Information System Banker
Information System Banker
Certificate Examination in
Information System Banker
( IIBF & Other Exams)
SYLLABUS
a) Technology in Banks
Management.
Tools.
iii) Standards - ISO, CMM, CoBIT, RBI guidelines.
d) Continuity of Business
i) Difference between CoB, BCP and
DRP.
ii) CoB Plan, policy and procedures.
Analysis.
review.
Execution of Core banking system across all branches helps to speed up most of
the common transactions of bank and customer. In Core banking, the all branches
access banking applications from centralized server which is hosted in secured
Data Centre. Banking software/application performs basic operations like
maintaining transactions, balance of withdrawal & payment, interest calculations on
deposits & loans etc. This banking applications are deployed on centralized server
& can be accessed using internet from any location.
Nowadays, the use of Information Technology (IT) is must for the survival & growth
of any organization and same applicable to banking industry also. By using IT in any
industry, banks can minimize the operation cost; also banks can offer products &
services to customers at competitive rates.
CBS is required;
To improve & simplify banking processes so that bank staff can focus on
sales & marketing stuff.
Convenience to customer as well as
bank. To speed up the banking
transactions.
Internet
Banking
Mobile
Banking ATM
Quicker services at the bank counters for routine transactions like cash
deposits, withdrawal, passbooks, statement of accounts, demand drafts etc.
CBS is very helpful to people living in rural areas. The farmers can receive e-
payments towards subsidy etc. in his account directly. Transfer of funds from
the cities to the villages and vice versa will be done easily.
B. Benefits for Banks
To cope up with the growing needs of customers; RRBs and Co-operative banks
were needed to implement core banking solutions. To face the challenges of
dynamic market, UCBs needed to take help of IT their operations. Considering the
importance of the matter, the Reserve Bank of India (RBI) mandated a deadline for
Urban Co-operative Banks (UCBs) and advised to implement the core banking
solutions (CBS) by December 31, 2013, which has been met by all RRBs and
UCBs.
Introduction With the globalization trends world over it is difficult for any nation big
or small, developed or developing, to remain isolated from what is happening
around. For a country like India, which is one of the most promising emerging
markets, such isolation is nearly impossible. More particularly in the area of
Information technology, where India has definitely an edge over its competitors,
remaining away or uniformity of the world trends is untenable. Financial sector in
general and banking industry in particular is the largest spender and beneficiary
from information technology. This endeavours to relate the international trends in it
with the Indian banking industry. The last lot includes possibly all foreign banks and
newly established Private sector banks, which have fully computerized all the
operations. With these variations in the level of information technology in Indian
banks, it is useful to take account of the trends in Information technology
internationally as also to see the comparative position with Indian banks. The
present article starts with the banks perception when they get into IT up gradation.
All the trends in IT sector are then discussed to see their relevance to the status of
Indian banks. IT Considerations Since the early nineties, each Indian bank has
done some IT improvement effort. The first and foremost compulsion is the fierce
competition. While deciding on the required architecture for the IT consideration is
given to following realities. (1.) Meeting Internal Requirement: The requirements of
the banks are different individually depending upon their nature and volume of
business; focus on a particular segment, spread of branches and a like. Many a
time’s banks do have the required information but it is scattered. The operating units
seldom know the purpose of gathering the information by their higher authorities.
(2.) Effective in Data Handling: As stated earlier the banks have most of the needed
data but are distributed. Further the cost of collection of data and putting the same
to use is prohibitively high. The accuracy and timeliness of data generation
becomes the causalities in the process. Best of the intentions on computerization
are wished away because there is non-visible reduction in cost /efforts/time required
for the required data gathering.
(3.) Extending Customer Services: Addressing to rising customers expectations is
significant particularly in the background of increased competition. In case bank A is
unable to provide the required service at a competitive price and in an accurate
manner with speed.
There is always a bank IT at its next-door waiting to hire the customer. Awareness
of customers about the availability of services and their pricing as also available
options have brought into sharp focus the issue of customer satisfaction. (4.)
Creative Support for New Product Development: It has become necessary for the
banks to vitalize the process of product development. Marketing functionaries
needs a lot of information not only from the outside sources but also from within the
banks. Banks are looking to retail segment as the future market places for sales
efforts. Having full-fledged information of existing customer is the key for this
purpose. The emergences of data requirement and an appropriate architecture to
support the same are significant issues to be handled in this regard. (5.) End-user
Development of the Non-technical Staff: Banking being a service industry, it is the
staffs at counters that deliver the products. In Indian scenario, virtual banking is
likely to have a few more years to establish. The dependence on counter staff is
unavoidable. The staffs are large in number and the majority is non-technical. The
customer satisfaction levels at the counter determine the ultimate benefit of IT
offensive. Giving due consideration to this aspect in choosing architecture in
necessary. Trends in Information Technology Certain trends have been visualized of
information technology in banking sector all over the world. (1.) Outsourcing:
Outsourcing is one of the most talked about as also a controversial issue. The
drivers for getting in to outsourcing are many to include gaps in IT expectations and
the reality, demystification of computerization in general and IT in particulars, trend
towards focusing on core competencies, increased legitimacy of outsourcing and
intention of getting out of worries and sort of up gradation of hardware and software
versions. Not that the practice is new as earlier it was refused to as ‘buying time’ or
‘service bureau’. What is needed is the clear of outsourcing, beside a definite plan
to be more competitive after outsourcing. It is necessary to have checks and
balances to monitor vendor performance. Cost aspects merit consideration, as also
a decision on the part of the process to be outsourced shall be significance. Exit
route and resource on the amount of failure after outsourcing are the other issue to
be looked onto. Not withstanding these risks, outsourcing has come to say. (2.)
Integration: One of the IT trend is moving from hierarchy to team approach. The
purpose is to see an alternative to retooling, to react speedily and to develop
capabilities rather than exploiting them. Such integration is necessary so as to
address to prevalent situations:
(a) Functions needing data and not getting from others
(b) Sending data to those who do not want to require them. (c) Global data exist but
do not travel to required business functions. Indian banks seem to follow this trend
through the sincere redesign as described earlier. Instead of vertically divided
pyramid type organizational set-ups, banks are now being to have separate group
like finance, international consumer banking, industrial/commercial credit etc. (3.)
From Solo to Partnership: With the development of IT, two things are taking place
simultaneously. The work force as a percentage of total staff is going down and
spending on IT as percentage of total spending is going up. The forms of
partnership can include binding by superior service, accommodation in service
sharing network, equal partnership and situations, where survival is threatened. At
times, the partnership becomes necessary to get out of areas where there is no
competitive advantage. Low development cost or wider geographical coverage is
the aspects that create such partnership. Instances are not frequent, where joint
ventures have been found with the IT vendors. (4.) Distinctive Edge: It is always
said that many use but a few make use of IT. Historically, the emphasis is on using
IT for large volumes like payrolls, balancing the books, the consolidation etc. That
realization on having IT as matter of competitive edge has come about very lately. It
is recognized that customer service is not an easy thing to provide, but IT is used as
a mean. It does give value additions and erases barriers for competitors to enter.
Banks understand that the cost of cultivating the new customer is 5 to 6 times of
retaining the old one. Customer normally switches banks due to poor service. The
appreciation of these facts has compelled the banks world over to look upon IT as
an instrument to create distinctive edge over competitors. The private sector banks
that were established in 1990’s as a part of finance sector reforms did make good of
IT to have an edge over the others. The foreign banks operating in India have also
been able to market IT superiority as a distinctive edge. The public sector banks are
still to make use of IT in this regard, although they are blessed with huge
information base all across the country. While steps are mooted in this direction by
leading public sector banks, more offensive postures are necessary.
(5.) IT as Profit Centre: In the embryonic phases, IT was looked upon a means to
get rid of high processing cost and time and to convert the manual operation with
high volume/low complexity in two mechanical ones. With the evolutionary the
process, it was seen as the best means of generating, MIS. The same approach
gave the status of DSS to IT. All along, IT has been recognized as the service
function in Indian Banks. However, the new trend that is emerging is considering IT
as a profit centre. The cost benefit analysis of having IT or otherwise in one part.
But having IT set up to generate income for the organization is the new beginning.
Getting jobs from outside the bank for processing data and the like are the current
trends. The outsourcing done by others is the business, cater to by these
organizations the trend of this kind is not deserved in Indian situation particularly
banks. The Banks have been
able to just manage what is to consider as their responsibility as IT, within the
individual banks. (6.) Prospering in Down Market: The trend suggests that when
there is a down turn in the market place, Pro-active corporations take the benefit
of available unutilized resources to upgrade and revisit technology issues. This is
seen as the right time to establish the R & D centre for IT. There are false notions
about technology and its capability. Some misconceptions include: Best-fit
possible technology is implemented.
System solution is good enough and there is need to look into user expectations.
Measures and standards i.e. audit and inspection issues stand in the way of
innovation.
The time available to debate on similar issues is ample and these false notions get
clarified during the down market. Eventually, the decision makers reach a
consensus that IT is not a panacea but it is an enabler that too when well supported
by BRP (Business Process Re-engineering), human resources initiatives, physical
infrastructure and responsive organization set up. (7.) Leading to Downsizing: The
IT initiative is making the organization lean and flat. For IT functionaries downsizing
means transferring computing power from mainframe to the personal computer and
workstations. Downsizing is a typical issue faced with associated problems.
Absence of top management commitment, lack of understanding of the prevalent IT
infrastructure, doing too much and too fast and undertaking the exercise without a
framework for controlling the downsizing operations are primarily the situations that
create adversities in downsizing. In any case the trend of downsizing is very much
existent in the IT environment. (8.) Getting Competitive Intelligence: IT is now seen
as a resource for gathering and dissemination of executive information system
(EIS). The purpose is to minimize that the bombarding and focusing on the
relevance, accuracy and timeliness of the information particularly about the
competitors such information enhances follow up and tracks early warning on
competitor move and also customer expectations.
As far as Indian banks are concerned individually, they have to compete with other
banking industry participants as also with other players in the financial sector. The
competition from for insurance and government notes and saving, mutual funds and
the like is always
It can have access to the distant database, which may be a newspaper of foreign
country.
We can exchange our ideas through Internet. We can make contact with anyone
who is a linked with internet.
Internet is a fast developing net and is of utmost important for public sector
undertaking, Education
Institutions, Research Organization etc. (2.) Society for Worldwide Inter-bank
Financial
Telecommunications (SWIFT): SWIFT, as a co-operative society was formed in May
1973 with 239 participating banks from 15 countries with its headquarters at
Brussels. It started functioning in May 1977. RBI and 27 other public sector banks
as well as 8 foreign banks in India have obtained the membership of the SWIFT.
SWIFT provides have rapid, secure, reliable and cost effective mode of transmitting
the financial messages worldwide. At present more than 3000 banks are the
members of the network. To cater to the growth in messages, SWIFT was upgrade
in the 80s and this version is called SWIFT-II. Banks in India are hooked to SWIFT-
II system. SWIFT is a method of the sophisticated message transmission of
international repute. This is highly cost effective, reliable and safe means of fund
transfer.
This network also facilitates the transfer of messages relating to fixed deposit,
interest payment, debit-credit statements, foreign exchange etc.
It serves almost all financial institution and selected range of other users.
It is clear from the above benefit of SWIFT that it is very beneficial in effective
customer service.
SWIFT has extended its range to users like brokers, trust and other agents. (3.)
Automated Teller Machine (ATM): ATM is an electronic machine, which is operated
by the customer himself to make deposits, withdrawals and other financial
transactions. ATM is a step in improvement in customer service. ATM facility is
available to the customer 24 hours a day. The customer is issued an ATM card. This
is a plastic card, which bears the customer’s name. This card is magnetically coded
and can be read by this machine. Each cardholder is provided with a secret personal
identification number (PIN).
When the customer wants to use the card, he has to insert his plastic card in the
slot of the machine.
After the card is a recognized by the machine, the customer enters his personal
identification number. After establishing the authentication of the customers, the
ATM follows the customer to enter the amount to be withdrawn by him. After
processing that transaction and finding sufficient balances in his account, the output
slot of ATM give the required cash to him. When the transaction is completed, the
ATM ejects the customer’s card. (4.) Cash Dispensers: Cash withdrawal is the basic
service rendered by the bank branches. The cash payment is made by the cashier
or teller of the cash dispenses is an alternate to time saving. The operations by this
machine are cheaper than manual operations and this machine is cheaper and fast
than that of ATM. The customer is provided with a plastic card, which is
magnetically coated. After completing the formalities, the machine allows the
machine the transactions for required amount. (5.) Electronic Clearing Service: In
1994, RBI appointed a committee to review the mechanization in the banks and
also to review the electronic clearing service. The committee recommended in its
report that electronic clearing service-credit clearing facility should be made
available to all corporate bodies/Government institutions for making repetitive low
value payment like dividend, interest, refund, salary, pension or commission, it was
also recommended by the committee Electronic Clearing Service-Debit clearing
may be introduced for pre-authorized debits for payments of utility bills, insurance
premium and instalments to leasing and financing companies. RBI has been
necessary step to introduce these schemes, initially in Chennai, Mumbai, Calcutta
and New Delhi. (6.) Bank net: Bank net is a first national level network in India,
which was commissioned in February 1991. It is communication network
established by RBI on the basis of recommendation of the committee appointed by
it under the chairmanship of the executive director T.N.A. Lyre. Bank net has two
phases: Bank net-I and Bank net- II.
(7.) Chip Card: The customer of the bank is provided with a special type of credit
card which bears customer’s name, code etc. The credit amount of the customer
account is written on the card with magnetic methods. The computer can read these
magnetic spots. When the customer uses this card, the credit amount written on the
card starts decreasing. After use of number of times, at one stage, the balance
becomes nil on the card. At that juncture, the card is of no use. The customer has to
deposit cash in his account for re-use of the card. Again the credit amount is written
on the card by magnetic means. (8.) Phone Banking: Customers can now dial up
the bank’s designed telephone number and he by dialling his ID number will be able
to get connectivity to bank’s designated computer. The software provided in the
machine interactive with the computer asking him to dial the code number of service
required by him and suitably answers him. By using Automatic voice recorder (AVR)
for simple queries and transactions and manned phone terminals for complicated
queries and transactions, the customer can actually do entire non-cash relating
banking on telephone: Anywhere, Anytime. (9.) Tele-banking: Tele banking is
another innovation, which provided the facility of 24 hour banking to the customer.
