Sei sulla pagina 1di 12

Tasks of ZO/RO :---

Branch Profile:- has 2 components - Fixed and Variable


Fixed -- Branch location , Type of premises that is , whether rental/owned , Are
a deatils that is whether located in metro/urban/semi-urban/rural area
Variable -Budgeted business volumes /Actual Performance?income and expenditure d
ata /statistical reports
Inter_Branch Reconciliation :- Branch-Branch reconciliation at the HO .THe ZO/R
O collect trans from branches and trasmit them to HO for furhter processing
Credit Monitoring -- loans and advances monitoring :-
Personnel data Management:- age,transfer detais ..,edu qualifications,posts held
, ..This DB can be analysed for man power requirements ,promotion,carrer plannin
g,transfer

Activities of HO are divided into diff functional areas :---


Personnel Management and Admin Support -- details of employees , payroll
Funds Management -- online info abt the business position(advances and deposi
ts) of branches is available
Investment Portfolio Management
Branch profiles -- Standing Data File (SDF) and Performance Report File (PR
F)
Credit Info System -- consolidates info on borrowal accounts as single entity
,helps in reviewing and renewing borrowal accounts.

Topology - is the way in which the devices are interconnected


2 basic forms of LAN designs that are used in Data Transmission ---
Centralized Control --- Start , Tree and Loop Topologies
Distributed COntrol --- Ring and Bus topologies
Star --- control node is often master , all nodes joined to the master by sepera
te links .It can not handle large traffic ,every tran has to pass thru the centr
al node.
However if one node fails it will not affect the network .
Ring :- devices are connected in a closed loop , info is passed from one node to
other in series .
Data Transmission is possible in one direction only .
The breakdown of any one station on the ring can disable the entire LAN
.
Bus Topology :- all evices on the network are connected to a single continuous
cable .Transmission rom any station travels the length of the bus in both direct
ions and is received by all other stations
Data Transmission in LAN and WAN :--
WAN :-- Telephone trans -2 computers connected thru a telephone line need a mo
dem at each end .these modems convert the digital signals into analogue signals
@transmiting end
and analogue signal @ receiving end
Microwave :---- broard band trans ,A microwave station must be located
with in a direct line of sight of about 25miles of another microwave station
A dish antena directly transmits the signals in microw
ave system to the receiving dish antenna.
Each relay station can catch the data signals,boot and
pass them on to other receiving stations
Satellite Transmission :-- Earth station convert text/data/voice/vide
o info into radio waves and beam them up to a satellite .

LAN:-- LAN uses network adapters to share a common medium ,such as Cable/radio/
light wave
UPS- consists of an inverter and a battery charger with an automatic changeover
of powersuply rom the battery or load.
Provides AC power
Online --- Converts 230 V input into 48 V DC . The battery Charger-CUM-rectifie
r converts this into a 230 V AC
Offline -- battery and inverter are 2 seperate parts for doing their jobs indepe
ndently.
When power is avaailable thru the main power supply .the battery cha
rger is only charging the battery and inverter is on standby .in case of an inte
ruption
in the mains power supply ,the batteries get connected to th
e inventer thru an electronic change-over and the power is supplied to the compu
ter systems

BPR (Business Process Re-engineering ) -- Realign existing business processes wi


th benefits provided by the new technology platform
Specialized Consultancy -- Assist in the design,crystalising requirements and fo
rmulation of implementation of strategies.

EPS (eletronic Payment System)


ATM - utomated Tellet Machines --- Recommended by Dr.c Rangarajan -- setti
ng up of ATMs in India
HWAK (The Intelligent Auto-teller and Netware Management System) -- Payment
System ,ONE STOP autobanking ,anytime full banking service ,HA,customer satisfa
ction
PIN and Accoutn number stored in Magnetic Strip at the Back of ATM.
First reads account no and then allows for PIN and then matches .
Diff Types of Credit Cards:--
Charge Card --- trans accumulated over a period of time are debited to the acco
unt ,It is not debited to the account immediately
If the account has insufficient funds ,the cardholder u
sually has to credit the account within 25-50 days
Debit Card --- Funds are immediately debited to the account
Credit Card :- similar to Charge Cards, the diff is credit has a choice of payin
g only a certain % of the amt debited.The rest can be paid later in EMI
Size: 8.5Cm by 5.5cm .
Member card --
Smart Card:-- A MINI-COMPUTER ON A CARD (IN cHIP) --Stoes 80 times more data th
an the magnetic stripe on exxisting cards
-- it contains memory and sometimes a processor ,communicates
with external world thru contacts on the cards surface
-- ISO 7816 specifies the size,position and utility of the c
ontacts.
Smart card Types --2 --- 1)intelligent memory chip -- pay phones, voting, acces
s control ,identification
2) Micro-processor cards -- with a built-in memory ,pro
cessor and an operating system
Security features defined by ISO 10202 , DES (data Encryption Standard)
Smart card may have multiple PIN's .A smart card stores cash for different types
of trans in diff pockets .
Generally ,each of the pcokets may have a unique PIN.
Dynamic Signaure , Finger print ,voice recognition , Hand geometry , Retinal Pat
tern ,Vein Recognition and Visual Recognition.

