Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
LAN:-- LAN uses network adapters to share a common medium ,such as Cable/radio/
light wave
UPS- consists of an inverter and a battery charger with an automatic changeover
of powersuply rom the battery or load.
Provides AC power
Online --- Converts 230 V input into 48 V DC . The battery Charger-CUM-rectifie
r converts this into a 230 V AC
Offline -- battery and inverter are 2 seperate parts for doing their jobs indepe
ndently.
When power is avaailable thru the main power supply .the battery cha
rger is only charging the battery and inverter is on standby .in case of an inte
ruption
in the mains power supply ,the batteries get connected to th
e inventer thru an electronic change-over and the power is supplied to the compu
ter systems
http://www.jaiibcaiibmocktest.com/dc-ppb-32.php
National Financial Switch by Institute for Development and Research in Banking T
echnology
Data Communication Networks and its components :-
----------------------------------------------
Trasmission devices and interface equipment -- electrical signals and bit seq'
s to represesnt numbers and characters ,
When signals transmitted over l
ong distances,there is a possiblity of signals deteriorating .
To overcome this problem,data c
ommunication networks use an interface device called MODEM(modulator de modulato
r)
Transmission Medium -- Terrestril cables
-- Terrestril Wire Pair -- 2 insulated copper wire
s ,upto distance of 100 Meters
-- Coaxial Cable --- inner copper conductor held i
n position by circular spacers --carries digital signals @ very high spped of 50
0 MBPS
-- Optical Fibre -- a very thick glass or plastic
fibres with a beam of light at a rate of 2 GBPS ,not affected by electromagneti
c interference
Microwave systems(very hgh freq radio signals such as t
hose used in telehone/television) ,
Communication Satellite (to link two/more microwave tra
nsmitters/receivers on earth --know as earth stations)
Transmission Processors -- to enhance data communication between 2 points
Message Switches -- used for storing and forwarding
data to a large no of terminal over single communication channel
Receive data from all the termi
nals ,store them in a queue and route them, one at a time ,to the Central Proces
sing Unit (CPU) during Transmission
Distribute messages coming from
the CPU to the appropriate terminals during reception
Multiplexers ---
a device that enables the simultaneous trans
mission of several messages or signals over one communications channel
Combine inputs from 2 /more terminals ,compu
ter ports or other multiplxers and transmit the combined data stream over a sing
le high -speed channel
Front End Processors ---
a small computer that receives data
from input devices and performs some initial processing tasks
on it before passing it to a more p
owerful computer for final processing
-- offload communication tasks fro
the host computer
Relay stations Catch and Boosts the signals resulting in connectivity
Ethernet uses adaptor system
MODEM at reciving end demodulates the incoming analogue signals converting these
back to the original digital format.
Modes of Transmission :
------------------------------
SIMPLEX -- data transmitted only one direction . The Sender can not receive a
nd receiver can not send. EX:- Commercial radio broadcast
HALF_DUPLEX --- data transmitted can be transmitted in both the directions ,bu
t in only one direction at a time .
ex:- MODEMS ,on a line
FULL-DUPLEX --- called DUPLEX , in 2 way at atime ex:- Four Wire Duplex modems
used on Telephone lines
NETWORKS :-------
------------------------------------
BANKNET -- RBI commionssioned in 1991 to harness IT for Intra and Inter Bank co
mmunications ,users at banks can access BANKNET thru leased lines with COMET s/w
(computerised Message and FIle Transfer)
is a packet Switched X.25 based Network ,nodes at mumbai,dlehi ,
chennai and kolkata and a switching centre at NAGPUR .
BANG and HYD are connected to Chennai thru remote connection
INET -- Department of Telephones setup in year 1991 ,is x.25 data network b
ased in packet switched public data technology(PSPD)
Typical applications of INET include : electronic mail ,corporate c
omm,info retrieval ,DB Service,remote login , credit card verification and EFT
NICNET -- is india largest WAN .it was setup by National Informatics Centre
(NIC)
BANKs use NICNET for e-mail Services
NICNET's Master Earth Station is installed in New Delhi and operat
es from around 650 VSAT terminals.