Tele-banking is based on the voice processing facility available on bank computers.
The caller usually a customer calls the bank anytime and can enquire balance in his
account or other transaction history. In this system, the computers at bank are
connected to a telephone link with the help of a modem. Voice processing facility
provided in the software. This software identifies the voice of caller and provides
him suitable reply. Some banks also use telephonic answering machine but this is
limited to some brief functions. This is only telephone answering system and now
Tele-banking. Tele banking is becoming popular since queries at ATM’s are now
becoming too long
(10.) Internet Banking: Internet banking enables a customer to do banking
transactions through the bank’s website on the Internet. It is a system of accessing
accounts and general information on bank products and services through a
computer while sitting in its office or home. This is also called virtual banking. It is
more or less bringing the bank to your computer. In traditional banking one has to
approach the branch in person, to withdraw cash or deposit a cheque or request a
statement of accounts etc. but internet banking has changed the way of banking.
Now one can operate all these type of transactions on his computer through
website of bank. All such transactions are encrypted; using sophisticated multi-
layered security architecture, including firewalls and filters. One can be rest assured
that one’s transactions are secure and confidential. (11.) Mobile Banking: Mobile
banking facility is an extension of internet banking. The bank is in association with
the cellular service providers offers this service. For this service, mobile phone
should either be SMS or WAP enabled. These facilities are available even to those
customers with only credit card accounts with the bank. (12.) Any where Banking:
With expansion of technology, it is now possible to obtain financial details from the
bank from remote locations. Basic transaction can be effected from faraway places.
Automated Teller Machines are playing an important role in providing remote
services to the customers. Withdrawals from other stations have been possible due
to inter-station connectivity of ATM’s. The Rangarajan committee had also
suggested the installation of ATM at non-branch locations, airports, hotels, Railway
stations, Office Computers, Remote Banking is being further extended to the
customer’s office and home. (13.) Voice Mail: Talking of answering systems, there
are several banks mainly foreign banks now offering very advanced touch tone
telephone answering service which route the customer call directly to the
department concerned and allow the customer to leave a message for the
concerned desk or department, if the person is not available. Challenges Ahead
Important Business Challenges:
Meet customer expectations on service and facility offered by the bank.
Customer retention.
Retaining the current market share in the industry and the improving the same.
(2.) Single Window System (3.) Revised Account opening from for capturing
complete customer/Account data as per CBS requirement. (4.) Call centre for
customers
Overview of IT operations
Introduction:
For banks in which information technology (IT) systems are used to manage
information, IT Operations should support processing and storage of information,
such that the required information is available in a timely, reliable, secure and
resilient manner.
IT Service Management
Infrastructure Management
Bank’s Board of Directors has ultimate responsibility for oversight over effective
functioning of IT operational functions. Senior management should ensure the
implementation of a safe IT Operation environment. Policies and procedures
defined as a part of IT Operations should support bank’s goals and objectives, as
well as statutory requirements.
Core IT Operations
The Board or Senior Management should take into consideration the risk
associated with existing and planned IT operations and the risk tolerance and then
establish and monitor policies for risk management.
Organisational Structure:
IT Operations include business services that are available to internal or external
customers using IT as a service delivery component–such as mobile or internet
banking. IT Operations include components that are used to support IT Operations:
service desk application, ticketing and event management tools, etc. Banks may
consider including Test and Quality Assurance Environment (besides, Production
Environment) within the scope of IT Operations.
Service Desk: The service desk is the primary point of contact (Single Point
of Contact or
SPOC) for internal and external customers. Besides handling incidents
and problems, it also provides interface to other IT operation processes, such
as Request For Change (RFC), Request Fulfillment, Configuration
Management, Service Level Management and Availability Management, etc.
It can have the following functions:
Identifying problems
Follow the Sun i.e. in time zones such that service desk is available for
assistance and recording of incidents round the clock
IT Operations Management
Console Management
Job Scheduling
Application Management:
It documents skill sets available within an organisation and skills that need to
be developed to manage application management as function
It defines standards to be adapted when defining new application
architecture and involvement in design and build of new services
Financial application
Infrastructure applications
Function-specific applications
Infrastructure Management
It is the function primarily responsible for providing technical expertise and overall
management of the IT infrastructure. Its primary objective is to assist in plan,
implement and maintenance of a stable technical infrastructure in order to support
an organisation’s business processes.
Infrastructure Management can have following functions:
Internet team
Messaging team
While identifying the risks, a risk assessment process should quantify the probability
of a threat and vulnerability, and the financial consequences of such an event.
Banks should also consider the interdependencies between risk elements, as
threats and vulnerabilities have the potential to quickly compromise inter-connected
and inter-dependent systems and processes.
Banks should implement a cost-effective and risk-focused environment. The risk
control environment should provide guidance, accountability and enforceability,
while mitigating risks.
Risk Mitigation: Once the organisation has identified, analyzed and categorized
the risks, organisation should define following attributes for each risk
component:
Probability of Occurrence;
Financial Impact;
Reputational Impact;
Regulatory Compliance
Impact;
Legal Impact.
Beside above specified attributes, an organisation should also consider these:
Lost revenues
Loss of market share
Litigation probability
Reconstruction expenses
These, along with the business process involved, should be used to prioritise risk
mitigation actions and control framework.
IT Operations Processes
IT Strategy
IT Strategy processes provide guidelines that can be used by the banks to design,
develop, and implement IT Operation not only as an organisational capability but as
a strategic asset.
Assists in decision-making
Speed of changes
Operational control
Service Valuation
It is the mechanism that can be considered by banks to quantify services, which are
available to customers (internal or external) and supported by IT operations in
financial terms. It assists IT Operation functions to showcase the involvement of
function in supporting the bank's core business.
Compliance costs
Portfolio Management
Every service, which is a part of service portfolio, should include a business case,
which is a model of what a service is expected to achieve. It is the justification for
pursuing a course of action to meet stated organisational goals. Business case links
back to service strategy and funding. It is the assessment of a service management
in terms of potential benefits and the resources and capabilities required to
provision and maintain the service. Portfolio Management framework defined by the
banks should highlight controls, which are defined to develop an IT Service from
conceptual phase to go- live phase and then to transition to production environment.
During the development of IT services financial impact of the new service on IT
Operation should also be ascertained which will assist IT Operations in Service
Validation.
Demand Management
Ii) Design
The design phase of the IT operations provides the guidelines and processes,
which can be used by the banks to manage the change in the business landscape.
Components which should be considered when designing a new IT service or
making a change to the existing IT service are:
Business Processes
IT Services
Service-level
Agreements IT
Infrastructure
IT Environment
Information Data
Applications
Support Services
Support Teams
Suppliers
Service design: This should not consider components in isolation, but must also
consider the relationship between each of the components and their
dependencies on any other component or service.
Design phase: Provides a set of processes and guidelines that can be used by
banks to design IT services, supported by IT operations, that satisfies
business objectives, compliance requirements and risk and security
requirements. The processes also provide guidelines to identify and
manage risks and to design secure and resilient IT services.
Over the years, banks' IT infrastructure has grown and developed. In order to
establish an accurate IT landscape, it is recommended that an IT Service
Catalogue is defined, produced and maintained. It can be considered as a
repository that provides information on all IT services supported by IT Operations
framework.
Definition of Service
Service Criticality
Service Owner
Service-level Manager
business processes they enable and the level and quality of service the customer
can expect from each service. Banks can also consider incorporating “charge back
mechanism”, as defined in financial management into the service catalogue.
This process defines the framework that can be used by banks to plan, co-ordinate
and draft, agree, monitor and report service attributes used to measure the service
quality. Its framework also includes guidelines for ongoing review of service
achievements to ensure that the required and cost-justifiable service quality is
maintained and improved. Beside current services and SLAs, this management
provides guidelines to ensure that new requirements are captured. That new or
changed services and SLAs are developed to match the business needs and
expectations.
Define, document, agree, monitor, measure, report and review the level of IT
services
Service based SLA: Its structure covers attributes for single service across
an organisation. For instance, SLA for internet banking service
Customer based SLA: The structure covers attributes for all services for a
defined set of customers. For instance, SLA for SMEs customers
Multi-Level SLA: Multi-level SLA
structure can be defined as per the organizational hierarchy. For instance, SLA for
Attributes that are included in SLAs should be ones which can effectively be
monitored and measured. Attributes which are included in the SLAs can be
categorised into operational, response, availability and security attributes. Service
Level Management framework should also define guidelines for reviews of Service
Level Agreements, Operational Level Agreements, and underpinning contracts to
ensure that they are aligned to business needs and strategy. These should ensure
that services covered, and targets for each, are relevant. And that nothing
significant is changed that invalidates the agreement in any way. Service Level
Management framework defined should also have guidelines defined for logging
and management, including escalation of complaints and compliments.
Capacity Management
The process provides the framework and guidelines that can be adapted by banks
to ensure that cost-justifiable IT capacity exists and matches to current- and future-
agreed business requirements as identified in Service Level Agreement.
Produce and maintain capacity plan that reflects the current and future business
requirements
Availability Management
Produce and maintain an appropriate up-to-date Availability Plan that reflects the
current and future needs of the business
New services where Service Level Requirement and Agreement have been
established
Aspects of IT's services and components that may impact availability, which may
include training, skills, process effectiveness, procedures and tools
Availability Management process has two key elements:
Mean Time Between Service Incidents (MTBSI): MTBSI refers to how long a
service; component or CI can perform its agreed function without interruption.
MTBSI =-------------------------------------
Number of Breaks
Mean Time Between Failures (MTBF): MTBF refers to how long a service;
component or CI can perform its agreed function without reporting a failure.
Number of breaks
Mean Time Between Failures (MTBF): is the mean time between the recovery
from one incident and occurrence of the next incident, it is also known as
uptime. This metric relates to the reliability of the IT Service supported by IT
Operations.
Mean Time to Repair (MTTR): MTTR refers to how quickly and effectively a
service, component or CI can be restored to normal working after failure.
MTTR =-----------------------------------
Number of breaks
Mean Time to Repair (MTTR): This is the average time between occurrence of a
fault and service recovery. It is also known as downtime. This metric relates to
the recoverability and serviceability of the IT Services supported by IT
Operations.
Vital Business Functions
When defining availability targets for a business service, banks should consider
identifying Vital Business Function (VBF). VBF represents critical business
elements of a process supported by IT services. For example, an ATM will have
following business functions:
Cash dispensing
Statement printing.
Out of these three, cash dispensing and reconciliation should be considered as vital
business functions, influencing the availability design and associated costs.
Supplier Management
Evaluate service capabilities and risk profile of new or changes service before it
is released into production environment
Evaluate and maintain integrity of all identified service assets and configuration
items required to support the service
Identify, control, record, audit and verify service assets and configuration items,
including service baseline version controls their attributes and relationships.
Manage and protect integrity of service assets and configuration items through
the service lifecycle by ensuring only authorised assets are used and only
authorised changes are made.
Service asset management manages assets across its lifecycle from acquisition
through disposal. Implementation of Service Asset and Configuration Management
framework has cost and resources implications and therefore strategic discussions
needs to be made about the priorities to be addressed. For instance banks can
decide on initially focusing on the basic IT assets (hardware and software) and the
services and assets that are business critical or covered by legal regulatory
compliance.
configuration, the item may vary widely in complexity, size and type. It can
range from an entire service or system to a single software module or a
minor software component.
If desired, banks can define a hierarchical structure for configuration items. For
instance banks can define Core Banking as a configuration item which can have
different application as a subset Configuration Item of the Core Banking
configuration item. Each configuration item can have modules as sub set which
can have two configuration item, these being hosting and application support.
Hosting can then be further sub-divided into configuration item that can be
servers, operating systems, databases, network components.
Definitive Media Library: Definitive media library (DML) is a secure library that
may be used to store definitive authorised versions of all media CIs. It stores
master copies of versions that have passed quality assurance checks.
Risks
Change authorization
Business Continuity
Change impact
iv) Operations
Event Management
Event Management process provides the guidelines which can be used by the
banks to define the framework for monitoring all the relevant events that occurs
through the IT
infrastructure. It provides the entry point for the execution of many Service
Operations processes and activities.
Event can be defined as any detectable or discernible occurrence that has
significance forthe management of the IT infrastructure, or delivery of IT services.
Event Managementframework when defined will have two
mechanisms for monitoring, these are:
Configuration Items
Environment conditions
Security breaches
Warning: Events signifying diversion from normal course of action, for instance a
user attempting to login with incorrect password. Exceptional events will require
further investigation to determine an environment which may have led to an
exception
Exceptions: Events, which are unusual. Events may require closer monitoring. In
some case the condition will resolve itself. For instance, unusual combinations of
workloads as they are completed, normal operations will restore. In other cases,
operations intervention will be required if the situation is repeated
Incident Management
Problem Management
Problem Management process includes activities required to carry out the root
causes of incidents and to determine the resolution to these underlying problems.
Problem management procedures also include implementation of the resolution
through Change
Access Management
1 The Payment and Settlement Systems Act 2007, set up by the RBI, provides for
the regulation and supervision of payment systems in India and designates the
apex institution (RBI) as the authority for that purpose and all related matters. To
exercise its powers and perform its functions and discharge its duties, the RBI is
authorized under the Act to constitute a committee of its central board, which is
known as the Board for Regulation and Supervision of Payment and Settlement
Systems (BPSS). The Act also provides the legal basis for ‘netting’ and ‘settlement
finality’.
The PSS Act, 2007 received the assent of the President on 20th December 2007
and came into force with effect from 12th August 2008
The PSS Act, 2007 provides for the regulation and supervision of payment systems
in India and designates the Reserve Bank of India (Reserve Bank) as the authority
for that purpose and all related matters. The Reserve Bank is authorized under the
Act to constitute a Committee of its Central Board known as the Board for
Regulation and Supervision of Payment and Settlement Systems (BPSS), to
exercise its powers and perform its functions and discharge its duties under this
statute. The Act also provides the legal basis for “netting” and “settlement finality”.
This is of great importance, as in India, other than the Real Time Gross Settlement
(RTGS) system all other payment systems function on a net settlement basis.