Other Electronic CARDS :--


Electronic Purses --- Type of smart card embedded with a computer chip ,provid
es multiple options,such as debit/credit card type payments
these purses can store the various accounts of the user,hi
s address,account branch ,last 30-50 trans,etc.
For banks , there is no risk of a bad payment,For purse
holders,a stolen /lost purse does not amt to any loss
For merchants, accepting payments in this method eli
minates management of cah float or risk of theft.
Bank card --- A debit card (also known as a bank card or check card)
European International, a bank card service provider ,is up
dating its European Payment System network .ex:-
Cheque gurantee,travellers cheques,MT<electronic p
oint of sale...
Electronic Cheque -- During an Electronic fund Trasnfer at the point-of-sales (
EFTPOS) ,the smart card can be used as an electronic cheque.
Electronic Cash -- purchases can be made thru electronic cash ,i.e. funds load
ed into a card. This requires authorisation of PIN.
Corporate Cash Mangement Services -- here smart card act as a secured keys .
Electronic Token --- This smart card has a high storage capacity .
-- If a service is subscribed to and money is paid in ad
vance for the same ,then the money is stored in electronic form in a 'PRE-PAID'
area..
Mobile Banking Restrictions : -- Only CBS implementors would be permitted to pro
vide MBS
Only Indian Rupee Domestic Services shall be pr
ovided.
128-bit encryption
Cheque Truncation :-- The physical instrument will be truncated at some point en
-route to the drawee branch and an electronic image of the cheque would be sent
to the drawee branch along with info lie MICR fiels,
date of presentation,presenting banks etc.
-- is a cheque which is truncated during course of a clearning cycle ,
either by clearing house/ by a bank
whether paying or receiving payment ,immediately on generation
of an electronic image for transmission ,substituting the further phy movement
of the chequq in writing.
Cheque Truncation is done in 2 ways :---
using Magnetic Ink Character Recognition (MICR) data :----
Collecting bank encodes an MICR cheque
Inserts the payee's name and the amt in the MICR line
Captures the entire MICR line electronically
Exchanges the info with other for clearing
The cheques do not move any further
Using Image processing
Scans both sides of the cheque
Stores the image in digital form
Moves the cheque to offsite storage
Uses the image for further processing
Corporate Banking -- International remittances , Opening Letter of Credits ,stop
cheque payments .order cheque books
Desktop Banking -- HSBC provided a service called Hexagon for banking thru deskt
op

Bank transactions are updated in 2 ways :- online and bath updates.


computer update the relevant files so that the data is updated before the
next transaction takes place .
Online updation is needed when ,banks transact in foreign exchange on beh
alf of their clients.
batch updates:---- at EOD , computer operators enter data of the days trans into
the computer .
--- Total cah depostis and withdrawals made during the day
--Tally physical cash in hand with next days opening balance af
ter cash receipts and withdrawals are reconciled with the days opening balance
--- Verify trans against respective vouchers.
-- verify whether advances and fixed deposits are at required l
evel.
Signature storage :---
Process -- process of storing and retriving signatures
Scanner scans the image of specimen signature card
Converts the image to a digital form
stores the digital image and signature details in computer
hard disk.
stores other related details like name,account no,operating
instructions,etc.
verifies,validates and authenticates the details.
Usage -- Instantly recall the signature on the monitor by specifying the a
ccount number .
Verify the signature in detail by rotating and magnifying it.
microfiche
A card or sheet of microfilm capable of accommodating and preserving a considera
ble number of pages, as of printed text, in reduced form

