IT Examiner School, Seaside, CA
• Process for scrambling a message or data – In transit – At rest • Prevents ability to view messages or data except by authorized users • Uses a defined set of “keys” to encrypt info • Some states require confidential information to be encrypted • FFIEC IT Security Handbook has section on encryption Encryption
Wireless • Current protocols (least to most secure)
– Wireless Equivalent Privacy (WEP) – Wireless Application Protocol (WAP) – Wi-Fi Protected Access (WPA) – Wi-Fi Protected Access 2 (WPA2)
• If a financial entity is using wireless, they should be using the most secure protocol
Made with FlippingBook - Online catalogs