->PConnect(script.ftech.net,mi2gl,m4d2e,mi2gl)
 

Beating the Cyber Threat

ByValerie Thompson

European Banker, © Lafferty Publications Ltd 1999

Bank security now has to include prevention against hackers or cyber attack, A threat which one specialist puts higher than Y2K risks.

WHILE THE Internet presents tremendous opportunities for growth for Europe's banks, managers need to be aware of the risks and take precautions. Use of the Internet by organisations has fundamentally altered the security landscape. In a report to the insurer Lloyd's of London, some of whose syndicates have recently revised their policies for banks to include e-commerce, UK security specialists mi2g says that the millennium bug (Y2K bug) is small in comparison to cyber-warfare, which places financial institutions at substantial risk.

"The Internet security solutions deployed in many financial institutions today are similar to a standard Yale lock. At risk is any installation using branded security packages such as Checkpoint which has about 60 percent of the Internet firewall market," said mi2g Managing Director Diwakar Matai. The techniques to gain illegal access exploit loopholes and default settings in standard security software.

With branded software, such as Checkpoint, managers should be aware that the default settings are widely known. If the defaults are left, then it is easier for hackers to find a way to access the local network. If Checkpoint software is installed by an expert, then it is very secure, said Andreas Jakob of Avantec Communications. Avantec counts as clients many of Switzerland's leading banks and financial institutions.

Clearly, attackers or criminals who want to access can do so with relative ease if standard software and hardware has been used in the network. "While the majority of medium to large financial institutions do have some form of an information security policy in place, the problem is that in this dynamic marketplace it becomes obsolete in the space of months rather than years," said Matai. Network security needs to be continually assessed.

To find out how secure banks' networks are, Internet security consultants can run 'penetration tests' on financial institutions (in other words, they can hack into the bank). According to mi2g, which has tested US and European financial institutions as requested by the institutions in question, both corporate and retail banks are equally vulnerable. "Our penetration testers can get into them in between 45 minutes and 24 hours," said Matai. The procedures used to hack into systems are easily found on the Internet by using search engines with 'hack' or 'hacking' as search terms. The mi2g testers, who work from sites in South Africa, Singapore and New Zealand, have sometimes used a supercomputer to decrypt a password in under eight minutes but it is also possible to use normal networked PCs or Linux workstations; it just takes a little longer.

Should they gain access, a hacker can:

· crash networked computers resulting in potential data loss and attendant hazards, such as fire;
· steal, copy, reroute or delete files from any of the Windows-based machines and some Unix-based machines depending on configuration;
· access mainframe computers (in Cisco-based networks) even without a user ID;
· deny access to the mainframes;
· and read incoming and outgoing e-mail or it can be rerouted, copied, intercepted, altered or deleted at will.

Renowned worldwide for the ATCA Briefings. Subscribe now.
 
Home - Profile - Values - People - Careers - Partners - Contact Us
D2 Banking - Bespoke Security Architecture - Digital Risk Management - Tools

Intelligence Briefings - Brochures - Case Studies -
SIPS Methodology FAQ (pdf)
Keynote Speeches - Articles - News Feeds - Glossary (pdf)
Terms and Conditions - Privacy Policy