BANKING TECHNOLOGY
- Based on bank computerization the report submitted by the committee in the year 1984 was known as First Rangarajan Committee report on Bank Mechanisation
- The four major objectives of computerization in banking are to improve customer service,housekeeping,decision making, productivity and profitability.
- At the regional and head office levels,the purpose of computerization should be to store,analyse and retrieve data.
- The stand alone computer system is used by only one person at a time.
- Stand alone systems are best suited for decision making process.
- Stand alone Systems cannot be used in a multi user environment.
- Stand alone Systems are capable of handling multimedia,high quality graphics,fax messages.
- In multi user computer networking, computers are based on the centralized processing concept.
- In multi user computer networking,systems work on a time sharing basis and are well suited for the development of online applications.
- In multi user computer networking, the load on the central machine increases with the increase in number of users.
- Computerisation at the branch level can be used to provide speedy customer service,improve house keeping services,analyse the branch level data for decision making,generation of various reports.
- Security measures play an important role in branch level computerization because of online banking applications.
- The generation of audit trails and exceptional transaction reports ensure proper functioning of the computerized systems.
- Total Branch Automation leads to real time online banking.
- The independent modules are interlinked to form an integrated system such that changes are effected without a time lag.
- Using total branch computerization it is possible to provide the single window transaction concept
- RO/ZO acts in between branches and the head office.
- RO/ZO exercise effective control over the functioning of the branches including collection of data from them and transmitting the same to head office after amalgamation.
- The most common tasks performed by RO/ZO are Branch Profile,Inter branch Reconciliation, Credit Monitoring, Personnel data management etc.
- The head office of a bank is responsible for bank level planning and control functions,policy decisions.
- The head office activities divided into different functional areas like operations,planning,personnel,international business,services,etc
- The branch profle may contain Standing data file(SDF form) and Performance report file (PRF).
- The computer network that links computers and peripherals within a localized area say,within a building is known as LAN(Local Area Network).
- LAN will not extend beyond 100 metres. It can be upto a maximum spread of 1 km and the number of devices supported may also vary from 2 to as many as 1000.
- In LANs each independent system is known as a node.
- The methods of operation for the transfer of data over networks are called packets switching.
- Transmission in bus topology is in both directions and is received by all other stations.
- Advantage of Bus topology is if one station on the LAN fails,it will not affect the rest of the network.
- In Ring topology,the devices are connected in a loop. Data transmission is possible in one direction only.
- Disadvantage of Ring topology is the breakdown of any one station on the ring can disable the entire LAN.
- In a star topology, the central node is often the master. If one node fails it will not affect the network.
- In technology terms effective communication between two pieces of equipment happens through PROTOCOL
- Protocols defines message formats and the rules for message exchange.
- The network protocols depend on the adapters.
- Some of the commonly used types of adapters are Ethernet and Token Ring.
- The Token in Token Ring is actually a special frame passed from node to node.
- A Multiplexer is used to receive signals from several communication lines and pass on to one communication line and vice versa.
- In LANS,
- Expensive resources can be shared
- Information stored on the host computer is available to all users of the system.
- Processing load is shared between the various machines.
- Wide Area Network (WAN) are defined as a large scale computer network spread over a span of sizeable geographic area.
- In banking sector the WANs are generally used to interconnect branches with the regional offices and RO/ZO offices to head offices.
- WAN Connectivity can be established by using dial-up network or satellite links or microwave links.
- Core Banking has a centralized branch computerization model where the branches are connected to a central host,which incorporates branch automation modules and online multiple delivery channels under one roof.
- The introduction of the ATM(Auto teller Machine) and the plastic cards has given the banking customers the facility of round the clock (24 hours banking)
- ATMs are primarily used for performing some of the banking functions such as the withdrawal of cash or the deposit of the cash/cheque by using an ATM card.
- Migration of the routine transactions to the ATMs frees the bank staff for more productive work.
- ATMs serve as the crucial touch point for cross selling of the bank’s products.
- ATMs serve as a media for publicity for the bank.