http://www.jaiibcaiibmocktest.com/dc-ppb-32.php
National Financial Switch by Institute for Development and Research in Banking T
echnology
Data Communication Networks and its components :-
----------------------------------------------
Trasmission devices and interface equipment -- electrical signals and bit seq'
s to represesnt numbers and characters ,
When signals transmitted over l
ong distances,there is a possiblity of signals deteriorating .
To overcome this problem,data c
ommunication networks use an interface device called MODEM(modulator de modulato
r)
Transmission Medium -- Terrestril cables
-- Terrestril Wire Pair -- 2 insulated copper wire
s ,upto distance of 100 Meters
-- Coaxial Cable --- inner copper conductor held i
n position by circular spacers --carries digital signals @ very high spped of 50
0 MBPS
-- Optical Fibre -- a very thick glass or plastic
fibres with a beam of light at a rate of 2 GBPS ,not affected by electromagneti
c interference
Microwave systems(very hgh freq radio signals such as t
hose used in telehone/television) ,
Communication Satellite (to link two/more microwave tra
nsmitters/receivers on earth --know as earth stations)
Transmission Processors -- to enhance data communication between 2 points
Message Switches -- used for storing and forwarding
data to a large no of terminal over single communication channel
Receive data from all the termi
nals ,store them in a queue and route them, one at a time ,to the Central Proces
sing Unit (CPU) during Transmission
Distribute messages coming from
the CPU to the appropriate terminals during reception
Multiplexers ---
a device that enables the simultaneous trans
mission of several messages or signals over one communications channel
Combine inputs from 2 /more terminals ,compu
ter ports or other multiplxers and transmit the combined data stream over a sing
le high -speed channel
Front End Processors ---
a small computer that receives data
from input devices and performs some initial processing tasks
on it before passing it to a more p
owerful computer for final processing
-- offload communication tasks fro
the host computer
Relay stations Catch and Boosts the signals resulting in connectivity
Ethernet uses adaptor system
MODEM at reciving end demodulates the incoming analogue signals converting these
back to the original digital format.
Modes of Transmission :
------------------------------
SIMPLEX -- data transmitted only one direction . The Sender can not receive a
nd receiver can not send. EX:- Commercial radio broadcast
HALF_DUPLEX --- data transmitted can be transmitted in both the directions ,bu
t in only one direction at a time .
ex:- MODEMS ,on a line
FULL-DUPLEX --- called DUPLEX , in 2 way at atime ex:- Four Wire Duplex modems
used on Telephone lines
NETWORKS :-------
------------------------------------
BANKNET -- RBI commionssioned in 1991 to harness IT for Intra and Inter Bank co
mmunications ,users at banks can access BANKNET thru leased lines with COMET s/w
(computerised Message and FIle Transfer)
is a packet Switched X.25 based Network ,nodes at mumbai,dlehi ,
chennai and kolkata and a switching centre at NAGPUR .
BANG and HYD are connected to Chennai thru remote connection
INET -- Department of Telephones setup in year 1991 ,is x.25 data network b
ased in packet switched public data technology(PSPD)
Typical applications of INET include : electronic mail ,corporate c
omm,info retrieval ,DB Service,remote login , credit card verification and EFT
NICNET -- is india largest WAN .it was setup by National Informatics Centre
(NIC)
BANKs use NICNET for e-mail Services
NICNET's Master Earth Station is installed in New Delhi and operat
es from around 650 VSAT terminals.
Presently ,it allows access to about 50 Networks in more than 30
countries thru leased lines as well dial-up connectivity
INDONET -- was setup by CMC ltd in 1980s /built on X.25 protocal for flexibil
ity in hetrogenous hardware connectivity
INDONET provides a gateway to INET for wider geographical spread
in india and connectivity to other international networks
including Telenet,Tymnet of USA ,Telepack of singapore and
Datex of germany
