AUTHENTICATION IN AN INTERNET ENVIRONMENT Dominick E. Nigro NCUA Information Systems Officer
Reason For Guidance Changes to Privacy and Security Regulations Increased Incidents of Identity Theft/Fraud Authentication Methods Contribute to Identity Theft/Fraud Authentication Technology Advances
Why Effective Authentication? Safeguard Member Information Reduce Fraud/Identity Theft Prevent Money Laundering and Terrorist Financing Promote Legal Enforceability of Electronic Agreements and Transactions Reduce Risk of Business with Unauthorized Individuals
What does NCUA expect? Assess the Authentication Risks associated with Internet Based Services Assess effectiveness of Authentication Methodology Implement/Review program to Monitor Systems Determine reporting policies/procedures in place if Unauthorized Access occurs Evaluate Member Awareness Program
Authentication Risk Assessment Identify all Access and Transactions associated with Internet-based products and services Determine if Internet Based Services provide High Risk Transactions Identify Authentication Methods used for Internet Based Services Determine effectiveness of Authentication Methods for High Risk Transactions
Member Account Authentication If Risk Assessment identifies inadequate Authentication for High Risk Transactions Multifactor Authentication Layered Security Other Controls
Authentication Methods Multifactor Authentication Something the user knows (pin/password) Something the user has (smart card/token) Something a user is (biometrics, fingerprint)
Authentication Methods Layered Security – Multiple controls and multiple control points Other Controls – Technology and controls that are emerging or that may be introduced in the future
Monitoring Systems Detection of Unauthorized Access Implement Audit procedures which Assist in detection of fraudAssist in detection of fraud Money launderingMoney laundering Compromised passwordsCompromised passwords Other unauthorized activitiesOther unauthorized activities
Reporting Requirements Unauthorized Access Requires Notifying Management NCUA Regional Director Appropriate Law Enforcement Filing Suspicious Activity Report Member Notification Appendix B of Part 748 of NCUA RR
Member Awareness Programs Key to reduce Fraud and Identity Theft Implement/Revise Member Awareness Program Evaluate Education efforts Identify additional efforts
Conclusion Assess Risk of Internet-based products and services Establish effective Authentication methods Monitor systems for Unauthorized Access Report Unauthorized Access Notify Members of Unauthorized Access, if warranted Educate members Complete process by Year-end 2006