Under the PSS Act, 2007, two Regulations have been made by the Reserve Bank
of India, namely, the Board for Regulation and Supervision of Payment and
Settlement Systems Regulations, 2008 and the Payment and Settlement Systems
Regulations, 2008. Both these Regulations came into force along with the PSS Act,
2007 on 12th August 2008
2. The Board for Regulation and Supervision of Payment and Settlement Systems
Regulation, 2008 deals with the constitution of the Board for Regulation and
Supervision of Payment and Settlement Systems (BPSS), a Committee of the
Central Board of Directors of the Reserve Bank of India. It also deals with the
composition of the BPSS, its powers and functions, exercising of powers on behalf
of BPSS, meetings of the BPSS and quorum, the constitution of
Sub-Committees/Advisory Committees by BPSS, etc. The BPSS exercises the
powers on behalf of the Reserve Bank, for regulation and supervision of the
payment and settlement systems under the PSS Act, 2007.
The Payment and Settlement Systems Regulations, 2008 covers matters like form
of application for authorization for commencing/ carrying on a payment system and
grant of authorization, payment instructions and determination of standards of
payment systems, furnishing of returns/documents/other information, furnishing of
accounts and balance sheets by system provider etc
3. India has multiple payments and settlement systems, both gross and net
settlement systems. For gross settlement India has a Real Time Gross Settlement
(RTGS) system called by the same name and net settlement systems include
Electronic Clearing Services (ECS Credit), Electronic Clearing Services (ECS
Debit), credit cards, debit cards, the National Electronic Fund Transfer (NEFT)
system and Immediate Payment Service.
The Reserve Bank of India is doing its best to encourage alternative methods of
payments which will bring security and efficiency to the payments system and make
the whole process easier for banks.
The Indian banking sector has been growing successfully, innovating and trying to
adopt and implement electronic payments to enhance the banking system. Though
the Indian payment systems have always been dominated by paper-based
transactions, e-payments are not far behind. Ever since the introduction of e-
payments in India, the banking sector has witnessed growth like never before.
According to a survey by celent, the ratio of e-payments to paper based
transactions has considerably increased between 2004 and 2008. This has
happened as a result of advances in technology and increasing consumer
awareness of the ease and efficiency of internet and mobile transactions.[2]
In the case of India, the RBI has played a pivotal role in facilitating e-payments by
making it compulsory for banks to route high value transactions through Real Time
Gross Settlement (RTGS) and also by introducing NEFT (National Electronic Funds
Transfer) and NECS (National Electronic Clearing Services) which has encouraged
individuals and businesses to switch ia is clearly one of the fastest growing
countries for payment cards in the Asia-Pacific region. Behavioral patterns of Indian
customers are also likely to be influenced by their internet accessibility and usage,
which currently is about 32 million PC users, 68% of whom have access to the net.
However these statistical indications are far from the reality where customers still
prefer to pay "in line" rather than online, with 63% payments still being made in
cash. E-payments have to be continuously promoted showing consumers the
various routes through which they can make these payments like ATM’s, the
internet, mobile phones and drop boxes.
Due to the efforts of the RBI and the (BPSS) now over 75% of all transaction
volume are in the electronic mode, including both large-value and retail payments.
Out of this 75%, 98% come from the RTGS (large-value payments) whereas a
meager 2% come from retail payments. This means consumers have not yet
accepted this as a regular means of paying their bills and still prefer conventional
methods. Retail payments if made via electronic modes are done by ECS (debit and
credit), EFT and card payments.[2]
Known as many-to-one or "debit-pull" facility this method is used mainly for small
value payments from consumers/ individuals to big organizations or companies. It
eliminates the need for paper and instead makes the payment through
banks/corporates or government departments. It facilitates individual payments like
telephone bills, electricity bills, online and card payments and insurance payments.
Though easy this method lacks popularity because of lack of consumer awareness.
As mentioned above India is one of the fastest growing countries in the plastic
money segment. Already there are 130 million cards in circulation, which is likely to
increase at a very fast pace due to rampant consumerism. India’s card market has
been recording a growth rate of 30% in the last 5 years. Card payments form an
integral part of e-payments in India because customers make many payments on
their card-paying their bills, transferring funds and shopping.
Ever since Debit cards entered India, in 1998 they have been growing in number
and today they consist of nearly 3/4th of the total number of cards in circulation.
Credit cards have shown a relatively slower growth even though they entered the
market one decade before debit cards. Only in the last 5 years has there been an
impressive growth in the number of credit cards- by 74.3% between 2004 and 2008.
It is expected to grow at a rate of about 60% considering levels of employment and
disposable income. Majority of credit card purchases come from expenses on
jewellery, dining and shopping.
Another recent innovation in the field of plastic money is co branded credit cards,
which combine many services into one card-where banks and other retail stores,
airlines, telecom companies enter into business partnerships. This increases the
utility of these cards and hence they are used not only in ATM’s but also at Point of
sale (POS) terminals and while making payments on the net.
The acronym 'RTGS' stands for real time gross settlement. The Reserve Bank of
India (India's Central Bank) maintains this payment network. Real Time Gross
Settlement is a funds transfer mechanism where transfer of money takes place from
one bank to another on a 'real time' and on 'gross' basis. This is the fastest possible
money transfer system through the banking channel. Settlement in 'real time'
means payment transaction is not subjected to any waiting period. The transactions
are settled as soon as they are processed. 'Gross settlement' means the
transaction is settled on one to one basis without bunching with any other
transaction. Considering that money transfer takes place in the books of the
Reserve Bank of India, the payment is taken as final and irrevocable.
Fees for RTGS vary from bank to bank. RBI has prescribed upper limit for the fees
which can be charged by all banks both for NEFT and RTGS. Both the remitting and
receiving must have core banking in place to enter into RTGS transactions. Core
Banking enabled banks and branches are assigned an Indian Financial System
Code (IFSC) for RTGS and NEFT purposes. This is an eleven digit alphanumeric
code and unique to each branch of bank. The first four letters indicate the identity of
the bank and remaining seven numerals indicate a single branch. This code is
provided on the cheque books, which are required for transactions along with
recipient's account number.
RTGS is a large value (minimum value of transaction should be ₹2,00,000) funds
transfer system whereby financial intermediaries can settle interbank transfers for
their own account as well as for their customers. The system effects final settlement
of interbank funds transfers on a continuous, transaction-by-transaction basis
throughout the processing day. Customers can access the RTGS facility between 9
am to 4:30 pm (Interbank up to 6:30 pm) on weekdays and 9 am to 2:00 pm
(Interbank up to 3:00 pm) on Saturdays. However, the timings that the banks follow
may vary depending on the bank branch. Time Varying Charges has been
introduced w.e.f. 1 October 2011 by RBI. The basic purpose of RTGS is to facilitate
the transactions which need immediate access for the completion of the transaction.
Banks could use balances maintained under the cash reserve ratio (CRR) and the
intra-day liquidity (IDL) to be supplied by the central bank, for meeting any
eventuality arising out of the real time gross settlement (RTGS). The RBI fixed the
IDL limit for banks to three times their net owned fund (NOF).
The IDL will be charged at ₹25 per transaction entered into by the bank on the
RTGS platform. The marketable securities and treasury bills will have to be placed
as collateral with a margin of five per cent. However, the apex bank will also impose
severe penalties if the IDL is not paid back at the end of the day.
The RTGS service window for customer's transactions is available from 8:00 hours
to 19:00 hours on week days and from 8:00 hours to 13:00 hours on Saturdays.
No Transaction on weekly holidays and public holidays.
Service Charge for RTGS
a) Inward transaction– no charge to be levied.
b) Outward transactions –
- For transactions of ₹2 lakhs to ₹5 lakhs -up to ₹25 per transaction plus
applicable Time Varying Charges (₹1/- to ₹5/-); total not exceeding ₹30 per
transaction, (+ GST).
- Above ₹5 lakhs - ₹50 per transaction plus applicable Time Varying Charges
(₹1/- to ₹5/-); total charges not exceeding ₹55 per transaction, (+ GST).
No time varying charges are applicable for RTGS transactions settled up to 1300
hrs.
In their effort to enable customers to make payments the electronic way banks have
developed many channels of payments viz. the internet, mobiles, ATM’s (Automated
Teller Machines) and drop boxes.
The internet as a channel of payment is one of the most popular especially among
the youth. Debit and credit payments are made by customers on various bank’s
websites for small purchases,(retail payments) and retail transfers( ATM transfers).
ATM’s serve many other purposes, apart from functioning as terminals for
withdrawals and balance inquiries, such as payment of bills through ATM’s,
applications for cheques books and loans can also be made via ATM’s.
Banks also provide telephone and mobile banking facilities. Through call agents
payments can be made and as the number of telephone and mobile subscribers are
expected to rise, so is this channel of payment expected to gain popularity.
Drop boxes provide a solution to those who have no access to the internet or to a
telephone or mobile. These drop-boxes are kept in the premises of banks and the
customers can drop their bills along with the bill payment slips in these boxes to be
collected by third party agents[
As the apex financial and regulatory institution in the country it is compulsory for the
RBI to ensure that the payments system in the country is as technologically
advanced as possible and in view of this aim, the RBI has taken several initiatives
to strengthen the e-payments system in India and encourage people to adopt it.
Raghuram Rajan, Ex-Governor, RBI, and Nandan Nilekani, Ex-Chairman, UIDAI
and Advisor, NPCI, and at the launch of Unified Payments Interface (UPI) in
Mumbai.
Imagine paying for everyday purchases directly from your bank, without the need
for carrying cash. The RBI's new interface helps you do just that. Reserve Bank of
India Governor Raghuram Rajan launched the Unified Payments Interface (UPI)
system, as its latest offering in boosting digital money transfers.
The interface has been developed by National Payments Corporation of India
(NPCI), the umbrella organisation for all retail payments in the country. The UPI
seeks to make money transfers easy, quick and hassle free.
• The Payment and Settlement Systems Act, 2007 was a major step in this
direction. It enables the RBI to "regulate, supervise and lay down policies
involving payment and settlement space in India." Apart from some basic
instructions to banks as to the personal and confidential nature of customer
payments, supervising the timely payment and settlement of all transactions, the
RBI has actively encouraged all banks and consumers to embrace e-payments.
• In pursuit of the above-mentioned goal the RBI has granted NBFC’s (Non-
Banking Financial Companies) the permission to issue co branded credit cards
forming partnerships with commercial banks.
• The Kisan Credit Card Scheme was launched by NABARD in order to meet the
credit needs of farmers, so that they can be free of paper money hassles and
use only plastic money.
• A domestic card scheme known as RuPay has recently been started by the
National Payments Corporation of India (NPCI),promoted by RBI and Indian
Banks Association (IBA), inspired by Unionpay in China, which will be promoting
the use of cards ie. "plastic money". Initially functioning as an NPO, Rupay will
focus on potential customers from rural and semi-urban areas of India. Rupay
will have a much wider coverage than Visa, MasterCard or American Express
cards which have always been used for card-based settlements.
• The NREGA (National Rural Employment Guarantee Scheme) introduced by the
Government will ensure rural employment in turn ensuring that the employees
get wages. Each employee will have a smart card functioning as his personal
identification card, driver’s license, credit card which will also function as an
electronic pass book, thus familiarising the rural populations with epayments[2]
However, the Indian banking system suffers from some defects due to certain socio-
cultural factors which hampers the spread of the e-payments culture even though
there are many effective electronic payment channels and systems in place.
Despite the infrastructure being there nearly 63% of all payments are still made in
cash. A relatively small percentage of the population pays their bills electronically
and most of that population is from urban India-the metropolitans. Also in some
cases the transaction is done partially online and partially "offline". The main reason
for this apathy to switch to e-payments comes from lack of awareness of the
customer despite various efforts by the Government.
15. Block Chain Technology : ICICI Bank is the first bank in the country and among
the first few globally to exchange and
authenticate remittance transaction messages as well as original international
trade documents related to purchase order, invoice, shipping & insurance,
among others, electronically on block chain in real time.
The usage of block chain technology simplifies the process and makes it almost
instant—to only a few minutes. Typically, this
process takes a few days. The block chain application co-created by ICICI Bank
replicates the paperintensive international trade
finance process as an electronic de centralised ledger, that gives all the
participating entities including banks the ability to access a single source of
information.
CODE NAME DIGITS
IFSC - Indian Financial System Code 11
MICR -Magnetic Ink Character Recognition 09
SWIFT-Society for worldwide interbank Financial Telecommunication ) 11
PAN- Permanent Account no. 10
UID /UAN – unique Identification Number 12
PIN – Postal Index Number 6
CIN-Cheque Identification Number 7
BIC ( BANK IDENTIFICATION NUMBER) 8
16. PREPAID PAYMENT INSTRUMENTS : Eligibility : Banks who comply with the
eligibility criteria would be permitted to issue all
categories of pre-paid payment instruments. Non-Banking Financial Companies
(NBFCs) and other persons would be permitted to
issue only semi-closed system payment instruments. Capital requirements : Banks
and Non-Banking Financial Companies which
comply with the Capital Adequacy requirements prescribed by Reserve Bank of
India from time-totime, shall be permitted to issue
pre-paid payment instruments. All other persons shall have a minimum paid-up
capital of Rs 100 lakh and positive net owned
funds. Safeguards against money laundering (KYC/AML/CFT) provisions - The
maximum value of any pre-paid payment instruments (where specific limits have not
been prescribed including the amount transferred) shall not exceed Rs 100,000/-.
Deployment of Money collected: Non-bank persons issuing payment instruments
are required to maintain their outstanding balance
in an escrow account with any scheduled commercial bank subject to the
following conditions:- The amount so maintained shall be used only for making
payments to the participating merchant establishments. No interest is payable by
the bank on such balances.
Validity: All pre-paid payment instruments issued in the country shall have a
minimum validity period of six months from the date
of activation/issuance to the holder. The outstanding balance against any
payment instrument shall not be forfeited unless the holder is cautioned at least
15 days in advance as regards the expiry of the validity of the payment
instrument.
17.Money Transfer Service Scheme (MTSS) : The Reserve Bank has issued Master
Directions relating to Money Transfer Service
Scheme (MTSS), which is a quick and easy way of transferring personal
remittances from abroad to beneficiaries in India.
MTSS can be used for inward personal remittances into India, such as,
remittances towards family maintenance and remittances favouring foreign
tourists visiting India and not for outward remittance from India.
The system envisages a tie-up between reputed money transfer companies abroad
known as
Overseas Principals and agents in
India known as Indian Agents who would disburse funds to beneficiaries in India at
ongoing exchange rates. The Indian Agents can
in turn also appoint sub-agents to expand their network. The Indian Agent is not
allowed to remit any amount to the Overseas Principal. Under MTSS, the remitters
and the beneficiaries are individuals only.