- When the ATM is connected to the bank’s database and provides online real time access it is said to be ONLINE.
- When the ATM is not connected to bank’s database it is said to be OFFLINE
- When an ATM is not connected to any ATM Network it is said to be STAND ALONE
- When ATMS are connected to an ATM Network they are said to be NETWORKED
- Cash Dispenser is a pruned down version of the ATM.
- IBA(Indian Bank’s Association) was the first to set up a shared payment network system(SPNS) or SWADHAN network of ATMs of its member banks in Mumbai.
- The components of ATM are Video Display Monitor,Keypad,Touch screen,Slots.
- HWAK or The Intelligent Auto teller systems are a special breed of auto teller machines capable of thinking for themselves.
- In Charge cards the transactions are accumulated it is only charged i.e not debited to the account immediately such cards are called charge cards.
- In case of credit cards the card holder has the option to pay the entire amount as soon as the account is debited.
- In debit cards, the funds are immediately taken from the card holder accounts.
- The smart card unlike any other plastic cards contains an Integrated Circuit ( IC Chip ) installed.
- Two tyoes of smart cards are memory chip and micro processor cards.
- The protection for the smart cards is based on the DES(Data Encryption Standard) which is accepted by the ISO.
- Member cards are exclusively used by members of club or a chain of hotels.
- Credit card system inculcates a sense of financial discipline.
- Credit card system leads to increase in sales because of increased purchase power of the card holder due to unbilled credit available.
- Credit card system results in systematic accounting to the merchant establishment.
- Credit card system helps in establishing banking relationship with new customers.
- In manual mode of acceptance of card merchant has to verify the genuiness of the card from warning bulletin.
- In Electronic mode of acceptance of card merchant accepts card through Electronic Data Capture machines.
- The security features of Smart cards are Dynamic Signature verification,Fingerprint verification, Voice recognition systems, Hand geometry,Retinal pattern verification,Vein recognition,Visual recognition.
- Electronic purse contains space for storage of amount and user data such as address,branch details and transaction history.
- Corporate Banking allows the customers to operate the account without physically coming to the bank.
- Using remote banking facility corporate customers can get their current balance,order cheque books,intra and inter bank fund transfers,stop payment instructions,International remittances,Opening LCs.
- International Remittances can be made through SWIFT(Society for World wide Inter bank Financial Telecommunication)
- Telebanking services is based on the the voice processing facility available with the bank’s computers through which balance enquiry, fund transfer etc. can be done.
- Online updates may be defined as the direct linking of an operation or equipment to a computer system so that any stimulus provided by that operation or equipment is immediately accepted by the computer system.
- Online update is required in foreign exchange transaction and ATM.
- In batch updates, every day at the end of the banking hours, the computer operators start entering the data of the day’s transactions into the computer and is processed by the computer.
- Internet banking service is of three types.
- Basic level services – which disseminate information on different products and services.
- Simple Transactional Websites – Allows customers to submit their instructions and queries but do not permit any transactions.
- Fully transactional websites – Permits fund transfers and enquiries
- Mobile banking has feature like 128 bit encryption and open Internet technology
- A Cheque is a bill of exchange drawn on a specified banker and not expressed to be payable otherwise than on demand.
- Cheque truncation can be done through MICR data or Image Processing.
- Cheque Truncation stops flow of cheques through the banking system.
- Periodical backup of the database is done with the help of microfilm or microfiche that can retain voluminous information.
- A modem is a conversion device installed in pairs at each end of a telephone line.
- 3 types of transmission medium – Terrestrial wire pair,coaxial cable and optical fibre.
- Terrestrial wire pair consists of two insulated copper wires and they are useful for connecting terminals to computers upto a distance of 100 metres.
- Coaxial cable can carry digital signals at very high rates of 500 mega bits per second.
- Optical fibre supports data rate of 2 giga bits/sec.
- Microwave systems use very high frequency radio signals used in telephone systems and television transmissions. The radio waves are modulated to carry information.
- Communication Satellites contains satellite that is fitted with transmitters and receiving antennas called transponders.
