IT Examiner School, Providence, RI
Encryption
Process for scrambling a message or data • In transit • At rest Prevents ability to view messages or data except by authorized users
Uses a defined set of “keys” to encrypt info Some states require confidential information to be encrypted FFIEC IT Security Handbook has section on encryption
Wireless
Current protocols (least to most secure )
• Wireless Equivalent Privacy (WEP) • Wireless Application Protocol (WAP) • Wi‐Fi Protected Access (WPA) • Wi‐Fi Protected Access 2 (WPA2) • Wi‐Fi Protected Access 3 (WPA3)
If a financial entity is using wireless, they should be using the most secure protocol
Made with FlippingBook Annual report