The Reserve Bank of India may accord necessary permission (authorisation) to any
person to act as an Indian Agent under the
Money Transfer Service Scheme. No person can handle the business of cross-
border money transfer to India in any capacity unless specifically permitted to do so
by the RBI.
To become MTSS agent, min net owned funds Rs.50 lac. MTSS cap USD 2500 for
individual remittance. Max remittances 30 received by an individual in India in a
calendar year. Min NW of overseas principal USD 01 million, as per latest balance
sheet.
18. IMPS
IFS Code
11 digit alphanumeric number, available in the users Cheque book.
UPI-PIN
UPI-PIN (UPI Personal Identification Number) is a 4-6 digit pass code you
create/set during first time registration with this App .You have to enter this UPI-
PIN to authorize all bank transactions. If you have already set up an UPI-PIN
with other UPI Apps you can use the same on BHIM. (Note: Banks issued MPIN
is different from the UPI UPI-PIN, please generate a new UPI-PIN in the BHIM
app) Note: Please do not share your UPI-PIN with anyone. BHIM does not store
or read your UPI-PIN details and your bank's customer support will never ask
for it.
Payment Address
Payment Address is an Address which uniquely identifies a person's bank a/c.
For instance, the Payment Address for BHIM customers is in the format
xyz@upi. You can just share your Payment Address with anyone to receive
payments (no need for bank account number/ IFSC code, etc.). You can also
send money to anyone by using their Payment Address. Note: Do not share
your confidential UPI PIN with anyone.
Data Security
In terms of data security, UPI provides for a single click two-factor authorization,
which implies that with one click, the transaction is authenticated at 2 levels,
compliant with the existing regulatory guidelines issued by the Reserve Bank of
India ("RBI"), without disclosing banking or personal information. As UPI
primarily works based on an individual's 'virtual payment address', one can
send and receive payments solely based on their 'virtual payment address'
without providing any additional details. For example if you need to make a
payment to a merchant for purchases made at a store, you will need to provide
him only your 'virtual payment address', the merchant will then enter your
'virtual payment address' into his UPI app, the UPI app will send an
authentication messages to the 'virtual payment address' linked to your mobile
device, once your receive and acknowledge the message by entering your
password will the transaction be completed and the amount payable to the
merchant will be debited from your bank account.
This innovative dynamic QR-code based solution uses the store's existing
credit/debit card POS terminal to enable UPI-based cashless payments.
When a customer requests UPI Payment mode, the cashier simply needs to
select the 'UPI Payment' option on his existing card POS terminal and inputs
the relevant bill payment amount.
Benefits:
By enabling such a UPI payment confirmation on the merchant POS terminal itself,
the new in-store UPI interface addresses a long standing implementation hurdle
holding back faster spread of UPIacceptance in large multi-lane retail stores.
With multiple checkout points, the cashiers in these stores have no direct means of
payment receipt prior to releasing the purchased goods to the customer. This is
unlike a small single cashier store where such a confirmation could be received via
a simple text message to the single cashier's own mobile phone.
This process offers convenience besides eliminating the cumbersome and error-
prone process of typing out credentials.
4. Can I link more than one bank account to the same virtual address?
Yes, several bank accounts can be linked to the same virtual address
depending on the functionalities being made available by the respective
PSPs.If the selected Bank name to link with UPI does not find your bank a/c,
please ensure that the mobile number linked to your bank account is same
as the one verified in BHIM App. If it is not the same, your bank accounts will
not be fetched by the UPI platform. Only Savings and Current bank accounts
are supported by BHIM.
5. What are the different channels for transferring funds using UPI?
The different channels for transferring funds using UPI are:
Transfer through Virtual ID
Account Number + IFSC
Mobile Number + MMID
Aadhaar Number
Collect / Pull money basis Virtual ID
Bharat Interface for Money (BHIM) is an app that lets you make simple, easy and
quick payment transactions. BHIM is a digital payments solution app based on the
Unified Payments Interface (UPI) from the National Payments Corporation of India
(NPCI), the umbrella organisation for all retail payments systems in India. You can
easily make direct bank to bank payments instantly and collect money using just
Mobile number or Payment address.
BHIM being UPI-based, is linked directly to a bank account. All the payee needs is a
bank account. If this account is UPI activated, you can just ask for the payee’s
Virtual Payment Address (VPA), and make the payment to that account.Otherwise,
there’s the option of IFSC or MMID for sending or receiving money. The advantage
is there’s no need to remember an account number, or to share it with anyone. The
VPA is all that is needed.
If you have signed up for UPI-based payments on your bank account, which is also
linked to your mobile phone number, you’ll be able to use the BHIM app to carry out
digital transactions. Services available are as follows:
1. Send Money: User can send money using a Virtual Payment Address (VPA),
Account Number & IFSC, Aadhaar Number or QR code.
2. Request Money: User can collect money by entering Virtual Payment Address
(VPA). Additionally through BHIM App, one can also transfer money using
Mobile No. (Mobile No should be registered with BHIM or *99# and account
should be linked)
3. Scan & Pay: User can pay by scanning the QR code through Scan & Pay &
generate your QR option is also present.
4. Transactions: User can check transaction history and also pending UPI collect
requests (if any) and approve or reject. User can also raise complaint for the
declined transactions by clicking on Report issue in transactions.
5. Profile: User can view the static QR code and Payment addresses created or
also share the QR code through various messenger applications like
WhatsApp, Email etc. available on phone and download the QR code.
6. Bank Account: User can see the bank account linked with his/her BHIM App
and set/change the UPI PIN. User can also change the bank account linked
with BHIM App by clicking Change account provided in Menu and can also
check Balance of his/her linked Bank Account by clicking “REQUEST
BALANCE”
8. Block User: Block/Spam users who are sending you collect requests from
illicit sources.
9. Privacy: Allow a user to disable and enable mobilenumber@upi in the profile if
a secondary VPA is created (QR for the disabled VPA is also disabled).
•QR code based scan & pay option available, Generate your own QR code
option is also available
• Option to save your beneficiaries for future references
• Access transaction history and Request Balance anytime
• Create, reset or change UPI PIN
• Report Issue and call Bank facilities are given to lodge complaints
• FAQ section is created in the app to answer all the queries reg. BHIM
• Available in 2 languages English and Hindi
Benefits of BHIM:
• Single App for sending and receiving money and making merchant payments
• Go cashless anywhere anytime
• Added security of Single click 2 factor authentication
• Seamless money collection through single identifiers, reduced risks, real time
• Mobile no. or Name used to create VIRTUAL PAYMENT ADDRESS (VPA)
• Best answer to Cash on Delivery hassle
• Send and collect using VIRTUAL PAYMENT ADDRESS (VPA) or A/c no &
IFSC.
• Payments through single app in your favourite language. 24X7, 365 days
instantaneous money transfer
Transfer Limits:
Cheque truncation means stopping the flow of the physical cheques issued by a
drawer to the drawee branch. The physical instrument is truncated at some point
en-route to the drawee branch and an electronic image of the cheque is sent to the
drawee branch along with the relevant information like the MICR fields, date of
presentation, presenting banks etc. This would eliminate the need to move the
physical instruments across branches, except in exceptional circumstances,
resulting in an effective reduction in the time required for payment of cheques, the
associated cost of transit and delays in processing, etc., thus speeding up the
process of collection or realization of cheques.
CTS has been implemented in New Delhi, Chennai and Mumbai with effect from
February 1, 2008, September 24, 2011 and April 27, 2013 respectively. After
migration of the entire cheque volume from MICR system to CTS, the traditional
MICR-based cheque processing has been discontinued across the country. The
CTS-2010 compliant cheques are both image friendly and have enhanced security
features. All banks providing cheque facility to their customers have been advised to
issue only 'CTS2010' standard cheques. Cheques not complying with CTS-2010
standards would be cleared at less frequent intervals i.e. weekly once from
November 1, 2014 onwards.
Banks derive multiple benefits through the implementation of CTS, like a faster
clearing cycle meaning technically possible realization of proceeds of a cheque
within the same day. It offers better reconciliation/ verification, better customer
service and enhanced customer window. Operational efficiency provides a direct
boost to bottom lines of banks as clearing of local cheques is a high cost low
revenue activity. Besides, it reduces operational risk by securing the transmission
route. Centralized image archival systems ensure that data storage and retrieval is
easy. Reduction of manual tasks leads to reduction of errors. Real-time tracking and
visibility of the cheques, less frauds with secured transfer of images to the RBI are
other benefits that banks derive from this solution
There has been a dramatic surge in the volume and value of mobile transactions in
the recent past.
MoM increase in no. of transactions from Dec14 to Dec 15 was 135% and Dec 15
to Dec 16 was 182%. MoM increase in value of transactions from Dec 14 to Dec 15
was 330% and Dec 15 to Dec 16 was 178%.
The future:
In the backdrop of demonetization- a colloquial term for the withdrawal of 86
percent of the value of India’s currency in circulation by the Government of India
since 8th November 2016 followed by digital push for ‘less cash’ economy, a
dramatic multi-fold rise in e-banking transactions and especially mobile banking
transactions, is expected in the near future.
Interactive Technology for Banks
With the launch of sbiINTOUCH on 1st July, 2014, State Bank of India was the first
Bank in India to introduce the concept of "Digital Banking". State of the art
technology like Debit Card Printing Kiosks, Interactive Smart Tables, Interactive
Digital Screens, Remote Experts through video call etc were introduced to providing
a completely different experience through online self-service mode. The key feature
of these branches is that one can open one’s savings bank account - Account
Opening Kiosk (AOK) within 15 minutes. Besides that you can have access to a
vast array of Banking related activities and products.
India's first banking robot Lakshmi made her debut in November 2016 by City Union
Bank, the artificial intelligence powered robot will be the first on-site bank helper.
Lakshmi, which took more than six months to develop, can answer intelligently on
more than 125 subjects. Top private lender HDFC
Bank, which is also experimenting with robots to answer customer queries, is
testing its humanoid at its innovation lab.
ANATOMY OF A COMPUTER
The internal design of computers differs from one model to another. But the basic
components of computer remain the same for all models. To function properly, a
computer needs both hardware and software. Hardware consists of the mechanical
and electronic devices which we can see and touch. Key Board, Monitor, DVD are
some examples for Computer Hardware. The software consists of programs, the
operating systems and the data that reside in the memory and storage devices.
JAVA, Microsoft Office, Open Office are some examples for Computer Software.
a) Input/ Output Unit: Computer is a machine that processes the input data
according to a given set of instructions and gives the output. The unit used for
getting the data and instructions into the computer and displaying or printing output
is known as input/ output unit. Keyboard is the main input device while the monitor
is the main output device.
b) Central Processing Unit: Central processing Unit (CPU) is the main component
or ‘brain’ of the computer which performs all the processing of input data. In micro
computers, the CPU is built on a single chip or Integrated Circuit (IC) and is called
Microprocessor. The CPU consists of the following distinct parts:
i. Arithmetic Logic Unit (ALU)
ii. Control Unit (CU)
iii. Registers iv. Buses v. Clock
(i)Arithmetic Logic Unit: The arithmetic logic unit is responsible for all arithmetic
operations like addition, subtraction, multiplication and divisions as well as logical
operations such as less than, equal to and greater than.
Control Unit: The control unit is responsible for controlling the transfer of data
(ii)
and instructions among other units of a computer. It is considered as the ‘Central
Nervous System’ of computer as it manages and coordinates all the units of the
computer. It obtains the instructions from the memory, interprets them and directs
the operation of the computer.
(iii) Registers: Registers are small high speed circuits which are used to store data,
instructions and memory addresses, when ALU performs arithmetic and logical
operations. Depending on the processor’s capability, the number and type of
registers vary from one CPU to another.
(iv) Buses: Data is stored as a unit of eight bits in a register. Each bit is transferred
from one register to another by means of a separate wire. This group of eight wires
which is used as a common way to transfer data between registers is known as a
bus. Bus is a connection between two components to transmit signal between them.
Bus is of three major types namely data bus, control bus and address bus.
(v) Clock: Clock is an important component of CPU which measures and allocates a
fixed time slot for processing each and every micro-operation. CPU executes the
instructions in synchronization with the clock pulse. The clock speed of CPU is
measured in terms of Mega Hertz or millions of cycles per second. The clock speed
of CPU varies from one model to another.
c) Memory Unit: Memory unit is used to store the data, instructions and information
before, during and after the processing by ALU. It is actually a work area (physically
a collection of integrated circuits) within the computer where the CPU stores the
data and instructions. Memory is of two types:
(i) Read Only Memory: Read Only Memory is an essential component of the
memory unit. The memory which has essential instructions is known as Read Only
Memory. This memory is permanent and is not erased when the system is switched
off. The memory capacity of ROM varies from 64 KB to 256 KB depending on the
model of computer.
(ii) Random Access Memory: Random Access Memory is used to store data and
instructions during the execution of programs. Contrary to ROM, RAM is temporary
and is erased when the computer is switched off. RAM is a read/ write type of
memory and thus can be read and written by the user. As it is possible to randomly
use any location of this memory, it is known as random access memory. The
memory capacity of RAM varies from 640 KB to several mega bytes with different
models of computer.
Hardware and software are two broad categories of computer components.
Hardware refers to physical component while software to the programs required to
operate computers.
Today, magnetic storage is one of the most common types of storage used with
computers and is the technology that many computer hard drives use. Examples
are Floppy diskette, Hard drive,Magnetic strip, SuperDisk, Tape cassette and Zip
diskette.
Another common storage is optical storage, which uses lasers and lights as its
method of reading and writing data. Examples are Blu-ray disc, CD-ROM disc, CD-
R and CD-RW disc, DVD-R,DVD+R, DVD-RW and DVD+RW disc.
Storing data online and in cloud storage is becoming popular as people need to
access their data from more than one device. Examples are Cloud storage and
Network media such as NAS (Network Attached Storage) & SAN (Storage Area
Network).
Paper storage
Early computers had no method of using any of the above technologies for storing
information and had to rely on paper. Today, these forms of storage are rarely used
or found. In the picture to the right is an example of a woman entering data to a
punch card using a punch card machine. Examples are OMR and Punch Card.
Most of the storage device examples mentioned are no longer used with today's
computers which primarily use a hard disk drive or SSD to store information and
have the options for USB flash drives and access to cloud storage. Desktop
computers with disc drives typically use a disc drive that is capable of reading CD's
and DVD's and writing CD-R and other recordable discs.