- Transporters are used to link two or more microwave transmitters or receivers on earth known as work stations.
- Message switches are used for storing and forwarding data to a large number of terminals over a single communication channel.
- Multiplexer is a device that enales more than one signal to be sent simultaneously over one physical channel.
- Front end processor is a dedicated communication systems that intercepts and handles communication activities for the host computer.
- A simplex transmission is capable of transmitting data in only one direction.
- Half Duplex transmission allows data movement in both directions but in only one direction at a time.E.g modem.
- Full Duplex transmission provides simultaneous two way transmission.
- INFINET (Indian financial network) has been set up at Hyderabad by RBI
- The hub of VSAT network is owned by RBI and IDRBT(Institute for Development and Research in Banking Technology)
- Internet is a global network of networks.
- ISP( Internet service provider ) is established through the interface protocol software. Two protocols available are SLP – Serial line protocol and PPP – Point to point protocol.
- SWIFT is basically a message transmission system. In India, all nationalized banks are members of SWIFT. Banks are connected to SWIFT regional processor at Mumbai
- SWIFT assumes financial liability for the accuracy and timely delivery of all validated messages from the point they enter network to the point they leave the network
- Security in SWIFT is made through Key authentication mechanism,Encryption and Checksum.
- Banks with Automated clearing systems use Distributed Data processing techniques with a central system acting as the main database server.
- CHIPS(Clearing house Interbank payment system) – started operating in 1970 run by a New York clearing house for transfer of payments internationally.
- CHAPS(Clearing House Automated Payment System) – set up in UK provides almost instantaneous service for settlemet of payments and the payments are guaranteed on receipt and cannot be recalled.
- CHATS(Clearing House Automated Transfer System) provides the inter-bank funds transfer facilities in Hong Kong
- The Fedwire is a X.25 protocol based packet switched network.
- Bankwire is the pioneer private sector electronic telecommunication network owned by an association of Banks in USA.
- The POS system allows payments to be made at the point of sales by the way of EFT.
- In Role of sending Bank – NEFT System the sending bank branch would prepare the ‘Structural Financial Messaging System’(SFMS) message and sent it to sending service centre.
- The sending service centre shall transmit the NEFT SFMS message to the NEFT Clearing centre by using the communication network designated by Reserve Bank.
- The SFMS messages are transmitted to National clearing centre(NCC)
- In Role of clearing centre – NEFT System NCC will be the data processing NEFT clearing centre.
- In Role of Receiving Bank – NEFT System the receiving NEFT service centre may use the ‘Straight through Processing Interface’(STPI) available in SFMS and upload these SFMS to give the credits to the beneficiary account centrally.
- NEFT facilitates an efficient, secure,economical,reliable and expeditious system of funds transfer and clearing in the banking sector through India.
- RTGS is an electronic payment environment where payment instructions processed on a ‘Continuous’ or ‘Real Time’ basis and settled on a Gross or Individual basis.
- RTGS Business day divided into four phases – RTGS open phase, IDL Shut phase, IDL Close Phase, RTGS Close phase.
- MNSB – Multilateral net settlement batch.
- The digital signature is a key and must be applied in a manner to satisfy the following critical features of any digitally signed electronic message.
- The validity of the source of an electronic message should be ascertained through the digital signature by verifying the source or the originator of the message and this is called Authentication.
- The integrity of a message transmitted electronically has to be received intact and should not have been altered in any way during transmission.
- Cryptography is usually based on the use of algorithmic functions to generate two different but mathematically related keys. Private and public keys.
- The private key is kept confidential and is used only by the signer to reate didital signature.
- The public key is used by a relying party to verify the digital signature.
- Databases known as data warehouses are designed, wherein data from heterogenous sources is stored to generate critical information for the decision support systems.
- The Data in Data ware house is integrated and there are no inconsistencies.
- The data in a Data ware house is non-volatile and time variant.
- Data Mining is a technique to reveal the strategic information hidden in the data warehouse(s).
