Вы находитесь на странице: 1из 57

Information Security Awareness

Training for Users

PRESENTATION BY SBIICM HYD

Security Myths

There is nothing important on my computer


Technology alone can solve the security
problems
I dont have anything to contribute in the
security of my computer..

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

This could happen from my PC..!!

Critical data is accessible to others because I


have left my PC/terminal unattended
Virus infection in my machine brings down
the entire branch/administrative office
My account (User ID) is used to commit fraud
because my password is weak
Frauds undermine the image of my Bank..

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Why IS Security Policy?

Need to establish Information Security


strategy to achieve
Confidentiality,
Integrity and
Availability of the information and
information systems.
Regulatory requirement RBI audit will
now cover IS Policy compliance..

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Banks IS Security Initiatives

Establishment of Information Security


Department for development,
updation, dissemination & compliance
review of Information Security Policy
Centralized Anti-Virus solution
Firewalls & Intrusion Detection Systems
Compulsory flow of policy awareness
among end users to prevent / report
occurrence of incidents..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

New IS Policy Version 3.0

Approved by ECCB in Sep11


Previous version 25 domains
New version 33 domains (8 new domains)
For end users all domains are not equally
important
Top priority area of IS Policy for majority end
users is Acceptable Usage Policy..

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Acceptable Usage Standards

Desktop Usage
Antivirus
Laptop & other portable devices Security
Password Security
Internet Usage
E-mail Usage
Document & Storage Security
Incident Reporting
Information Security violations
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Desktop Usage

Initiatives by Bank
Implementation of desktop Secure Configuration Document
Patching of operating system at Bank level
Your Support
Screen savers are for more than cute pictures, enable the screen
saver with password protection
Taking a break Log off before you leave
Done for the day ..Shut down and power off
Protect the confidential file with password
Do not enable remember my password option on your PC
Modems- when I connect to Internet, the world connects to me
Installing software- licensed version only and required for business
purpose..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Anti virus

Initiatives by bank

Centralized anti-virus product/support team


Automated real time scan of all files
Automated virus signature update

Your support

Do not change anti-virus settings


Do not disrupt scheduled virus scan
Report if any virus is detected & not cleaned
Report if anti-virus agent is not working or not upto
date..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Key Idea I am responsible for the security of


my desktop or MPD

Use it as it is
Lock before you leave

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Password Security

Passwords should be easy to remember but


difficult to guess.
Weak passwords

Your personal information like name, initials,


names of family members or their variations
Common words found in dictionary
Patterns like 1111, aaaa etc..

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Password Security

Strong Passwords
Min 8 characters
Mix of numbers (1,2..), capital letters (A,B..) and special
characters (!,@..)
Make simple words complex H1m@l@y@
First letter of sentence J&Jwuth
Note: Do not use these examples as your passwords
Change your password
Frequently - at least every 90 days
Immediately if you suspect somebody knows it
User should report to the System Official if account is
locked out before 3 invalid attempts..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Password Security

Do not share your passwords


Do not type your password

When someone else can see you

and dont look when someone else is typing

Do not write your password

If required, ensure it is adequately secured and


adequately masked or scrambled..

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Key Idea

I am accountable for all actions carried


out using my user-id/password.

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Internet Usage

Initiatives by Bank

One central Internet gateway for all offices on SBIConnect


No separate Internet connection at SB-Connect
offices. Separate standalone connection permitted
with the approval of IT - networking dept only
Firewall, Anti-virus and URL filtering protection at
the gateway
User-id/password based access control
Bank has the right to monitor internet usage and
take appropriate action in case of misuse..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Internet Usage Guidelines

Access internet primarily for business purposes.


