IT Examiner School, Providence, RI

Encryption

Process for scrambling a message or data • In transit • At rest Prevents ability to view messages or data except by authorized users

Uses a defined set of “keys” to encrypt info Some states require confidential information to be encrypted FFIEC IT Security Handbook has section on encryption

Wireless

Current protocols (least to most secure )

• Wireless Equivalent Privacy (WEP) • Wireless Application Protocol (WAP) • Wi‐Fi Protected Access (WPA) • Wi‐Fi Protected Access 2 (WPA2) • Wi‐Fi Protected Access 3 (WPA3)

If a financial entity is using wireless, they should be using the most secure protocol

Made with FlippingBook Annual report