and
centrally tracking computer system risks across
the organization - Testing
- Ongoing testing of compliance with standards and
controls
14Information Security Update Threats
Opportunities
- Information Security Opportunities
- Technology
- Data Encryption
- Encryption of network storage, notebook
computers, flash drives, and BlackBerry devices - Two-Factor Authentication
- Muti-factor authentication (something you
know/something you have) required for
workstation, network, and remote connectivity
access - Least User Access
- Users provided with the minimum level of access
to computer systems required to perform their
jobs - Information Flow Control
- Segregation of computer system users and devices
based on business need or function
15Information Security Update Threats
Opportunities
- Information Security Opportunities
- Technology
- Vulnerability and Compliance Assessment Tools
- Automated tools used to identify vulnerabilities
and assess compliance with standards and controls - Patch Management and Remediation Tools
- Automated tools used to patch computer systems
and remediate instances of noncompliance with
standards and controls - Web Filtering Tools
- Automated tools used to block access to dangerous
or questionable categories of web sites
16Information Security Update Threats
Opportunities