Occasional and reasonable personal use
Configure browser not to remember passwords
Set browser security to medium
Ensure that all downloads are scanned for virus before
opening
Users should not:
Download/distribute protected material
Access websites by clicking on links provided in
e-mails
Download free utilities - can be dangerous
Upload data belonging to the Bank
post views or opinions on behalf of the Bank on any
internet site without proper authorization..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Key Idea

The less I download and less I reveal, the


better off I am

Internet

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

E-Mail Usage

Initiative by Bank
Central E-Mail server
Your support
Save important mails for record purpose on your PC
Secure critical documents while sending over email
Zip the file with password protection
Verify From: address for important email
Exercise caution when clicking on Internet links provided
in e-mails

Do not use e-mail for critical transactions requiring legal


authentication of sender like payment or transfer of
money as it is difficult to legally establish the identity of
sender of email messages unless they are digitally
signed.
Do not send SPAM and chain mails..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

E-Mail Usage

Use only official email ID for business purposes


Do not use official e-mail ID
For personal work
For registration on Internet sites
Exercise caution with email attachments
Attachments can contain viruses
Never open attachments from an unknown person
Even if the person is known, do not open
If mail subject or attachment have
doubtful/dubious names
If you are not expecting an attachment..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

E-Mail Usage

Forward e-mails only if necessary


Do not forward spam mails / chain mails
Report spam to report.spam@sbi.co.in
Do not solicit, encourage or engage in non
business behavior
Do not send material or use language that is
abusive, obscene or racist
Do not transmit any software or document that
is protected by copyright or any other law..

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

E-Mail Usage

Email sent from official ID is equivalent to signed


official communication.
All official email communication should include
following details:

Subject - brief of the text to be sent, should not


be left blank.

Should contain name of sender along with


Designation, Department and Contact Number.

Should not be sent Anonymous or using generic


names like Designation or Department Name only.

Tag line or messages should not be used below


signature..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

E-Mail Account Protection

Protect the account with a strong password


Do not share your password
Do not subscribe to mailing lists or social
networking websites from your official e-mail
ID leads to mailbox overflow
Do not post messages to internet newsgroups
or discussion boards avoid spam attacks
Do not provide e-mail IDs of colleagues to any
website, mailing list, newsgroup, etc..

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Key Idea

My email is as official as Banks letter


head.
It can be interpreted to represent the
bank.

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Document Storage & Security

Mark sensitive documents as confidential in


both print & electronic format
Do not leave confidential documents
unattended at any time
Adopt a clean desk policy reduce risk of
unauthorized access
Label removable media (Tape, CD, etc)
containing sensitive information as
Confidential..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Security of Information

Donot discuss sensitive information with


outsiders / employees who do not need to
know
Do not discuss sensitive information in public
places
Donot give out sensitive information over
email/telephone
Donot leave sensitive documents on your
desk/printer/fax/ public places..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Key Idea

If the information is confidential, treat it


with caution.

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Incident Reporting Everybodys


Business

Report security incidents to

Local System Administrator/Service Desk


By e-mail to isd.cc@sbi.co.in

Possible incidents include..

Abnormal system resource usage


Abnormal, slow response for
application
Data corruption
Virus infection
Change in desktop settings
Account lockout
Violation of policy by others..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Security Violations

Connecting modems to machines without


approval
Introducing virus
Sniffing on the network
Password guessing
Computer impersonation
Erasing or modifying data on central systems
without authority
Running scans or attack tools..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Security Violations

Bypassing access control mechanisms


Exploiting any system vulnerability
Installing or distributing unlicensed software
Vandalism
Computer fraud or theft
Downloading or transmitting objectionable
content ( through e-mail or internet)..

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Key Idea

Do not intentionally attempt to cause


harm to banks information systems

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

SECURITY IN APPLICATIONS
Core Banking
ATM
Internet Banking
Mobile Banking

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Security in Core Banking

In B@ncs-24 system, there are three basic


entities:

User
Customer / Account
Transaction (Business Operation)

There are 3 security features available in


Core Banking:
1. Capability Level 2. Posting Restrictions
3. Data Security ..

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

User-id in Core Banking:

The user-id in Core Banking is same as the


employee's Provident Fund (PF) number, which
ensures its uniqueness.
For close monitoring, the User-ids are linked to
the specific branch code to which the user
(staff member) is attached.
Further validation is carried by checking
against the user's security clearance level for
i) user group, ii) application and
iii) transactions ..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Revised Password protection in


CBS wef 05.11.2011

The password should contain minimum 8 and


maximum 10 characters
Password should contain atleast one alphabet in
capital letter, one numeral and one special
character.
System will not accept last 5 passwords at the
time of changing password.
The User ID will be suspended whenever the user
tries to login with a wrong password thrice.
The User ID can be reset only by an authorized
officer and approved by another officer..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Access Control in CBS

User access validation is carried out by:


Sign-on / sign-off at terminal and operator
levels
User capability level and user group level
(after successful sign-on)
Branch location
Terminal numbers are allotted to all users and
while logging in, a user should use the terminal
allotted to him / her..

