Digital Edition

SYS-CON.TV
Federal Reserve to Send $1.8 Trillion Over the Web
Federal Reserve to Send $1.8 Trillion Over the Web

Internet security analysts believe that more hackers will attempt to infiltrate Web-based financial systems, now that the Federal Reserve has decided to use the Internet as a way to transfer money.

Currently, the Fed uses a closed network through which about $1.8 trillion is moved per day. Proponents of the new Web-based monetary transfer, called FedLine Advantage, say the old system is antiquated and not efficient. Not everyone is sold on the new protocol.

"The Fed is now going to be vulnerable in two distinct ways. A hacker could break in to the Fed's network and have full access to the system, or a hacker might not have complete access but enough to cause a denial or disruptions of service," said George Kurtz, CEO of Foundstone, an Internet security company.

Patti Lorenzen, a spokeswoman for the Federal Reserve, said "We feel confident that this system adheres to the highest standards of security. Without disclosing the specifics, it is important to note that our security controls include authentication, encryption, firewalls, intrusion detection and Federal Reserve conducted reviews."

The use of cyber terrorism has become more of a mainstream issue, since the effects are not just localized to events within a system. On July 22, the Department of Homeland Security released an internal report saying a cyber attack could result in "widespread disruption of essential services ... damag(ing) our economy and put(ting) public safety at risk."

The Fed, however, remains undaunted, saying, "Our strategy is to move to Web-based technology because there are inherent limitations with DOS based technology."

About Security News Desk
SYS-CON's Security News desk trawls the world of security for news of software, hardware, products, and services that seems likely to be of interest to infosec professionals and summarizes them for easy assimilation by busy IT managers and staff.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1



ADS BY GOOGLE
Subscribe to the World's Most Powerful Newsletters

ADS BY GOOGLE

Disruption, Innovation, Artificial Intelligence and Machine Learning, Leadership and Management hear...
While some developers care passionately about how data centers and clouds are architected, for most,...
Chris Matthieu is the President & CEO of Computes, inc. He brings 30 years of experience in developm...
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are rep...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming ou...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news an...
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held Novemb...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: D...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO an...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple ...
CloudEXPO New York 2018, colocated with DXWorldEXPO New York 2018 will be held November 11-13, 2018,...
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As au...
The now mainstream platform changes stemming from the first Internet boom brought many changes but d...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: D...
"We began as LinuxAcademy.com about five years ago as a very small outfit. Since then we've transiti...
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning te...
The Internet of Things will challenge the status quo of how IT and development organizations operate...
More and more companies are looking to microservices as an architectural pattern for breaking apart ...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-fo...