RBI Net -- BI Net comm S/w .It allows messaging and FT on the existing BANKN
ET infra with the help of servers installed at the 4 metros
Use of RBI's VSAT network and internet are two emerging trends that are increasi
ngly playing an imp role in changing the delivery systems for the banking sector
.
RBI's VSAT network was setup based on recommendations of SARAF Committe .
This network is called INFINET ( Indian Financial Network)
It uses satellite comm with VERY SMALL APERTURE TERMINALS(VSATs)
as earth stations.
VSATs Provide comm channels of HIGH Quality .
Applications of VSATs that RBI has listed for banks include :------
- Reporting to RBI , EFT , settlement of Securties , Anywhere/Anytime B
anking , Inter-branch reconciliation or transfers like DD/TT/MT
ETF :-
==================
The use of MICR technology for processing of Cheques paved the way for the intro
duction of ETF System
1954 -- committe on mechanism of cheque handling , constituted by American Bank
ers Association
1968 -- Setting up of SPECIAL COMMITTE ON PAPERLESS ENTRIES (SCOPE) in USA to e
xamine the concept of an AUTOMATED CLEARING HOUSE (ACH)
1970 --start of First ACH in 1972 , intro of systems such as POS and Society f
or Worldwide Inter Bank Financial Telecommunication (SWIFT)
start use of networked system and ATM
Final Develpment :-- Intro of private card systems such as 'VISA CARD' which emp
loyes an alternative payment system
SWIFT (society for World Wide Inter-bank Financial Telecommunication) --founded
in 1973 by 239 banks from 15 countries .
It provides a unified international processing and transmission system for th
e banking industry.
it has helped in standardising and automating the international payments me
ssaging.
Features -- SWIFT is a system ,operational thru out the year 24 hours a day
Assumes financial liability for the accuracy and timely delivery of
all validated messages from the point they enter the network to the point they l
eave the network.
uses about 400 diff standardised formats for message transmission
Ensures that info is confidential and is prtected against unauthorised di
sclosure and teampering.
Ensures that trasmission of the messages to any part of the world i
s almost immediate.
Message Types :-- SWIFT developed standard message formats to handle various bus
iness areas including customer transfers and cheques ,
finacial institution transfers ..
Security :--
Automated Clearning Systems :-----------------------------
CHIPS , CHAPS and CHATS are networked systems that banks in USA ,UK and Hongkong
use respectively.
These system are used for eletronic transfer of funds .Lets learn about some asp
ects of these systems.
CHIPS -- Clearning House Inter-Bank Payments system , 1970,run by NEW YORK Cl
earning House .
Carries out most of international fund transfer , used for trans su
ch as foreign and domestic trade services,internation loans, fx ,sales/purchase
Has direct interface with SWIFT system
CHAPS -- Clearning House Automated Payment System , UK , has a network that pr
otects high value payments and messages by passing them thru encruption and auth
entication tech
Has a format that has been devised from SWIFT .
CHATS -- Clearing House Automated Transfer System ,Hong kong ,provides instan
t online, same day inter bank settlement and enquiry facilities.
used authentication adn encryption teh to ensure integrity of m
essages travelling over a network.
SOME MORE FUNDS TRANSFER SYSTEMS :------
FEDWIRE :-- since 1956 ,is the main FTS in USA ,has 800 member banks linked tog
ether over computer-based telecommunication networks for transmission of funds a
nd statements.
X.25 protocal based packet switched network and has a large no of a
lternative routes for transmission of messages
Primarily used for transferring reserve account balances of deposit
ory insti/govt securites...
BANKWIRE :-- is the pioneer private sector electronic telecommunication network
, owned by an association of banks in USA
Has started providing a clearning facility known as 'CASHWIRE
' that also provides the settlement facility .
thru TELEX Network support message formats
POS SYSTEM :-- is synonymous with the EFT POS system
can handle records of sales ,inventory ,accounting entries