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Access Control in CBS (contd..) :

If away from the terminal only for a brief period,


users should lock their system by accessing the
icon provided on the screen.
At Branches a User Control Register is available
to record the details of changes & amendments of
user types, capability levels, forced closures, user
resets etc. User Control Register should be
meticulously maintained.
All accesses by the authorized users are tracked by
the system..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Transaction Security in CBS

For all user-input transactions, including


reversals and correction entries and those in
intermediate accounts, vouchers should be
prepared.
All transactions put through by users that
require authorization are sent for authorization
in Queue with a unique queue number.
The system generates Trace No. / Journal No.
for all the committed transactions, at the Host
(CDC) which ensures a unique identity for each
transaction..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Security in ATM

Initiatives by Bank

Bankss ATM system is ISO 27001 certified

The physical security of ATMs is ensured by


access locks.

No one can enter the ATM kiosk without a valid


card.

Once inside the ATM, VSS (Video Surveillance


System) or DSS (Digital Surveillance System )
records activity..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

SECURITY IN ATM

Logical security is taken care of by the PIN. It is


impossible for anyone to operate the account
without the physical possession of the card and
knowledge of the PIN. These kind of security
which relies on two factors (something you have
and something you know) is called two-factor
authentication and is more secure than log-in id
and password.
Our ATM network is secure and robust, to satisfy
the security triad of confidentiality, integrity and
availability..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Security in ATM

Your Support

Register your Mobile number at your Branch to get SMS alerts


for all your transactions
Change your PIN after first usage & periodically thereafter.
Never keep the PIN with the card. Never write it on the
card. Best to memorize it.
Dont use personal information like year of birth, vehicle no.
etc as your ATM PIN.
Hide keypad with one hand while keying in your PIN at ATM /
POS terminals.
Dont ask for help from strangers to operate the ATM.
Block and destroy your old card, when you get a new one..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Security in ATM

Your Support

Insist on swiping your card in your presence at POS


terminals in hotels/shops/malls etc. Do not disclose your
PIN
Do not throw your transaction slip in ATM room; it
contains your account details and balance.
Do not transact if you observe any attachments or
unusual devices connected to the ATM.
Check your account statement periodically.
If you lose your card, Hot list it immediately. Call 1800112211 / 1800-4253800 for BSNL and MTNL Landline or
080 26599990 from any other landline / mobile phone..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Security in ATM

Your Support

Do not provide ATM card & PIN details to any one, not
even to the Bank/ IBA/RBI/ Govt. Agency. Bank or any
other institution will never ask for this information.
Never disclose your PIN or handover your ATM card to
anyone, not even to your family members.
Do not use the ATM, if you feel the place is "crowded" or
unsafe. Come back later
Before using State Bank ATM-CUM-DEBIT Card for online
transactions, register for SBI 3D Secure Service available
through www.onlinesbi.com.
Dont leave the ATM until your transaction is complete..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

SECURITY IN INTERNET BANKING

Initiatives by Bank
Verisign certified 256-bit SSL encryption
technology. ISO 27001 certified.
Addition of Third party : Secured & Unique
Multilevel password
Transaction in pre-defined accounts
Transfer up to defined limits
High Security option with SMS based password
Auto expiry of session
Virtual Key Board Facility
Stop payment of cheques online ( 8 to 8)
New feature - Lock User Access ..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

SECURITY IN INTERNET BANKING

Your support

Bank will never send you an e-mail asking you to submit


personal or financial information such as your username,
password, PIN number or credit card number.
Any e-mail which asks for such information is fraudulent
and should be deleted immediately. Any attempt to steal
personal information by sending fraudulent e-mails is
technically known as Phishing.
Do not be lured if you receive an e-mail promising you a
reward for providing your personal information and do
not be afraid if the email warns of an impending

penalty for non compliance..


