Author Box
Articles Categories
All Categories
Articles Resources

Network Security for the Finance Industry

February 26, 2012 | Comments: 0 | Views: 213

Network security, from policies to regular assessments, is integral to businesses of all sizes. Certain industries, on the other hand, mandate network security compliance. Finance is one, and businesses and organizations under this vast umbrella must comply with the following standards.

The Federal Financial Institutions Examination Council (FFIEC) outlines all principles, standards, and reports for federal examination of financial institutions, and the Information Technology Handbook portion addresses network security and assessments. While touching on audits to e-banking standards and all other aspects in between, the FFIEC Information Technology Handbook essentially requires all such institutions to have strategies in place for identifying risk exposure, enforcing confidentiality and availability of all information, determining the effectiveness of management planning, and evaluating processes and compliance. As part of business continuity planning, a network security policy must align with a financial institution's strategy for minimizing financial losses, improving customer experience, and reducing any negative effects.

Going into greater detail, the FFIEC Information Technology Handbook delineates standards for Information Security. Because such threats constantly evolve, a financial institution's network security policy must change with them. More specifically, an information security policy needs to react to changing threats to reduce and assess risks through identification, management, implementation of new strategies, testing, and monitoring.

As many financial institutions have developed e-banking systems in recent years, the FFIEC Information Technology Handbook is devoted to addressing related risks and procedures. E-banking makes such institutions particularly vulnerable online, and in response, such businesses or other entities must implement controls for guarding and securing customer information, including an authentication process for customers. As such institutions are liable for unauthorized transactions, a network security policy needs to address potential losses from fraud and violations of customer privacy.

The Gramm Leach Bliley Act, or simply GLBA, is part of the FFIEC Information Technology Handbook but stands on its own. GLBA 501(b) is also known as Interagency Guidelines Establishing Information Security Standards, but regardless of name, this section mandates security and confidentiality of all non-public personal information through safeguards; protection against anticipated security threats, unauthorized access, or use of information; establishing a risk-based security program through assessment and management of threats; training and testing, and monitoring, auditing, adjusting, and reporting.

Sarbanes-Oxley is an additional set of network security standards for financial institutions. Also known as the Public Company Accounting Reform and Protection Act of 2002, Sarbanes-Oxley goes into depth for reporting. Section 404, the most pertinent, specifies that sufficient controls to prevent fraud, misuse, and loss of financial data and transactions must be put in place. To be effective, controls must quickly detect any intruders and take swift counteractive actions but also note any exceptions. Sarbanes-Oxley 404 additionally specifies that a network security audit must be part of any overall assessment of a financial institution.

Source: EzineArticles
Was this Helpful ?

Rate this Article

Article Tags:

Network Security


Network Security Policy


Network Security Assessment


Network Security Audit

In India, employment opportunities are set to grow by a good margin in the coming year, a phase which was started in the turn of the second decade of the 21st century. organisation, candidates with

By: Sarkariexam l Business > Careers Employment l April 01, 2013 lViews: 11708

Sometimes it is amazing to see that certain jobs can precipitate huge turnouts in the recruitment drives. It is as if thousands of people were waiting for the vacancy advertisements and the moment

By: Sarkariexam l Business > Careers Employment l December 30, 2012 lViews: 690

In recent times, jobs in healthcare segments have grown tremendously. It is anticipated that this growth curve will continue for the times to come. Various factors are responsible for this

By: Sarkariexam l Business > Career Advice l December 27, 2012 lViews: 448

Are you in a dilemma whether to choose web based CRM or not? If yes, don’t worry. You aren’t the sole person having this doubt.There are numerous firms trying to make out whether investing in a

By: Reneta Vasileva l Business > Customer Service l December 23, 2012 lViews: 409

If you think about it you will realize the fact that each business has its own set of risks that are involved in it.The trade secrets that you have and the information related to the business is what

By: brumbrum1 l Business > Risk Management l December 23, 2012 lViews: 263

As the time is changing, concierge management services are now growing despite the slowing economies of the world. The main reason of it is the need that is highly specific to the people who like to

By: willsmith10 l Business > Management l December 23, 2012 lViews: 334

Almost all modern businesses hold, share and access potentially sensitive information on a regular basis. But how many have truly effective information security controls?

By: Lee Hezzlewoodl Business > Securityl June 26, 2012 lViews: 185

Businesses are recognising the importance of the information they manage, and more companies than ever deal with sensitive information on a regular basis. So whether you are a one-man-band or a

By: Lee Hezzlewoodl Business > Securityl June 26, 2012 lViews: 214

Social Engineering poses a real threat to businesses and their data. This short story highlights a very real social engineering scenario.

By: Lee Hezzlewoodl Business > Securityl June 23, 2012 lViews: 182

Information security and data protection is important to small and medium businesses, but many don't understand the threats and risks. Here we outline some of the primary issues and attempt to show

By: Lee Hezzlewoodl Business > Securityl June 23, 2012 lViews: 174

Too many organisations, particularly in the small-medium category, seem to think information security is about IT and technology. But information security isn't just about IT and businesses need to

By: Lee Hezzlewoodl Business > Securityl June 23, 2012 lViews: 184

Fire resistant doors are very popular for being fully safe and are able to control fire to a great extent. Not just any manufacturer can make these doors and one has to pass the competency test in

By: Alicia Tanl Business > Securityl June 22, 2012 lViews: 206

Wise Food Storage packages its freeze-dried meals in airtight mylar pouches, which are kept inside containers. In the event of an emergency, this food kit system can simply be grabbed along with a

By: Irene Testl News & Society > Environmentall June 02, 2012 lViews: 211

Spill kits are essential in cleaning up a chemical or similarly-hazardous substance. Here are the basic ways in which these kits are used.

By: Irene Testl Legal > Regulatory Compliancel May 01, 2012 lViews: 200

If a chemical spills in a laboratory, procedures involving a spill kit must start immediately. Here are some of the steps for using a spill kit.

By: Irene Testl Legal > Regulatory Compliancel May 01, 2012 lViews: 175

Absorbents are part of every spill kit. Here are the common types found in many kits.

By: Irene Testl Legal > Regulatory Compliancel May 01, 2012 lViews: 177

Since the start of 2011, the size of soldiers' loads, and the long-lasting injuries resulting from them, have come under attention. In an effort to find a solution, alternative approaches and

By: Irene Testl News & Society > Militaryl April 26, 2012 lViews: 165

Tactical clothing systems GEN III, PCU, and NBS7 all offer protection for soldiers in a large range of climates, including extreme cold conditions. Here are the general facts for each type of cold

By: Irene Testl News & Society > Militaryl April 26, 2012 lViews: 253