ELECTRONIC CLEARING SYSTEM in INDIA (ECS)


--- intro by RBI as a special variant of the EFT system.
ECS is a combination of electronic credit/debit/floppy input clearing .
ELECTRONIC CREDIT CLEARNING : single debit and multiple credits ;details of traa
ns are furnished on magnetic media for processing;
banks receive credit data on magnetic med
ia duly encrypted.
was launched by RBI in 1995 to provide an alter
native to bulk payment trans passing thru the clearing houses.
ELECTRONIC DEBIT CLEARING :-- Multiple debit and single credits ,
FLOPPY INPUT CLEARING :- is amode of electronic clearning intro by RBI 1995 for
clearing house managed by it , requires participating banks to submit their inte
r-bank claim stmts in electronic format on floppies.
NEFT : - NATIONAL ELECTRONIC FUND TRANSFER SYSTEM :-- facilitates nation wide fu
nds transfer , amt is inclusiv of the paisa component
--- Customer
-- Sending Bank -- prepares a 'STRUCTURED FINANCIAL MESSAGING SYSTEM'(
SFMS) on receiving the NEFT appliccation for Funds transfer.
-- Sending Service Centre -- receives and trasmits the NEFT SFMS to n
ext layer
-- NEFT Clearnning Centre -- validation ,National clearning Cell (NCC
)of RBI @ Free PRess House , Nariman point , Mumbai
-- Receiving Service Centre -- may alternatively use the 'Straight th
ru processing interface(STPI) available in SFMS to give credit
-- Beneficiary Branch
There is no limit on NEFT at tranfer .
min 0/1 rupee and max limit - 10 lakhs
As per RBI norms, NEFT transfers of up to Rs 10,000 attract Rs 2.5 fee.
From Rs 10,000-1 lakh the fee is Rs 5; on Rs 1-2 lakh it is Rs
15,
and beyond Rs 2 lakh it is Rs 25.
Service tax is charged in addition to this.
NEFT is an electronic fund transfer system that operates on a Deferred Net Settl
ement (DNS) basis which settles transactions in batches.
In DNS, the settlement takes place with all transactions re
ceived till the particular cut-off time
NEFT operates in hourly batches. Currently there are twelve settlements from 8 a
m to 7 pm on week days. From July 10 -2017 RBI proposed additional 11 =23 ( hal
f hourly Settlements)
Therefore, the beneficiary can expect to get the cr
edit for the transactions
put through between 8 am to 5 pm on weekdays
on the same day. For transactions settled in the 6 and 7 pm batches on week days
,
the credit will be afforded either on the same day or
on the next working day.
RTGS and Digital Signatures :-
--------------------------------
Real-time gross settlement - USED INFINET and SFMS
min 2 lakhs and max 10lakhs for retail .
'real time' means payment transaction is not subjected to any waiting period.
'Gross settlement' means the transaction is settled on one to one basis without
bunching with any other transaction
Amount above Rs 2 lakh upto Rs 5 lakh - Rs 25 + Service Tax
Amount above Rs 5 lakh upto Rs 10 lakh - Rs 50 + Service Tax
If the funds are not credited to the beneficiary's account for any reason like a
ccount does not exist, account frozen etc.,
the funds will be returned to the originating bank within one hour or before the
end of the RTGS Business day, whichever is earlier
Digital Signatures:------
Public-private key pair .
A Digital signature is created by a signer using the Private Key.
A digital signature is verified by a relying party using public key
ROLE Of Technology Upgradation and its impact on Banks :-
---------------------------------------------------------
Data Warehousing : store data from hetrogeneous source to generate critical info
for decision support systems.
-- Subject-Oriented -- in bank , this can be customer d
ata
-- Integrated -- data is consistent
-- Non-Volatile -- Data is not updated and is usually a
ccessed in mass.
-- Time Variant --
Data Mining :--- automatically finds patterns and relations in large databases a
nd reveals the hidden strategic info
, businesses can learn more about their customers and develop more effective mar
keting strategies as well as increase sales and decrease costs.
Application of DW and DM --- loan risk analysis , credit risk analysis , custome
r demographic data analysis ,porfolio analysis
Demography :-- the study of statistics such as births, deaths, income, or the in
cidence of disease,
which illustrate the changing structure of human populations
What is an 'Annuity'
An annuity is a contractual financial product sold by financial institutions
that is designed to accept and grow funds from an individual and then,
upon annuitization, pay out a stream of payments to the individual at a late
r point in time.
The period of time when an annuity is being funded and before payouts begin is r
eferred to as the accumulation phase.
Once payments commence, the contract is in the annuitization phase.
Annuitization is the process of converting an annuity investment into a series o
f periodic income payments.

ELECTRONIC DATA INTERCHANGE :-


------------------------------
Computers process inter-organisational exchange of business documentation thru
Electronic Data Interchange (EDI) .
EDI follows EDIFACT -- ELECTRONIC DATA INTERCHANGE FOR ADMINISTRATION OF COMME
RCE and TRANSPORT standards and guidelines .
Banks use EDI in the form of SWIFT messages .
TATA Communications Provides Gateway for Electronic Data Interchange Services (G
EDIS) Worldwide.
----------- EDI formatting Standards -- the documents that can be communicated e
lectronically
-- the info to be included in each electro
nic doc
-- the sequence in which the info shd fo
llow.
-- the meaning of individual pieces of
info.
------------ Communication Standards /guidelines -- electronic envelope to be us
ed .
-- transmission speed and the
protocols on which the messages are to be sent
-- time slot during the day
which are accpetable for sending and receiving the messages.