For most computers, the largest storage device is the hard drive or SSD. However,
networked computers may also have access to even larger storage with large tape
drives, cloudcomputing, NAS or SAN storage devices. Below is a list of storage
devices from the smallest capacity to the largest capacity.
Introduction to Software
System Software
Now, we know that software is the language in which the user can interact with the
computer. The basic interaction of the user with the computer is through input
devices (you have already learnt different input devices in earlier chapter). For
example if you use a key board to input, there are only some key strokes going into
the computer, with which we would like to get the task done. This is possible when
there is an interface which converts our inputs to be meaningful to the system,
which is called system software. System software is a collection of programmes
or commands designed to operate, control, and extend the processing capabilities
of the computer. Examples of system software are Operating system,
Compilers, Interpreter, and Assemblers.
One needs to have a thorough knowledge about the grammar which the system
can understand. The syntax and semantics are very important. The system software
is found to be bit tough and complex for a common man and is dealt with by
technically qualified persons.
Systems software are further subdivided into operating systems and utilities. The
operating system is the program that actually makes the computer operates.
Utilities are programs which either improves the functioning of the operating system
or supply missing or additional functionality.
An Operating System (OS) is system software that manages computer hardware
and software resources and provides common services for computer programs. The
operating system is a component of the system software in a computer system.
Application programs usually require an operating system for them to function.
Examples include: Microsoft Windows (XP, Vista, or 7), any flavor of Linux, and Mac
OS X (An apple version of UNIX).
Utilities are programs that manage, repair, and optimize data on a computer. A basic
set of utilities is provided with every OS.
Application Software
Application software does the specific things you want the computer to do, whereas
the Operating System gives general instructions to the computer for controlling the
hardware.
Table below gives the list of different type application software, brand and functions:
Application Brand Name Function
Word Open Office.org writer Create, store, format and edit documents, letters and
Processor articles. Word processors are used where the
Libre Office writer emphasis is on manipulation of text.
Microsoft Word
Spreadsheet Open Office.org Calc Create financial statements, balance sheets, perform
statistical and numerical analysis of data and make
Libre office Calc forecasts based on numeric data. Spreadsheets are
Microsoft Excel used where the emphasis is on arithmetic.
Microsoft ACCESS
Web Browser Mozilla Surf the Internet and view web sites.
Chrome
Netscape
Internet Explorer
Desktop Page Maker DTP is similar to word processing except that there is
Publishing more emphasis on page layout and the integration of
(DTP) Microsoft Publisher diagrams.
Graphics and Adobe Photoshop Create and manipulate graphics images and store
Imaging images in a variety of formats.
GIMP
Proprietary Software
Pro
The term "open source" refers to something that can be modified and shared
because its design is publicly accessible. Open source software is software whose
source code is available for modification or enhancement by anyone. Open source
software is different. Its authors make its source code available to others who would
like to view that code, copy it, learn from it, alter it, or share it. Libre Office and the
GNU Image Manipulation Program are examples of open source software. As they
do with proprietary software, users must accept the terms of a license when they
use open source software—but the legal terms of open source licenses differ
dramatically from those of proprietary licenses. Open source software licenses
promote collaboration and sharing because they allow other people to make
modifications to source code and incorporate those changes into their own projects.
Some open source licenses ensure that anyone who alters and then shares a
program with others must also share that program's source code without charging a
licensing fee for it.
LANGUAGES OF COMPUTER
1. TCL/Tk
2. Visual basic
3. Visual C++
4. C# (Pronounced as C sharp)
5. Visual basic.NET
6. Visual basic 2005
Relational software uses the concept of database normalization and the constraints
of primary and foreign keys to establish relationships between rows of data in
different database tables. That eliminates the need to redundantly store related data
in multiple tables, which reduces data storage requirements, streamlines database
maintenance and enables faster querying of databases. Normalization is a concept
that applies to relational databases only.
Another notable difference between DBMS and RDBMS architectures, leaving the
latter category out of the broad DBMS classification, is relational technology's
support for referential integrity and other integrity checks designed to help keep
data accurate and prevent inconsistent information from being entered in database
tables. That's part of an adherence to the ACID properties -- atomicity, consistency,
isolation and durability -- for ensuring that database transactions are processed in a
reliable way. That isn't necessarily the case with other DBMS types -- for example,
many NoSQL databases guarantee a more limited form of ACID compliance, called
eventual consistency.
While these RDBMS concepts and features provide reliable, stable and relatively
robust processing of structured transaction data, relational technology does have
some limitations -- in particular, its requirement that databases include a rigid
schema that's difficult for DBAs to modify on the fly. That has helped create an
opening for NoSQL software and, to a greater extent, file-based Hadoopclusters in
big data environments, although relational databases are still at the center of most
IT architectures.
Atomicity: Atomicity requires that each transaction be "all or nothing": if one part of
thetransaction fails, then the entire transaction fails, and the database state is left
unchanged. An atomic system must guarantee atomicity in each and every situation,
including power failures, errors and crashes. To the outside world, a committed
transaction appears (by its effects on the database) to be indivisible ("atomic"), and
an aborted transaction does not happen.
Consistency: The consistency property ensures that any transaction will bring the
database fromone valid state to another. Any data written to the database must be
valid according to all defined rules including constraints, cascades, triggers, and any
combination thereof. This does not guarantee correctness of the transaction in all
ways the application programmer might have wanted
(that is the responsibility of application-level code), but merely that any
programming errors cannot result in the violation of any defined rules.
Durability: The durability property ensures that once a transaction has been
committed, it willremain so, even in the event of power loss, crashes, or errors. In a
relational database, for instance, once a group of SQL statements execute, the
results need to be stored permanently (even if the database crashes immediately
thereafter). To defend against power loss, transactions (or their effects) must be
recorded in a non-volatile memory.
and end users or application programs, ensuring that data is consistently organized
The DBMS manages three important things: the data, the database engine that
allows data to be accessed, locked and modified -- and the database schema,
which defines the database’s logical structure. These three foundational elements
The DBMS is perhaps most useful for providing a centralized view of data that can
DBMS can limit what data the end user sees, as well as how that end user can view
the data, providing many views of a single database schema. End users and
software programs are free from having to understand where the data is physically
located or on what type of storage media it resides because the DBMS handles all
requests.
The DBMS can offer both logical and physical data independence. That means it
can protect users and applications from needing to know where data is stored or
(API) for the database that is provided by the DBMS, developers won't have to
modify programs just because changes have been made to the database.
NoSQL DBMS - well-suited for loosely defined data structures that may evolve over
time.
Advantages of a DBMS
Using a DBMS to store and manage data comes with advantages, but also
overhead. One of the biggest advantages of using a DBMS is that it lets end users
and application programmers access and use the same data while managing data
integrity. Data is better protected and maintained when it can be shared using a
DBMS instead of creating new iterations of the same data stored in new files for
every new application. The DBMS provides a central store of data that can be
• Data security
• The ability to swiftly recover from crashes and errors, including restartability
and recoverability
organization on the data. A DBMS delivers economy of scale for processing large
what data the user sees and how that user sees the data. The DBMS provides a
level of abstraction between the conceptual schema that defines the logical
structure of the database and the physical schema that describes the files, indexes
and other physical mechanisms used by the database. When a DBMS is used,
systems can be modified much more easily when business requirements change.
New categories of data can be added to the database without disrupting the existing
system and applications can be insulated from how data is structured and stored.
thereby bringing with it the overhead. A DBMS will use more memory and CPU than
a simple file storage system. And, of course, different types of DBMSes will require
and capabilities that enable IT teams and others to create, update, administer and
Structured Query Language (SQL) to access the database, although SQL was
invented after the initial development of the relational model and is not necessary
In general, databases store sets of data that can be queried for use in other
related data elements and includes functions that maintain the security, accuracy,
Elements of the relational database management system that overarch the basic
relational database are so intrinsic to operations that it is hard to dissociate the two
in practice.
The most basic RDBMS functions are related to create, read, update and delete
The RDBMS typically provides data dictionaries and metadata collections useful in
and this has come to be defined by data objects that range from binary large object
(blob) strings to stored procedures. Data objects like this extend the scope of basic
RDBMSes.
The most common means of data access for the RDBMS is via SQL. Its main
efforts that pair SQL use with common programming languages, such as COBOL
RDBMSes use complex algorithms that support multiple concurrent user access to
enforces policy-based access, is yet another overlay service that the RDBMS
RDBMSes support the work of database administrators (DBAs) who must manage
and monitor database activity. Utilities help automate data loading and database
backup. RDBMSes manage log files that track system performance based on
RDBMSes provide graphical interfaces that help DBAs visualize database activity.
While not limited solely to the RDBMS, ACID compliance is an attribute of relational
Let’s discuss anomalies first then we will discuss normal forms with examples.
Anomalies in DBMS
There are three types of anomalies that occur when the database is not normalized.
These are – Insertion, update and deletion anomaly. Let’s take an example to
understand this.
employee that has four attributes: emp_id for storing employee’s id, emp_name for
storing employee’s name, emp_address for storing employee’s address and
emp_dept for storing the department details in which the employee works. At some
point of time the table looks like this:
Krish then we have to update the same in two rows or the data will become
inconsistent. If somehow, the correct address gets updated in one department but
not in other then as per the database, Krish would be having two different
Insert anomaly: Suppose a new employee joins the company, who is under training
and currentlynot assigned to any department then we would not be able to insert the
data into the table if emp_dept field doesn’t allow nulls.
Delete anomaly: Suppose, if at a point of time the company closes the department
D890 thendeleting the rows that are having emp_dept as D890 would also delete
the information of employee Malini since she is assigned only to this department.
To overcome these anomalies we need to normalize the data. In the next section
we will discuss normalization.
Normalization
The inventor of the relational model Edgar Codd proposed the theory of
normalization with the introduction of First Normal Form and he continued to extend
theory with Second and Third Normal Form. Later he joined with Raymond F. Boyce
to develop the theory of Boyce-Codd Normal Form (BCNF).
Theory of Data Normalization in SQL is still being developed further. For example
there are discussions even on 6th Normal Form. But in most practical applications
normalizationachieves its best in 3rd Normal Form (3NF). The evolution of
Normalization theories isillustrated below-
We need to understand the basic concepts of primary key, foreign key, candidate
key and super key in a relational database, before we proceed further to understand
the evolution of normal forms.
A Super Key is the combination of fields by which the row is uniquely identified and
the Candidate Key is the minimal Super Key. Basically, a Candidate Key is a Super
Key from which no more Attribute can be pruned. A Super Key identifies uniquely
rows/tuples in a table/relation of a database.
A Primary Key uniquely identify a record in the table. A Foreign Key is a field in the
table that is Primary Key in another table. By default, Primary Key is clustered index
and data in the database table is physically organized in the sequence of clustered
index. We can have only one Primary Key in a table.
•Waterfall Model: This model involves finishing each phase completely before
commencing the next one. When each phase is completed successfully, it is
reviewed to see if the project is on track and whether it is feasible to
continue.
• V-Shaped Model: This model focuses on the execution of processes in a
sequential manner, similar to the waterfall model but with more importance
placed on testing. Testing procedures are written even before the
commencement of writing code. A system plan is generated before starting
the development phase.
• Incremental Model: This life cycle model involves multiple development
cycles. The cycles are divided up into smaller iterations. These iterations can
be easily managed and go through a set of phases including requirements,
design, implementation and testing. A working version of the software is
produced during the first iteration, so working software is created early in the
development process.
Computer Network
Networking Systems
A network consists of two or more computers that are linked in order to share
resources (such as printers and CDs), exchange files, or allow electronic
communications. The computers on a network may be linked through cables,
telephone lines, radio waves, satellites, or infrared light beams.
You may also see references to a Metropolitan Area Networks (MAN), a Wireless
LAN (WLAN), or a Wireless WAN (WWAN).
Workstations are called such because they typically do have a human user which
interacts with the network through them. Workstations were traditionally considered
a desktop, consisting of a computer, keyboard, display, and mouse, or a laptop, with
with integrated keyboard, display, and touchpad. With the advent of the tablet
computer, and the touch screen devices such as iPad and iPhone, our definition of
workstation is quickly evolving to include those devices, because of their ability to
interact with the network and utilize network services.
Nearly always servers will be connected by cables to the network, because the
cable connections remain the fastest. Workstations which are stationary (desktops)
are also usually connected by a cable to the network, although the cost of wireless
adapters has dropped to the point that, when installing workstations in an existing
facility with inadequate wiring, it can be easier and less expensive to use wireless
for a desktop.
See the Topology, Cabling, and Hardware sections of this tutorial for more
information on the configuration of a LAN.
Wide Area Network
Star Topology
A star topology is a design of a network where a central node extends a cable to
each computer on the network. On a star network, computers are connected
independently to the center of the network. If a cable is broken, the other computers
can operate without problems. A star topology requires a lot of cabling.
Bus Topology
A bus topology is another type of design where a single cable connects all
computers and the information intended for the last node on the network must run
through each connected computer. If a cable is broken, all computers connected
down the line cannot reach the network. The benefit of a bus topology is a minimal
use of cabling.
Ring Topology
A similar topology is called a ring. In this design, computers are connected via a
single cable, but the end nodes also are connected to each other. In this design, the
signal circulates through the network until it finds the intended recipient. If a network
node is not configured properly, or it is down temporarily for another reason, the
signal will make a number of attempts to find its destination.
A collapsed ring is a topology where the central node is a network device called a
hub, a router, or a switch. This device runs a ring topology internally and features
plugins for cables. Next, each computer has an independent cable, which plugs into
the device. Most modern offices have a cabling closet, or a space containing a
switch device that connects the network. All computers in the office connect to the
cabling closet and the switch. Even if a network plug is near a desk, the plug is
connected via a cable to the cabling closet.
Network Controls
Network security is an over-arching term that describes that the policies and
procedures implemented by a network administrator to avoid and keep track of
unauthorized access, exploitation, modification, or denial of the network and
network resources.
This means that a well-implemented network security blocks viruses, malware,
hackers, etc. from accessing or altering secure information.
The first layer of network security is enforced through a username/password
mechanism, which only allows access to authenticated users with customized
privileges. When a user is authenticated and granted specific system access, the
configured firewall enforces network policies, that is, accessible user services.
However, firewalls do not always detect and stop viruses or harmful malware, which
may lead to data loss. An anti-virus software or an intrusion prevention system (IPS)
is implemented to prevent the virus and/or harmful malware from entering the
network.
