Various tools and technologies used to help protect against or monitor intrusion include authentication tools, firewalls, intrusion detection systems, and antivirus and encryption software. Access control consists of all the policies and procedures a company uses to prevent improper access to systems by unauthorized insiders and outsiders. Authentication refers to the ability to know that a person is who he or she claims to be. Access control software is designed to allow only authorized persons to use systems or to access data using some method for authentication. New authentication technologies include:
A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic and prevents unauthorized communication into and out of the network. The firewall identifies names, Internet Protocol (IP) addresses, applications, and other characteristics of incoming traffic. It checks this information against the access rules programmed into the system by the network administrator. There are a number of firewall screening technologies:
Intrusion detection systems feature full-time monitoring tools placed at the most vulnerable points of corporate networks to detect and deter intruders continually. Scanning software looks for patterns indicative of known methods of computer attacks, such as bad passwords, checks to see if important files have been removed or modified, and sends warnings of vandalism or system administration errors. Antivirus software is designed to check computer systems and drives for the presence of computer viruses. However, to remain effective, the antivirus software must be continually updated. Vendors of Wi-Fi equipment have developed stronger security standards. The Wi-Fi Alliance industry trade group's 802.11i specification tightens security for wireless LAN products.Many organizations use encryption to protect sensitive information transmitted over networks. Encryption is the coding and scrambling of messages to prevent their access by unauthorized individuals. Two methods for encrypting network traffic on the Web are: Data is encrypted by applying a secret numerical code, called an encryption key, so that the data are transmitted as a scrambled set of characters. To be read, the message must be decrypted (unscrambled) with a matching key. There are two alternative methods of encryption:
Digital signatures and digital certificates help with authentication. A digital signature is a digital code attached to an electronically transmitted message that is used to verify the origin and contents of a message. Digital certificates are data files used to establish the identity of users and electronic assets for protection of online transactions. A digital certificate system uses a trusted third party known as a certificate authority (CA) to validate a user's identity. The digital certificate system would enable, for example, a credit card user and a merchant to validate that their digital certificates were issued by an authorized and trusted third party before they exchange data. Public key infrastructure (PKI), the use of public key cryptography working with a certificate authority, is a principal technology for providing secure authentication of identity online. Figure 8-8
Our security technologies We are continually assessing our technology to ensure we provide the best security for you. To keep your information secure, we safeguard our systems in the following ways:
Additional online security featuresAdaptive Authentication BankSA Internet Banking is protected by our market-leading technology BankSA Secure™ Adaptive Authentication – a comprehensive, real-time, authentication and fraud detection platform that monitors your banking behaviour. Automatic time out period We recommend that you not leave your computer unattended when logged into Internet Banking. However, after a period of inactivity we will automatically log you out to reduce the risk of anyone else accessing your account information on your computer. Lockout To prevent someone from trying to guess your Password, access to Internet Banking will be blocked after a number of unsuccessful logon attempts. Time of last logon To confirm that there has been no unauthorised access to your account, when you logon to Internet Banking you will see the date and time of your last visit and the details of your last online transaction. Secure Code BankSA Secure Code is part of our Adaptive Authentication technology, allowing us to request that you enter a code to authenticate a transaction or access a feature. This verifies that a genuine action is being performed by you, the authorised person. Our measures to prevent card fraud BankSA ATMs are fitted with ATM anti-skimming technology. A number of our ATMs have PIN pad shields that conceal you typing in your PIN. We contact you if we detect unusual activity Our Fraud Detection team operates 24 hours a day, 7 days a week to protect your security, whether you are at home or overseas. For example, when there are transactions on your card that differ considerably from any style of transaction you've done before, we will attempt to contact you (regardless of your location) to check that it is really you making the transactions. For your protection there may be instances when we need to immediately stop your card prior to making contact with you. Our Fraud Detection team may initially contact you via SMS message. The SMS message will ask you call the number on the back of your card. This BankSA SMS will never display a specific telephone number for you to call us back on. If you don't have your card on hand, please refer to the phone numbers listed under contact us on the BankSA website. We stop your card to prevent further fraud BankSA will stop your card when you call to report a fraudulent transaction or when a potential fraud alert is triggered. If there really is fraud on your card, we will stop access to prevent any more spending. We have to act fast in such instances and sometimes, if we can't reach you when we try to call, we may decide to stop access to your card to ensure we protect your account until we can speak to you. How we manage a fraudulent transaction The BankSA Fraud Detection team will take the following steps we take when fraud occurs:
How we protect you from ATM skimming BankSA ATMs are fitted with ATM anti skimming technology. A number of our ATMs have PIN pad shields concealing your PIN when entered. We actively monitor your usual card spending, so we can detect any unusual spending patterns. How we protect you from EFTPOS skimming Because we are able to monitor usual card purchasing/spending patterns, we are able to detect any unusual patterns that may occur and prevent attempts by others to use your card. Liability This information is to assist you to look after the security of your card and PIN. It does not state the circumstances in which either you or BankSA may be responsible for unauthorised transactions on your account. Where the Electronic Funds Transfer Code of Conduct (Code) applies to you, BankSA applies the rules in the Code to determine responsibility for unauthorised electronic transactions on your accounts. Please refer to the terms and conditions applying to the use of your card for further information. |