A bank creates a Website to reach its customers most effectively


In Computer based information system , monitoring of customers trans helps in de
terminig detailed profiles and finacial requirements
Universal set of standards for EDI is know as EDIFACT
Prohibition on Collecting data on individuals racial origin , political philosop
hy , religious views , sex life etc.
Banks use 2 types of MIS : Computer based information systems and Decission supp
ort systems
Technology upgradation plays its part in data and message transferring , corpora
te websites and MIS
Impact of IT on Human Resource :- Resistance , Specialised Personnel , Special
Manpower Policy
Role transition , training needs

SECURITY
====================================
Risk -Prone Components :-- Data and Software -- improper decision making , Fraud
and Breach of Confidentiality
Infra --- and
people ware --- (stagnation in knowledge and skill levels o
f people,high turn over of people due to improper alignent of tasks with capabil
ties).
Types of Threats --- Accidental and Malicious(evil-intensioned) Damages
Accidental :-- Environmental Hazards - fire, unstabilised power ,spikes in p
ower, Excessive humidity ,floods,radio transmissions that affect data transmissi
ons
Human Errors --- data entry, systems design ,
Unreliable systems -- IT
Malicious Damage :- Interrupted Service :--malfunction of online,realtime pro
cessing system
Frauds :- unathorised changes ,removal and manipulation
of files
IMPACT of RISKS :--
-----------------
Incorrrect decision-making
Interruption of operations
Violations of privacy
Finacial loss
Mis-Utilisation of assets
Control Mechanisms
-- preventive Controls
-- Detective COntrol
Controls can be physical , internal and operational
Physical -- Control over access to assets using PIN/identification
Control over outputs -- preserving hard copies ,making them avai
lable to authorised persons only.
Control over physical damage
Control over source code to avoid any tampering to the code.
Internal Controls :-- ensure accuracy and reliability of accounting data
Operational Controls :-- ensures data integrity and consistency (embeded in
Software)
--- Different types of operational controls include data encryption, audit trail
s and checksum
-- Data Encryption --Message Authentication Code help to identify changes t
o message in transit.
-- Audit trail -- is chronological record of all events occurring in a syst
em,record traces irregularities ,detects errors and helps to monitor the system.
two types of AUDIT ttrails -- Accounting and operational
Accounting Audit Trail :- record of processes that update data and in
fo
Operation Auti Trail - record of attempted or actual consumption of r
esources within a system
-- Checksum - is a number calculated on the basis of certain key data items
of a computer file .usually involves acc no , bal, names of acct holders
Computer AUDIT :--
-------------------------
3 main approaches to Computer Auditing :--
Around the Computer -- internal control system of a comp installation and input/
putput of the application system.
Through the computer -- logic and controls existing with in system and Records
produced by the system
with the computer -- Computer Aided Audit Tools and Techniques(CAATTs) is one o
f the more efficient ways to audit
computer-generated files,records and documents and evaluat
e internal controls
Information System Audit :-
-------------------------
IS Audit is carried out thru the IT Systems using Computer Aided Audit Tools a
nd Techniques .
Banks are cooperating to form shared payment network,multi-application cards,e-b
anking and so on.
All this possible only if there is a very reliable and secure information syst
em.
Threats to IS :-- E-mail virus ,worms ,phishing attacks ,Hacking info , defacing
of websites and denial of service.
Objectives of IS Security :- An IS Security policy shd have the following object
ives :
Confidentiality :Protection of the stored information
Integrity : Prevention of accidental or unauthorised alteration of informati
on
Availability : restriction of access to info to authorised personnel only
Ways to Deal with IS Threats : installing firewalls ,organisations can use proxy
servers so that there is no communication between internet and the system
Controls for IS Security : --User ID and Password ,Authorisation , Alternate aut
hentication control ,biometric
DR planning process -- Awareness, Testing , Preparation And Recovery
Phishing is the act of sending an email to a user falsely claiming to be an esta
blished legitimate enterprise in an attempt
to scam the user into surrendering private information that will be
used for identity theft.
Phishing email will typically direct the user to visit a website where they are
asked to update personal information,
such as a password, credit card, social security, or bank account numbers, that
the legitimate organization already has.
The website, however, is bogus and will capture and steal any information the u
ser enters on the page
Deceptive phishing - email
Spear phishing -- Click on URL /email attachment
Phishing Calls

Potrebbero piacerti anche