Network security is sometimes confused with information security, which has a
different scope and relates to data integrity of all forms, print or electronic
Modem
A modem is a network device that both modulates and demodulates analog carrier
signals (called sine waves) for encoding and decoding digital information for
processing. Modems accomplish both of these tasks simultaneously and, for this
reason, the term modem is a combination of "modulate" and "demodulate."
Repeater
A repeater is a network device that retransmits a received signal with more power
and to an extended geographical or topological network boundary than what would
be capable with the original signal.
Switch
Hub
A hub, also called a network hub, is a common connection point for devices in a
network. Hubs are devices commonly used to connect segments of a LAN. The
hub contains multiple ports. When a packetarrives at one port, it is copied to the
other ports so that all segments of the LAN can see all packets
Gateway
In computer networking and telecommunications, a gateway is a component
that is part of two networks, which use different protocols. The gateway will
translate one protocol into the other. A router is a special case of a gateway.
Gateways, also called protocol converters, can operate at any network layer. The
activities of a gateway are more complex than that of the router or switch as it
communicates using more than one protocol.
Both the computers of internet users and the computers that serve pages to users
are host nodes. The nodes that connect the networks in between are
gateways. These are gateway nodes:
1. Bit synchronization: The physical layer provides the synchronization of the bits
by providing a clock. This clock controls both sender and receiver thus
providing synchronization at bit level.
2. Bit rate control: The Physical layer also defines the transmission rate i.e. the
number of bits sent per second.
3. Physical topologies: Physical layer specifies the way in which the different,
devices/nodes are arranged in a network i.e. bus, star or mesh topolgy.
4. Transmission mode: Physical layer also defines the way in which the data
flows between the two connected devices. The various transmission modes
possible are: Simplex, half-duplex and full-duplex.
* Hub, Repeater, Modem, Cables are Physical Layer devices.
** Network Layer, Data Link Layer and Physical Layer are also known as Lower
Layers or Hardware Layers.
2. Data Link Layer (DLL) (Layer 2) :
The data link layer is responsible for the node to node delivery of the message. The
main function of this layer is to make sure data transfer is error free from one node
to another, over the physical layer. When a packet arrives in a network, it is the
responsibility of DLL to transmit it to the Host using its MAC address.
Data Link Layer is divided into two sub layers :
1. Logical Link Control (LLC)
2. Media Access Control (MAC)
Packet received from Network layer is further divided into frames depending on the
frame size of NIC(Network Interface Card). DLL also encapsulates Sender and
Receiver’s MAC address in the header.
The Receiver’s MAC address is obtained by placing an ARP(Address Resolution
Protocol) request onto the wire asking “Who has that IP address?” and the
destination host will reply with its MAC address.
Internet protocol security (IPsec) is a set of protocols that provides security for
Internet Protocol. It can use cryptography to provide security. IPsec can be used for
the setting up of virtual private networks (VPNs) in a secure manner.
Also known as IP Security.
IPsec involves two security services:
• Tunnel Mode: This will take the whole IP packet to form secure
communication between two places, or gateways.
• Transport Mode: This only encapsulates the IP payload (not the entire IP
packet as in tunnel mode) to ensure a secure channel of communication.
Business continuity
There are two common types of data processing, namely Batch Processing and
Real-Time
Processing. The determination on whether to use one over the other will depend on
the following:
Advantages:
o Ideal for processing large volumes of data/transaction for it increases
efficiency rather than processing each individually.
o Can be done or processed independently during less-busy times or at
a desired designated time.
o It offers cost efficiency for the organization by carrying out the process
(data reconciliation for the master file) when needed. o It allows
good audit trail.
Disadvantages:
o The very disadvantage of batch processing is the time delay between
the collection of data (transaction receiving) and getting the result
(output in master file) after the batch process. o The Master File
(The organizations big data) is not always kept up to date. o The
One time process can be very slow. Real-Time Processing
In contrast with batch data processing, real time data processing involves
continuous input, process and output of data. Thus, data are processed in a short
period of time. Few examples of programs that use such data processing type are
bank ATMs, customer services, radar systems, and Point of Sale (POS) Systems.
POS uses this data process to update the inventory, provide inventory history, and
sales of a particular item – allowing business to handle payments in real time.
With this kind of data process, every transaction is directly reflected to the master
file so that it will always be updated.
Advantages: o No significant
delay in response.
o Information is always up to date thus giving the organization the ability
to take immediate action when responding to an event, issue or
scenario in the shortest possible span of time.
o It could also give the organization the ability to gain insights from the
updated data to detect patterns for possible identification of either
opportunities or threats to the organization’s business.
Disadvantages: o This type of processing is more
expensive and complex.
o Real-time processing is a bit tedious and more difficult for auditing.
o Daily data backups (depends on transaction frequency) should be
implemented and necessary to ensure the retention of the most recent
data transaction.
The decision to select the best data processing system will greatly depend on the
current system in your business. So, choose the one that best suit your business
system.
: BUSINESS CONTINUITY PLANNING
Introduction
The pivotal role that banking sector plays in the economic growth and stability, both
at national and individual level, requires continuous and reliable services. Increased
contribution of 24x7 electronic banking channels has increased the demand to
formulate consolidated Business Continuity Planning (BCP) guidelines covering
critical aspects of people, process and technology.
A bank’s Board has the ultimate responsibility and oversight over BCP activity of a
bank. The Board approves the Business Continuity Policy of a bank. Senior
Management is responsible for overseeing the BCP process which includes:
Determining how the institution will manage and control identified risks
Allocating knowledgeable personnel and sufficient financial resources to
implement the
BCP
The top management should annually review the adequacy of the institution's
business recovery, contingency plans and the test results and put up the same
to the Board.
The top management should consider evaluating the adequacy of contingency
planning and their periodic testing by service providers whenever critical
operations are outsourced.
Ensuring employees are trained and aware of their roles in the implementation
of the
BCP
Reviewing the BCP testing programme and test results on a regular basis and
Since electronic banking has functions spread across more than one department, it
is necessary that each department understands its role in the plan. It is also
important that each gives its support to maintain it. In case of a disaster, each has to
be prepared for a recovery process, aimed at protection of critical functions. To this
end, it would be helpful if a set up like the BCP Committee, charged with the
implementation of BCP, in an eventuality and all departments expected to fulfill their
respective roles in a coordinated manner.
Ensure that the Business Continuity Plan (BCP) fits with other plans and
requirement of concerned authorities
Budgetary issues
Other functions entail handling legal matters evolving from the disaster, and
handling public relations and media inquiries
1.3 BCP Teams
There needs to be adequate teams for various aspects of BCP at central office, as
well as individual controlling offices or at a branch level, as required. Among the
teams that can be considered based on need, are the incident response team,
emergency action and operations team, team from particular business functions,
damage assessment team, IT teams for hardware, software, network support,
supplies team, team for organizing logistics, relocation team, administrative support
team, coordination team. Illustrative guidelines for committees or teams for
BCP are provided in Annex C.
BCP should evolve beyond the information technology realm and must also
cover people, processes and infrastructure
The methodology should prove for the safety and well-being of people in the
branch / outside location at the time of the disaster.
Define response actions based on identified classes of disaster.
To arrive at the selected process resumption plan, one must consider the risk
acceptance for the bank, industry and applicable regulations
Action plans, i.e.: defined response actions specific to the bank’s processes ,
practical manuals( do and don’ts, specific paragraph’s customised to individual
business units) and testing procedures
Establishing management succession and emergency powers
Compatibility and co-ordination of contingency plans at both the bank and its
service providers The recovery procedure should not compromise on the control
environment at the recovery location
Having specific contingency plans for each outsourcing arrangement based on
the degree of materiality of the outsourced activity to the bank's business
Periodic updating to absorb changes in the institution or its service providers.
Examples of situations that might necessitate updating the plans include
acquisition of new equipment, upgradation of the operational systems and
changes in:
Personnel
Addresses or telephone numbers
Business strategy
Location, facilities and resources
Legislation
Contractors, suppliers and key customers
Processes–new or withdrawn ones
Risk (operational and financial)
1.4 BCP
Consideratio
ns
Banks must consider implementing a BCP process to reduce the impact of disruption,
caused by disasters and security failures to an acceptable level through a
combination of preventive and recovery measures.
BCP should include measures to identify and reduce probability of risk to limit
the consequences of damaging incidents and enable the timely resumption
of essential operations. BCP should amongst others, consider reputation,
operational, financial, regulatory risks.
Key personnel;
Vital records;
Shared equipment, hardware, software, data files, and
workspace;
Production processes;
Customer services;
Network connectivity; and
Management information systems.
A maintenance schedule which specifies how and when the plan will be tested
and the process for maintaining the plan
Pandemic
(g)
Planning
The framework should consider the impact of customer reactions and the
potential demand for, and increased reliance on, online banking, telephone
banking, ATMs, and call support services. In addition, consideration should
be given to possible actions by public health and other government
authorities that may affect critical business functions of a financial institution.
Testing A BCP
The below are few of the illustrative techniques that can be used
for BCP testing purposes:
Each organisation must define frequency, schedule and clusters of Business Areas,
selected for test after a through Risk and Business Impact Analysis has been done.
The bank can consider broad guidelines provided below for
determining the testing frequency based on critical of a process:
– A quarterly statement, reporting major failures during the period for critical
systems, customer segment or services impacted due to the failures and
steps taken to avoid such failures in future.
An effective BCP should take into account the potential of wide area
disasters, which impact an entire region, and for resulting loss or
inaccessibility of staff. It should also consider and address inter
dependencies, both market-based and geographic, among financial system
participants as well as infrastructure service providers.
Further, banks should also consider the need to put in place necessary
backup sites for their critical payment systems which interact with the
systems at the Data centres of the Reserve Bank.
Banks may also consider running some critical processes and business
operations from primary and the secondary sites, wherein each would
provide back-up to the other.
• Sales staff
• IT staff
The relevant portion of the BCP adopted should also be disseminated to all
concerned, including the customers, so that the awareness would enable
them to react positively and in consonance with the BCP. This would help
maintain the customer’s faith on the banking institution, and the possibility of
a bank-run would be exponentially minimised. The part of the plan kept in the
public domain should normally be confined to information relating to the
general readiness of the banks in this regard without any detailed specifics,
to protect the banks from becoming vulnerable to security threats
Banks should consider having a detailed BCP plan for encountering natural
calamity/ disaster situation. A formal exception policy should be documented
which will guide the affected areas Personnel to act independently till
connection to the outside world is resumed.
The above mentioned guideline should have exceptions documented for critical
process which will ensure continuation of critical process without the regular
operational formalities.
After appropriate approvals or permissions are obtained internally and from RBI,
banks should consider having a guideline ready on relaxing certain rules/
requirements for customers affected by the calamity.
Like:
Banks can consider expediting cheque clearing for customers by directing all
cheques to a different region than the one affected by the calamity. In case of
severe calamity banks should consider restricting existing loans to facilitate
rebuilding efforts by the Govt. for the calamity areas. The banks may also be
consider ensuring quick processing of loan applications, preferably within 48
hours of receipt of such applications. It should consider dispatching credit bill,
agreement notes, etc. due to customer by having an arrangement to print the
same at an alternative location and should consider accepting late payments
for credit card dues for customers in the calamity affected area.
Banks may also endeavor for resumption of banking services by setting up
satellite offices, extension counters or mobile banking facilities.
– Banks may consider having backup resources (erg. stationery required for
cheque printing, special printers, stamps) at a secondary operational location.
– The plans may also suitably be aligned with those of the local government
authorities
– Banks should consider not storing critical papers, files, servers in the ground
floors where there is possibility of floods or water logging. However, banks should
also consider avoiding top floors in taller building to reduce impact due to probable
fire.
Banks must consider training more than one individual staff for specific critical jobs
(ire. in the absence on one employee the work must not be stalled or delayed).
They must consider crosstraining employees for critical functions and document-
operating procedures. Banks
HR Incident Line: Operated from within the centralised HR function, the incident
helpline is invoked in those instances, where there are possible casualties or
missing staff, as a result of an incident. Invoked by the CMT, the line is manned by
qualified HR officers trained in how to deal with distressed callers. The staff may be
provided with an emergency card, which includes the incident line number.
Information on the hotline is updated on a regular basis. The facility enables line
managers to keep the central crisis team up to speed on the whereabouts and well-
being of staff. Ongoing welfare and support for staff is also provided via an
employee assistance provider.
The are many applications and services in banking system that are highly mission
critical in nature and therefore requires high availability, and fault tolerance to be
considered while designing and implementing the solution. This aspect is to be
taken into account especially while designing the data centre solution and the
corporate network solution.
Prior to selecting a data recovery (DR) strategy, a DR planner should refer to their
organisation's BCP, which should indicate key metrics of recovery point objective
and recovery time objective for business processes:
Recovery Point Objective must ensure that the Maximum Tolerable Data Loss for
each activity is not exceeded. The Recovery Time Objective must ensure that the
Maximum Tolerable Period of Disruption (MTPD), for each activity, is not exceeded.
The metrics specified for the business processes must then be mapped to the
underlying IT systems and infrastructure that support those processes. Once, RTO
and RPO metrics have been mapped to the IT infrastructure, the DR planner can
determine the most suitable recovery strategy for each system. An important note
here, however, is that the business ultimately sets the IT budget. Therefore, RTO
and RPO metrics need to fit with the available budget and the critical of the
business process/function.
Backups made to tape and sent off-site at regular intervals (preferably daily)
Backups made to disk on-site and automatically copied to off-site disk, or made
directly to off-site disk
restore the data (only the systems then need to be restored or synced).
High availability systems that keep both data and system replicated, off-site,
enabling continuous access to systems and data
The roles and responsibilities of all key personnel with respect to carrying
out the plan;
A schedule listing the personnel that will be staffing the backup site,
including a rotation schedule to support ongoing operations without
burning out the disaster team members.
A disaster recovery plan must be a living document; as the data centre changes, the
plan must be updated to reflect those changes.
For example, BCP and Management will lead to the Business Impact Analysis,
which will lead to the Performance Impact Analysis (PIA). That will depend on the
Technology Performance of the total IT Solution Architecture.
Performance
Availability
Security and Access Control
Accordingly, with respect to the performance and availability aspects the following
architectures have to be designed and configured to provide high levels of up time
round the clock to ensure uninterrupted functioning.
– Audit the deployed architecture for all the mission critical applications and
services and resolve the concerns that arise in a time bound manner.