Presently ,it allows access to about 50 Networks in more than 30
countries thru leased lines as well dial-up connectivity
INDONET -- was setup by CMC ltd in 1980s /built on X.25 protocal for flexibil
ity in hetrogenous hardware connectivity
INDONET provides a gateway to INET for wider geographical spread
in india and connectivity to other international networks
including Telenet,Tymnet of USA ,Telepack of singapore and
Datex of germany
RBI Net -- BI Net comm S/w .It allows messaging and FT on the existing BANKN
ET infra with the help of servers installed at the 4 metros
Use of RBI's VSAT network and internet are two emerging trends that are increasi
ngly playing an imp role in changing the delivery systems for the banking sector
.
RBI's VSAT network was setup based on recommendations of SARAF Committe .
This network is called INFINET ( Indian Financial Network)
It uses satellite comm with VERY SMALL APERTURE TERMINALS(VSATs)
as earth stations.
VSATs Provide comm channels of HIGH Quality .
Applications of VSATs that RBI has listed for banks include :------
- Reporting to RBI , EFT , settlement of Securties , Anywhere/Anytime B
anking , Inter-branch reconciliation or transfers like DD/TT/MT
ETF :-
==================
The use of MICR technology for processing of Cheques paved the way for the intro
duction of ETF System
1954 -- committe on mechanism of cheque handling , constituted by American Bank
ers Association
1968 -- Setting up of SPECIAL COMMITTE ON PAPERLESS ENTRIES (SCOPE) in USA to e
xamine the concept of an AUTOMATED CLEARING HOUSE (ACH)
1970 --start of First ACH in 1972 , intro of systems such as POS and Society f
or Worldwide Inter Bank Financial Telecommunication (SWIFT)
start use of networked system and ATM
Final Develpment :-- Intro of private card systems such as 'VISA CARD' which emp
loyes an alternative payment system
SWIFT (society for World Wide Inter-bank Financial Telecommunication) --founded
in 1973 by 239 banks from 15 countries .
It provides a unified international processing and transmission system for th
e banking industry.
it has helped in standardising and automating the international payments me
ssaging.
Features -- SWIFT is a system ,operational thru out the year 24 hours a day
Assumes financial liability for the accuracy and timely delivery of
all validated messages from the point they enter the network to the point they l
eave the network.
uses about 400 diff standardised formats for message transmission
Ensures that info is confidential and is prtected against unauthorised di
sclosure and teampering.
Ensures that trasmission of the messages to any part of the world i
s almost immediate.
Message Types :-- SWIFT developed standard message formats to handle various bus
iness areas including customer transfers and cheques ,
finacial institution transfers ..
Security :--
Automated Clearning Systems :-----------------------------
CHIPS , CHAPS and CHATS are networked systems that banks in USA ,UK and Hongkong
use respectively.
These system are used for eletronic transfer of funds .Lets learn about some asp
ects of these systems.
CHIPS -- Clearning House Inter-Bank Payments system , 1970,run by NEW YORK Cl
earning House .
Carries out most of international fund transfer , used for trans su
ch as foreign and domestic trade services,internation loans, fx ,sales/purchase
Has direct interface with SWIFT system
CHAPS -- Clearning House Automated Payment System , UK , has a network that pr
otects high value payments and messages by passing them thru encruption and auth
entication tech
Has a format that has been devised from SWIFT .
CHATS -- Clearing House Automated Transfer System ,Hong kong ,provides instan
t online, same day inter bank settlement and enquiry facilities.
used authentication adn encryption teh to ensure integrity of m
essages travelling over a network.
SOME MORE FUNDS TRANSFER SYSTEMS :------
FEDWIRE :-- since 1956 ,is the main FTS in USA ,has 800 member banks linked tog
ether over computer-based telecommunication networks for transmission of funds a
nd statements.
X.25 protocal based packet switched network and has a large no of a
lternative routes for transmission of messages
Primarily used for transferring reserve account balances of deposit
ory insti/govt securites...