- Data Mining is the process of automatically finding patterns and relations in large databases.
- Application of Data Warehousing – Loan risk analysis,Credit risk analysis,Stock portfolio creation,Data analysis of the demographic functions,Risk analysis by insurance companies.
- Cyber banking leading to a cashless society is the direction towards which the the technology is driving the banks today.
- Electronic Data Interchange(EDI) is the inter-organisational exchange of business documentation,which can be processed by computers.
- Gateway in India for EDI Services - Videsh Sanchar Nigam Ltd.(VSNL)
- The credit card network is another EFT system using EDI standards.
- Electronic data interchange for administration of commerce and transport (EDIFACT) is the universal set of standards and guidelines for communication by EDI.
- End uses of corporate websites – Dissemination of information,Financial advice,To highlight non-banking activities,A node for commerce,Selling financial products,Gateway to the Internet,Account services.
- In MIS(Management Information Systems) the availability can be analyzed and turned into meaningful information for managerial decision making.
- The key element in any MIS is the transformation of data into information.
- DSS(Decision Support Systems) – helps in predicting the decisions.
- DSS allows for the creation of simulations under various conditions and help in the management in analyzing situations under different conditions.
- DSS makes use of complex mathematical models to aid in decision making.
- Data privacy assumes two significant dimensions-the authority to access data,the authority to use data only for specified purposes.
- The risks associated in use of IT and the deficiencies in security and controls within the banking procedures may pose a significant threat to the banking operations.
- The three components software,data and hardware are continuously exposed to computer operators,programmers,customers and even to the public.
- The risks broadly lead to Incorrect decision making,Interruptions in activities due to loss of data,Violation of privacy,Direct financial loss due to computer frauds.
- Data is a critical resource, necessary for an organisation’s continuing operations.
- Peopleware refers to the group of persons directly or indirectly involved in establishing and running the computerized systems.
- Types of threats
- Errors and omissions in data and software
- Unauthorised disclosure of confidential information
- Computer abuse and mis utilization of bank assets
- Frauds
- Errors in computerized environment can occur at the time of:
- System design and process development
- Programme maintenance and while carrying out correction procedures.
- Data entry at the time of terminal operations.
- Malicious damage to computer systems can cause an interruption in banking services.
- Risk of malicious damage to computerized systems can be from disgruntled employees who wish to disrupt the services or from individual with malafide intentions.
- Special programmes such as utility programmes can be used to make unauthorized changes to computerized records in a way that bypasses the normal control and audit trail facilities built into the computer systems.
- Corrective controls remove or reduces the effects of errors and irregularities after they have been identified.
- An audit trail is a chronological record of all events occurring in a system.
- Accounting audit trail – It maintains a record of processes that update the data and information.
- Operations audit trail – It maintains a record of attempted or actual consumption of resources within a system
- Checksum-It is generated to ensure the integrity of data stored in a computer file.It is a number calculated on a basis of certain key data items of the file.
- Data encryption-is the process of systematic encoding of data before transmission so that an unauthorized person cannot decipher it.
- In electronic fund transfer systems a control mechanism which applies a message authentication code (MAC) is used to identify changes to a message in transit.It is a secret key applied to selected data items in a part or whole of the message.
- The auditors also make use of audit software – Computer aided audit tools and techniques (CATTs) to process data of audit significance.
- Benefits of IS Audit:
- It would identify the risks of exposure to an existing computerized environment.
- It would deter people/employees/users from indulging in corruption/manipulation of data,frauds,etc.,as any unlawful activity will be prevented
- Objectives of IS security policy:
- CONFIDENTIALITY : To prevent unauthorized disclosure of information stored or processed on the bank’s information systems.
- INTEGRITY : To prevent the accidental or unauthorized deliberate alteration or deletion of information.
- AVAILABILITY : To ensure that information is available to authorized persons when required
- Controls required for IS Security: User id and password,Authorisation,Access control,Alternate authentication control,Integrity,Confidentiality and Non repudiation.
- Phases of disaster recovery palnning:
No comments:
Post a Comment