– Periodically investigate the outages that are experienced from time to time,
which are mini disasters that result in non availability of services for a short span of
time, systems not responding when transactions are initiated at the branch level,
delivery channels not functioning for a brief period of time to ensure that the
customer service is not affected.
Compiled by Srinivas Kante [email protected]
– Ensure availability of appropriate technology solutions to measure and monitor
the functioning of products. And, have competent and capable technical people
within the system to resolve issues expeditiously.
The issues detailed above have to be borne in mind while finalising the data centre
architecture and the corporate network architecture which are expected to have
redundancy built in the solution with no single point of failure.
cold sites
warm sites
hot sites
Differences between them are determined by costs and effort required to implement
each.
Another term used to describe a backup site is a work area recovery site.
Cold Sites: A cold site is the most inexpensive type of backup site for an
organisation tooperate. It does not include backed up copies of data and information
from the original location of the organisation, nor does it include hardware already
set up. The lack of hardware contributes to the minimal start up costs of the cold
site, but requires additional time following the disaster to have the operation running
at a capacity close to that prior to the disaster.
Hot Sites: A hot site is a duplicate of the original site of the organisation, with
fullcomputer systems as well as near-complete backups of user data. Real-time
synchronisation between the two sites may be used to mirror the data environment
of the original site, using wide area network links and specialised software.
Following a disruption to the original site, the hot site exists so that the organisation
can relocate with minimal losses to normal operations. Ideally, a hot site will be up
and running within a matter of hours or even less. Personnel may still have to be
moved to the hot site so it is possible that the hot site may be operational from a
data processing perspective before staff has relocated. The capacity of the hot site
may or may not match the capacity of the original site depending on the
organisation's requirements. This type of backup site is the most expensive to
operate. Hot sites are popular with organisations that operate real time processes such
as financial institutions, government agencies and ecommerce providers
Warm Sites: A warm site is, quite logically, a compromise between hot and cold.
Thesesites will have hardware and connectivity already established, though on a
smaller scale than the original production site or even a hot site. Warm sites will have
backups on hand, but they may not be complete and may be between several days and
a week old. An example would be backup tapes sent to the warm site by courier
Solution architectures of DC and DR are not identical for all the applications and
services. Critical applications and services, namely the retail, corporate, trade finance
and government business solutions as well as the delivery channels are having the
same DR configurations whereas surround or interfacing applications do not have the
DR support. Banks will have to conduct periodical review with reference to the above
aspect and upgrade the DR solutions from time to time and ensure that all the critical
applications and services have a perfect replica in terms of performance and
availability.
The configurations of servers, network devices and other products at the DC and DR
have to be identical at all times. This includes the patches that are applied at the DC
periodically and the changes made to the software from time to time by customization
and parameterization to account for the regulatory requirements, system changes etc .
Periodic checks with reference to ensuring data and transaction integrity between DC
and DR are mandatory. It could be done over the week end or as a part of the EoD /
BoD process.
Solutions have to have a defined Recovery Time Objective (RTO) and Recovery
Point Objective (RPO) parameter. These two parameters have a very clear bearing on
the technology aspects as well as the process defined for cut over to the DR and the
competency levels required moving over in the specified time frame.
Values chosen for the RTO and RPO is more to follow the industry practice and not
derived from first principles. Therefore, the DR drills that are conducted periodically
have to ensure that the above parameters are strictly complied with.
Banks may also consider Recovery Time Objective and Recovery Point Objectives
(RTO/ RPO) for services being offered and not just a specific application. For example--
for internet portal and not retail banking. This is done to avoid any inconsistency in
business users understanding.
DR drills currently conducted periodically come under the category of planned
shutdown. Banks have to evolve a suitable methodology to conduct the drills which are
closer to the real disaster scenario so that the confidence levels of the technical team
taking up this exercise is built to address the requirement in the event of a real disaster.
It is also recommended that the support infrastructure at the DC and DR, namely the
electrical systems, air-conditioning environment and other support systems have no
single point of failure and do have a building management and monitoring system to
constantly and continuously monitor the resources. If it is specified that the solution has
a high availability of
95 measured on a monthly basis and a mean time to restore of 2 hrs in the event of
any failure, it has to include the support system also.
Given the need for drastically minimizing the data loss during exigencies and enable
quick recovery and continuity of critical business operations, banks may need to
consider near site DR architecture. Major banks with significant customer delivery
channel usage and significant participation in financial markets/payment and settlement
systems may need to have a plan of action for creating a near site DR architecture over
the medium term (say, within three years).
The time window for recovery is shrinking in face of the demand for 24 / 365
operations. Some studies claim that around 30 percent of high-availability
applications have to be recovered in less than three hours. A further 45 percent
within 24 hours, before losses become unsustainable; others claim that 60
percent of Enterprise Resource Planning (ERP) Systems have to be restored in
under 24 hours. This means that traditional off-site backup and restore methods
are often no longer adequate. It simply takes too long to recover incremental and
full image backups of various inter-related applications (backed up at different
times), synchronise them and re-create the position as at disaster. Continuous
operation–data mirroring to off-site locations and standby computing and
telecommunications–may be the only solution.
A risk assessment and business impact analysis should establish the justification for
continuity for specific IT and telecommunication services and applications.
It is important to ensure that a bank’s service will not suffer from unacceptable
downtime or response. The vendor may have skilled staff available – but this is
rarely guaranteed and they come at a cost. In terms of cost, there may be additional
fees to pay for testing, on invocation of a disaster, and for occupation in a disaster.
The vendor charging structure also needs to be carefully considered.
Information security not only deals with information in various channels like spoken,
written, printed, electronic or any other medium but also information handling in terms
of creation, viewing, transportation, storage or destruction .This is in contrast to IT
security which is mainly concerned with security of information within the boundaries of
the network infrastructure technology domain. From an information security
perspective, the nature and type of compromise is not as material as the fact that
security has been breached.
For over twenty years, information security has held confidentiality, integrity and
availability (known as the CIA triad) to be the core principles. There is continuous
debate about extending this classic trio. Other principles such as Authenticity, Non-
repudiation and accountability are also now becoming key considerations for practical
security installations.
Availability: For any information system to serve its purpose, the information
mustbe available when it is needed. This means that the computing systems
used to store and process the information, the security controls used to protect
it, and the communication channels used to access it must be functioning
correctly. High availability systems aim to remain available at all times,
preventing service disruptions due to power outages, hardware failures, and
system upgrades. Ensuring availability also involves preventing denial-of-service
(DoS) and distributed denial-of service (DDoS) attacks.
In addition to the above, there are other security-related concepts and principles
when designing a security policy and deploying a security solution. They include
identification, authorization, accountability, and auditing.
The major role of top management involves implementing the Board approved
information security policy, establishing necessary organizational processes for
information security and providing necessary resources for successful information
security. It is essential that senior management establish an expectation for strong
cyber security and communicate this to their officials down the line. It is also essential
that the senior organizational leadership establish a structure for implementation of an
information security programme to enable a consistent and effective information
security programme implementation apart from ensuring the accountability of
individuals for their performance as it relates to cyber security.
Given that today’s banking is largely dependent on IT systems and since most of the
internal processing requirements of banks are electronic, it is essential that adequate
security systems are fully integrated into the IT systems of banks. It would be optimal to
classify these based on the risk analysis of the various systems in each bank and
specific risk mitigation strategies need to be in place.
Information security team/function
Banks need to frame Board approved Information Security Policy and identify
and implement appropriate information security management
measures/practices keeping in view their business needs.
The policies need to be supported with relevant standards, guidelines and
procedures. A policy framework would, inter-alia, incorporate/take into
consideration the following:
Wireless security
Application/data migration
Given the critical role of security technologies as part of the information security
framework, banks need to subject them to suitable controls across their lifecycle
like guidelines on their usage, standards and procedures indicating the detailed
objectives and requirements of individual information security-specific
technology solutions, authorisation for individuals who would be handling the
technology, addressing segregation of duties issues, appropriate configurations
of the devices that provide the best possible security, regularly assessing their
effectiveness and fine-tuning them accordingly, and identification of any
unauthorised changes.
Digital evidence is similar to any other form of legal proof - it needs to withstand
challenges to its integrity, its handling must be carefully tracked and
documented, and it must be suitably authenticated by concerned personnel as
per legal requirements. Since the evidence resides on or is generated by a
digital device, a trained information security official or skilled digital forensics
examiner may need to be involved in the handling process to ensure that any
material facts is properly preserved and introduced. A suitable policy needs to be
in place in this regard.
Risk Assessment
The likelihood that a threat will use a vulnerability to cause harm creates a risk. When
a threat does use a vulnerability to inflict harm, it has an impact. In the context of
information security, the impact is a loss of availability, integrity and confidentiality,
and possibly other losses (lost income, loss of life, loss of property).
Risk assessment is the core competence of information security management. The
risk assessment must, for each asset within its scope, identify the
threat/vulnerability combinations that have a likelihood of impacting the
confidentiality, availability or integrity of that asset - from a business, compliance or
contractual perspective. Standards like ISO27001 and ISO 27002 are explicit in
requiring a risk assessment to be carried out before any controls are selected and
implemented and are equally explicit that the selection of every control must be
justified by a risk assessment.
In broad terms, the risk management process consists of:
Identification of assets and estimation of their value. Some aspects to be included
are people, buildings, hardware, software, data (electronic, print) and supplies
Conducting a threat assessment which may include aspects like acts of nature, acts
of war, accidents, malicious acts originating from inside or outside the
organization
Evaluating the effectiveness of the control measures. Ensuring the controls provide
the required cost-effective protection.
Qualitative analysis involves the use of scenarios and attempts to determine the
seriousness of threats and the effectiveness of controls. Qualitative analysis is by
definition subjective, relying upon judgment, knowledge, prior experience and
industry information. Qualitative techniques may include walk-throughs,
surveys/questionnaires, interviews and specific workgroups to obtain information
about the various scenarios.
Inventory and information/data classification
Effective control requires a detailed inventory of information assets. Such a list is the
first step in classifying the assets and determining the level of protection to be provided
to each asset.
The inventory record of each information asset should, at the least, include:
Information owner
Information custodian
Application owner
The application owner is the manager of the business line who is fully accountable for
the performance of the business function served by the application. Responsibilities,
inter-alia, include:
Establishing user access criteria, availability requirements and audit trails for
their applications
Ensuring security controls associated with the application are commensurate
with support for the highest level of information classification used by the
application
Security Administrator
Ensuring access requests are consistent with the information directions and security
guidelines
Administering access rights according to criteria established by the Information
Owners
Creating and removing user IDs as directed by the user manager
Administering the system within the scope of their job description and functional
responsibilities
The end users would be any employees, contractors or vendors of the bank who use
information systems resources as part of their job. Responsibilities include :
Maintaining confidentiality of log-in password(s)
Ensuring security of information entrusted to their care
Using bank business assets and information resources for management
approved purposes only
Adhering to all information security policies, procedures, standards and
Access Control
For accountability purposes, a bank should ensure that users and IT assets are
uniquely identified and their actions are auditable.
Personnel security
Application owners grant legitimate users access to systems that are necessary to
perform their duties and security personnel enforce the access rights in
accordance with institution standards. Because of their internal access levels
and intimate knowledge of financial institution processes, authorized users pose
a potential threat to systems and data. Employees, contractors, or third-party
employees can also exploit their legitimate computer access for malicious or
fraudulent reasons. Further, the degree of internal access granted to some users
can increase the risk of accidental damage or loss of information and systems.
Risk exposures from internal users include altering data, deleting production and
back-up data, disrupting/destroying systems, misusing systems for personal gain
or to damage the institution, holding data hostage and stealing strategic or
customer data for espionage or fraud schemes.
Banks should have a process to verify job application information on all new
employees. Additional background and credit checks may be warranted based
on the sensitivity of a particular job or access level. Personnel with privileged
access like administrators, cyber security personnel, etc. should be subjected to
rigorous background checks and screening. Institutions should verify that
contractors are subject to similar screening procedures. The verification
considerations would include:
Physical security
The requirements for each zone should be determined through the risk
assessment. The risk assessment should include, but is not limited to, threats
like aircraft crashes, chemical effects, dust, electrical supply interference,
electromagnetic radiation, explosives, fire, smoke, theft/destruction,
vibration/earthquake, water, criminals, terrorism, political issues (e.g. strikes,
disruptions) and other threats based on the entity’s unique geographical location,
building configuration, neighboring environment/entities, etc.
A bank needs to deploy the following environmental controls:
Secure location of critical assets providing protection from natural and man-
made threats
Restrict access to sensitive areas like data centres, which also includes
detailed procedures for handling access by staff, third party providers and
visitors
Suitable preventive mechanisms for various threats indicated above
Monitoring mechanisms for the detection of compromises of environmental
controls relating to temperature, water, smoke, access alarms, service
availability alerts (power supply, telecommunication, servers), access log
reviews etc
User Training and Awareness
It is acknowledged that the human link is the weakest link in the information security
chain. Hence, there is a vital need for an initial and ongoing training and information
security awareness programme. The programme may be periodically updated keeping
in view changes in information security, threats/vulnerabilities and/or the bank’s
information security framework. There needs to be a mechanism to track the
effectiveness of training programmes through an assessment/testing process designed
on testing the understanding of the relevant information security policies, not only
initially but also on a periodic basis. At any point of time, a bank needs to maintain an
updated status on user training and awareness relating to information security and the
matter needs to be an important agenda item during Information Security Committee
meetings.
Some of the areas that could be incorporated as part of the user awareness
programme include:
Incident management
Financial institutions have different types of applications like the core banking
system, delivery channels like ATMs, internet banking, mobile banking, phone
banking, network operating systems, databases, enterprise resource management
(ERP) systems, customer relationship management (CRM) systems, etc., all used
for different business purposes. Then these institutions have partners, contractors,
consultants, employees and temporary employees. Users usually access several
different types of systems throughout their daily tasks, which makes controlling
access and providing the necessary level of protection on different data types
difficult and full of obstacles. This complexity may result in unforeseen and
unidentified holes in the protection of the entire infrastructure including overlapping
and contradictory controls, and policy and regulatory noncompliance.