BANKWIRE :-- is the pioneer private sector electronic telecommunication network
, owned by an association of banks in USA
Has started providing a clearning facility known as 'CASHWIRE
' that also provides the settlement facility .
thru TELEX Network support message formats
POS SYSTEM :-- is synonymous with the EFT POS system
can handle records of sales ,inventory ,accounting entries
SECURITY
====================================
Risk -Prone Components :-- Data and Software -- improper decision making , Fraud
and Breach of Confidentiality
Infra --- and
people ware --- (stagnation in knowledge and skill levels o
f people,high turn over of people due to improper alignent of tasks with capabil
ties).
Types of Threats --- Accidental and Malicious(evil-intensioned) Damages
Accidental :-- Environmental Hazards - fire, unstabilised power ,spikes in p
ower, Excessive humidity ,floods,radio transmissions that affect data transmissi
ons
Human Errors --- data entry, systems design ,
Unreliable systems -- IT
Malicious Damage :- Interrupted Service :--malfunction of online,realtime pro
cessing system
Frauds :- unathorised changes ,removal and manipulation
of files
IMPACT of RISKS :--
-----------------
Incorrrect decision-making
Interruption of operations
Violations of privacy
Finacial loss
Mis-Utilisation of assets
Control Mechanisms
-- preventive Controls
-- Detective COntrol
Controls can be physical , internal and operational
Physical -- Control over access to assets using PIN/identification
Control over outputs -- preserving hard copies ,making them avai
lable to authorised persons only.
Control over physical damage
Control over source code to avoid any tampering to the code.
Internal Controls :-- ensure accuracy and reliability of accounting data
Operational Controls :-- ensures data integrity and consistency (embeded in
Software)
--- Different types of operational controls include data encryption, audit trail
s and checksum
-- Data Encryption --Message Authentication Code help to identify changes t
o message in transit.
-- Audit trail -- is chronological record of all events occurring in a syst
em,record traces irregularities ,detects errors and helps to monitor the system.
two types of AUDIT ttrails -- Accounting and operational
Accounting Audit Trail :- record of processes that update data and in
fo
Operation Auti Trail - record of attempted or actual consumption of r
esources within a system
-- Checksum - is a number calculated on the basis of certain key data items
of a computer file .usually involves acc no , bal, names of acct holders
Computer AUDIT :--
-------------------------
3 main approaches to Computer Auditing :--
Around the Computer -- internal control system of a comp installation and input/
putput of the application system.
Through the computer -- logic and controls existing with in system and Records
produced by the system
with the computer -- Computer Aided Audit Tools and Techniques(CAATTs) is one o
f the more efficient ways to audit
computer-generated files,records and documents and evaluat
e internal controls
Information System Audit :-
-------------------------
IS Audit is carried out thru the IT Systems using Computer Aided Audit Tools a
nd Techniques .
Banks are cooperating to form shared payment network,multi-application cards,e-b
anking and so on.
All this possible only if there is a very reliable and secure information syst
em.
Threats to IS :-- E-mail virus ,worms ,phishing attacks ,Hacking info , defacing
of websites and denial of service.
Objectives of IS Security :- An IS Security policy shd have the following object
ives :
Confidentiality :Protection of the stored information
Integrity : Prevention of accidental or unauthorised alteration of informati
on
Availability : restriction of access to info to authorised personnel only
Ways to Deal with IS Threats : installing firewalls ,organisations can use proxy
servers so that there is no communication between internet and the system
Controls for IS Security : --User ID and Password ,Authorisation , Alternate aut
hentication control ,biometric
DR planning process -- Awareness, Testing , Preparation And Recovery
Phishing is the act of sending an email to a user falsely claiming to be an esta
blished legitimate enterprise in an attempt
to scam the user into surrendering private information that will be
used for identity theft.
Phishing email will typically direct the user to visit a website where they are
asked to update personal information,
such as a password, credit card, social security, or bank account numbers, that
the legitimate organization already has.
The website, however, is bogus and will capture and steal any information the u
ser enters on the page
Deceptive phishing - email
Spear phishing -- Click on URL /email attachment
Phishing Calls