PRESENTATION ON INFORMATION SECURITY SBIICM HYD

SECURITY IN INTERNET BANKING


Your support

Access OnlineSBI only by typing the URL:


www.onlinesbi.com in the address bar of your browser. Do
not click on links in any e-mail message to access the site.
If you receive any suspicious or fraudulent emails, forward
the same to us immediately at report.phishing@sbi.co.in
If you have accidentally revealed any confidential
information, report the same immediately at
report.phishing@sbi.co.in
If you receive an e-mail purportedly sent from a bank or a
trusted organisation, promising a reward or warning of
penalty for non compliance, verify its authenticity by
contacting the bank or the organisation..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

MBS BASICS

Mobile banking model consists of four important components:


The Bank
Mobile Network Operator (MNO):
The Customer
Mobile Banking Technology Vendor (MBTV)
Mobile banking technologies can be categorized into two
environments:
Client Side Technologies: Built or embedded on a consumer
SIM or mobile handset. ( JAVA based mobile application)
Server Side Technologies: applications built on a server,
away from the consumers SIM or Mobile handset. (USSD)..

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

MBS - SECURITY FEATURES

INITIATIVES BY BANK
Authentication data (PIN/User-ID) is encrypted and stored
in the SIM / Memory of mobile.
Authentication data is stored in an encrypted format in the
application server from where it is transferred to the
SIM/Mobile Application. Minimum 6 character customer PIN.
All transactions (fund based and enquiry based) are allowed
only after authentication of the user id and the PIN
associated with it.
The PIN sent to the customer through SMS is valid only for
the first login and the customer is prompted to change the
PIN at the first login itself..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

MBS - SECURITY FEATURES

YOUR SUPPORT

Lock your phone with a PIN or password when not in use.


Always Keep your mobile device in a safe location
Avoid using Mobile Banking in crowded place. Shield the mobile
keypad from onlookers while entering the user-id and the mpin
SBI never asks for your personal information like account
number, User ID or MPIN. Never disclose your personal
information over text message to anyone or to any number
seeking such information.
Download the Mobile Banking application only from the Banks
site www.sbi.co.in, click on Services Mobile Banking or the
WAP link that you received along with the User ID..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

MBS - SECURITY FEATURES

YOUR SUPPORT
Maintain the secrecy of your MPIN. Memorise your MPIN.
Dont write it down/ record it anywhere or share it with
anyone or store it in your mobile phone.
If the mobile phone or SIM is lost immediately deregister from
Mobile Banking at your nearest State Bank Group ATM or your
home branch. Call your mobile service provider to block your
SIM
Change your MPIN at regular intervals. Use complex
alphanumeric MPIN
For using Mobile Banking service over WAP, never click on any
links. Always type in http://mobile.prepaidsbi.com/sbiwap/
in your mobile browser..
PRESENTATION ON INFORMATION SECURITY SBIICM HYD

MBS - SECURITY FEATURES

YOUR SUPPORT
Check your linked accounts on a regular basis
Once your transaction is over, logout of WAP mobile
banking website and then close the browser.
Delete any SMS from the Bank that might contain your
personal information like, userid, MPIN received at the
time of registration, or details sent to you -.
Do not part with your ATM card and PIN as this may be
misused for Mobile banking registration..

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

MBS INCIDENT MANAGEMENT

In the event of customer reporting loss of


mobile device, mobile banking service is
deactivated either by the customer from the
Banks ATM or from the Branch..

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Promoting Information
Security

Overall Key Message

Security mindset

Responsible use

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Our Commitments
I believe...
Strong information security, will help our bank to
use technologies effectively. It will also help in

maintaining our image, as the most reliable and


trust worthy bank in India..

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Our Commitments
I understand.
The importance of information security and agree
to take all reasonable precautions, to protect the

information assets of the bank..

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Our Commitments
After attending this session

I know my role in maintaining information


security in my work environment. I am aware
that the rules mentioned, cannot cover all
practical situations that might occur. I will
therefore do my best, to interpret them in the
right spirit i.e. in the way I believe a responsible
user will act..

PRESENTATION ON INFORMATION SECURITY SBIICM HYD

Thank You

Вам также может понравиться