The following are the important Application control and risk mitigation measures
that need to be implemented by banks:
Each application should have an owner which will typically be the
concerned
business function that uses the application
Some of the roles of application owners
include:
Prioritizing any changes to be made to the application and authorizing
the changes
Deciding on data classification/de-classification and archival/purging
procedures for the data pertaining to an application as per relevant
policies/regulatory/statutory requirements
Ensuring that adequate controls are built into the application through
active involvement in the application design, development, testing and
change process
Ensuring that the application meets the business/functional needs of
the users Ensuring that the information security function has reviewed
the security of the application
Taking decisions on any new applications to be acquired / developed
or any old applications to be discarded
Informing the information security team regarding purchase of an
application and assessing the application based on the security policy
requirements Ensuring that the Change Management process is
followed for any changes in application
Ensuring that the new applications being purchased/developed follow
the
Information Security policy
Ensuring that logs or audit trails, as required, are enabled and
monitored for the applications
All application systems need to be tested before implementation in a
robust manner regarding controls to ensure that they satisfy business
policies/rules of the bank and regulatory and legal
prescriptions/requirements. Robust controls need to be built into the
system and reliance on any manual controls needs to be minimized.
Before the system is live, there should be clarity on the audit trails and the
specific fields that are required to be captured as part of audit trails and
an audit trail or log monitoring process including personnel responsible for
the same.
There should be measures to reduce the risk of theft, fraud, error and
unauthorized changes to information through measures like supervision
of activities and segregation of duties.
Applications must not allow unauthorized entries to be updated in the
database. Similarly, applications must not allow any modifications to be
made after an entry is authorized. Any subsequent changes must be
made only by reversing the original authorized entry and passing a fresh
entry.
Direct back-end updates to database should not be allowed except during
exigencies, with a clear business need and after due authorization as per
the relevant policy.
Alerts regarding use of the same machine for both maker and checker
transactions need to be considered.
There should be a proper linkage between a change request and the
corresponding action taken. For example, the specific accounting head or
code which was created as a result of a specific request should be
established clearly.
Error / exception reports and logs need to be reviewed and any issues
need to be remedied /addressed at the earliest.
Critical functions or applications dealing with financial, regulatory and
legal, MIS and risk assessment/management, (for example, calculation of
capital adequacy, ALM, calculating VaR, risk weighted assets, NPA
classification and provisioning, balance sheet compilation, AML system,
revaluation of foreign currency balances, computation of MTM gains /
losses, etc.,) needs to be done through proper application systems and
not manually or in a semi-automated manner through spreadsheets.
These pose risks relating to data integrity and reliability. Use of
spreadsheets in this regard should be restricted and should be replaced
by appropriate IT applications within a definite time-frame in a phased
manner.
Banks may obtain application integrity statements in writing from the
application system vendors providing for reasonable level of assurance
about the application being free of malware at the time of sale, free of any
obvious bugs, and free of any covert channels in the code (of the version
of the application being delivered as well as any subsequent
versions/modifications done).
For all critical applications, either the source code must be received from
the vendor or a software escrow agreement should be in place with a
third party to ensure source code availability in the event the vendor goes
out of business. It needs to be ensured that product updates and
programme fixes are also included in the escrow agreement.
Applications should be configured to logout the users after a specific
period of inactivity. The application must ensure rollover of incomplete
transactions and otherwise ensure integrity of data in case of a log out.
control, presentation logic, server side input validation, business logic and
database access.
In the event of data pertaining to Indian operations being stored and/or
processed abroad, for example, by foreign banks, there needs to be
suitable controls like segregation of data and strict access controls based
on ‘need to know’ and robust change controls. The bank should be in a
position to adequately prove the same to the regulator. Regulator’s
access to such data/records and other relevant information should not be
impeded in any manner and RBI would have the right to cause an
inspection to be made of the processing centre/data centre and its books
and accounts by one or more of its officers or employees or other
persons.
An application security review/testing, initially and during major changes,
needs to be conducted using a combination of source code review, stress
loading, exception testing and compliance review to identify insecure
coding techniques and systems vulnerabilities to a reasonable extent.
Migration controls:
Consistency of data— the field/record called for from the new application
should be consistent with that of the original application. This should
enable consistency in repeatability of the testing exercise
Continuity—the new application should be able to continue with newer
records as addition (or appendage) and help in ensuring seamless
business continuity
It is a good practice that the last copy of the data before conversion from the old
platform and the first copy of the data after conversion to the new platform are
maintained separately in the archive for any future reference.
The error logs pertaining to the pre-migration/ migration/ post migration period
along with root cause analysis and action taken need to be available for review.
Banks may need to migrate the complete transaction data and audit trails from
the old system to the new system. Else, banks should have the capability to
access the older transactional data and piece together the transaction trail
between older and newer systems, to satisfy any supervisory/legal requirements
that may arise.
Banks need to carry out due diligence with regard to new technologies since
they can potentially introduce additional risk exposures. A bank needs to
authorise the large scale use and deployment in production environment of
technologies that have matured to a state where there is a generally agreed set
of industry-accepted controls and robust diligence and testing has been carried
out to ascertain the security issues of the technology or where compensating
controls are sufficient to prevent significant impact and to comply with the
institution’s risk appetite and regulatory expectations.
Any new business products introduced along with the underlying information
systems need to be assessed as part of a formal product approval process
which incorporates, inter-alia, security related aspects and fulfilment of relevant
legal and regulatory prescriptions. A bank needs to develop an authorisation
process involving a risk assessment balancing the benefits of the new
technology with the risk.
Encryption
Encryption Types:
Symmetric encryption is the use of the same key and algorithm by the creator and
reader of a file or message. The creator uses the key and algorithm to encrypt, and the
reader uses both to decrypt. Symmetric encryption relies on the secrecy of the key. If
the key is captured by an attacker, either when it is exchanged between the
communicating parties, or while one of the parties uses or stores the key, the attacker
can use the key and the algorithm to decrypt messages or to masquerade as a
message creator.
Asymmetric encryption lessens the risk of key exposure by using two mathematically
related keys, the private key and the public key. When one key is used to encrypt, only
the other key can decrypt. Therefore, only one key (the private key) must be kept
secret. The key that is exchanged (the public key) poses no risk if it becomes known.
For instance, if individual A has a private key and publishes the public key, individual B
can obtain the public key, encrypt a message to individual A, and send it. As long as an
individual keeps his private key secure from disclosure, only individual A will be able to
decrypt the message.
Data security
Banks need to define and implement procedures to ensure the integrity and
consistency of all data stored in electronic form, such as databases, data
warehouses and data archives.
A data security theory seeks to establish uniform risk-based requirements for the
protection of data elements. To ensure that the protection is uniform within and
outside of the institution, tools such as data classifications and protection profiles
can be used, as indicated earlier in the chapter.
Data classification and protection profiles are complex to implement when the
network or storage is viewed as a utility. Because of that complexity, some
institutions treat all information at that level as if it were of the highest sensitivity
and implement encryption as a protective measure. The complexity in
implementing data classification in other layers or in other aspects of an
institution’s operation may result in other risk mitigation procedures being used.
Adequacy is a function of the extent of risk mitigation, and not the procedure or
tool used to mitigate risk.
Policies regarding media handling, disposal, and transit should be implemented to
enable the use of protection profiles and otherwise mitigate risks to data. If
protection profiles are not used, the policies should accomplish the same goal as
protection profiles, which is to deliver the same degree of residual risk without
regard to whether the information is in transit or storage, who is directly controlling
the data, or where the storage may be.
There should be secure storage of media. Controls could include physical and
environmental controls such as fire and flood protection, limiting access by means
like physical locks, keypad, passwords, biometrics, etc., labelling, and logged
access. Management should establish access controls to limit access to media,
while ensuring that all employees have authorization to access the minimum data
required to perform their responsibilities. More sensitive information such as
system documentation, application source code, and production transaction data
should have more extensive controls to guard against alteration (e.g., integrity
checkers, cryptographic hashes). Furthermore, policies should minimize the
distribution of sensitive information, including printouts that contain the information.
Periodically, the security staff, audit staff, and data owners should review
authorization levels and distribution lists to ensure they remain appropriate and
current.
The storage of data in portable devices, such as laptops and PDAs, poses unique
problems. Mitigation of those risks typically involves encryption of sensitive data,
host-provided access controls, etc.
Banks need appropriate disposal procedures for both electronic and paper based
media. Contracts with third-party disposal firms should address acceptable
disposal procedures. For computer media, data frequently remains on media after
erasure. Since that data can be recovered, additional disposal techniques should
be applied to sensitive data like physical destruction, overwriting data, degaussing
etc.
Banks should maintain the security of media while in transit or when shared with
third parties. Policies should include contractual requirements that incorporate
necessary risk-based controls, restrictions on the carriers used and procedures to
verify the identity of couriers.
Banks should encrypt customer account and transaction data which is transmitted,
transported, delivered or couriered to external parties or other locations, taking into
account all intermediate junctures and transit points from source to destination.
A few other aspects that also needs to be considered include appropriate blocking,
filtering and monitoring of electronic mechanisms like e-mail and printing and
monitoring for unauthorised software and hardware like password cracking
software, key loggers, wireless access points, etc.
Concerns over the need to better control and protect sensitive information have
given rise to a new set of solutions aimed at increasing an enterprise’s ability to
protect its information assets. These solutions vary in their capabilities and
methodologies, but collectively they have been placed in a category known as data
leak prevention (DLP). It provides a comprehensive approach covering people,
processes, and systems that identify, monitor, and protect data in use (e.g.,
endpoint actions), data in motion (e.g., network actions), and data at rest (e.g.,
data storage) through deep content inspection and with a centralized management
framework.
Most DLP solutions include a suite of technologies that facilitate three key
objectives:
Vulnerability Assessment
Soon after new vulnerabilities are discovered and reported by security researchers
or vendors, attackers engineer the malicious exploit code and then launch that
code against targets of interest. Any significant delays in finding or fixing software
with critical vulnerabilities provides ample opportunity for persistent attackers to
break through, gaining control over the vulnerable machines and getting access to
the sensitive data they contain. Banks that do not scan for vulnerabilities and
address discovered flaws proactively face a significant likelihood of having their
computer systems compromised.
The following are some of the measures suggested:
Automated vulnerability scanning tools need to be used against all
systems on their networks on a periodic basis, say monthly or weekly or
more frequently.
Banks should ensure that vulnerability scanning is performed in an
authenticated mode (i.e., configuring the scanner with administrator
credentials) at least quarterly, either with agents running locally on each
end system to analyze the security configuration or with remote scanners
that are given administrative rights on the system being tested, to
overcome limitations of unauthenticated vulnerability scanning.
Banks should compare the results from back-to-back vulnerability scans
to verify that vulnerabilities were addressed either by patching,
implementing a compensating control, or by documenting and accepting a
reasonable business risk. Such acceptance of business risks for existing
vulnerabilities should be periodically reviewed to determine if newer
compensating controls or subsequent patches can address vulnerabilities
that were previously accepted, or if conditions have changed increasing
the risk.
A bank needs to have robust monitoring processes in place to identify events and
unusual activity patterns that could impact on the security of IT assets. The
strength of the monitoring controls needs to be proportionate to the criticality of an
IT asset. Alerts would need to be investigated in a timely manner, with an
appropriate response determined.
Common monitoring processes include activity logging (including exceptions to
approved activity), for example, device, server, network activity, security sensor
alerts; monitoring staff or third-party access to sensitive data/information to ensure
it is for a valid business reason, scanning host systems for known vulnerabilities,
checks to determine if information security controls are operating as expected and
are being complied with, checking whether powerful utilities / commands have
been disabled on attached hosts by using tools like ‘network sniffer’), environment
and customer profiling, checking for the existence and configuration of
unauthorised wireless networks by using automated tools, discovering the
existence of unauthorised systems by using network discovery and mapping tools
and detecting unauthorised changes to electronic documents and configuration
files by using file integrity monitoring software.
Highly sensitive and/or critical IT assets would need to have logging enabled to
record events and monitored at a level proportional to the level of risk.
Users, like system administrators, with elevated access privileges should be
subjected to a greater level of monitoring in light of the heightened risks involved.
The integrity of the monitoring logs and processes should be safeguarded through
appropriate access controls and segregation of duties.
Banks should frequently review all system accounts and disable any account that
cannot be associated with a business process and business owner. Reports that
may be generated from systems and reviewed frequently may include, among
others, a list of locked out accounts, disabled accounts, accounts with passwords
that exceed the maximum password age, and accounts with passwords that never
expire.
Banks should establish and follow a process for revoking system access by
disabling accounts immediately upon termination of an employee or contractor.
Banks should regularly monitor the use of all accounts, automatically logging off
users after a standard period of inactivity.
Banks should monitor account usage to determine dormant accounts that have not
been used for a given period, say 15 days, notifying the user or user’s manager of
the dormancy. After a longer period, say 30 days, the account may be disabled.
On a periodic basis, say monthly or quarterly basis, banks should require that
managers match active employees and contractors with each account belonging to
their managed staff.
Security/system administrators should then disable accounts that are not assigned
to active employees or contractors.
Banks also need to pro-actively monitor various authentic sources like CERT-In,
security vendors, etc. for any security related advisories and take suitable
measures accordingly.
Administrators should not rely solely on AV software and email filtering to detect
worm infections. Logs from firewalls, intrusion detection and prevention sensors,
DNS servers and proxy server logs should be monitored on a daily basis for signs
of worm infections including but not limited to:
Banks should configure laptops, workstations, and servers so that they do not
auto-run content from USB tokens, USB hard drives, CDs/DVDs, external SATA
devices, mounted network shares, or other removable media.
Email Attachment Filtering - Banks should filter various attachment types at the
email gateway, unless required for specific business use. Some examples
include .ade .cmd .eml .ins .mdb .mst .reg .url .wsf .adp .com .exe .isp .mde .pcd .s
cr .vb .wsh .bas .cpl
.hlp .js .msc .pif .sct .vbe .bat .crt .hta .jse .msi .pl .scx .vbs .chm .dll .inf.lnk .msp .p
ot
.shs .wsc… etc. Banks should consider only allowing file extensions with a
documented business case and filtering all others.
Patch Management:
Critical patches must be evaluated in a test environment before being updated into
production on enterprise systems. If such patches break critical business
applications on test machines, the organization must devise other mitigating
controls that block exploitation on systems where the patch is difficult to be
deployed because of its impact on business functionality.
Change Management:
Audit trails
Banks needs to ensure that audit trails exist for IT assets satisfying the banks
business requirements including regulatory and legal requirements, facilitating
audit, serving as forensic evidence when required and assisting in dispute
resolution. This could include, as applicable, various areas like transaction with
financial consequences, the opening, modifications or closing of customer
accounts, modifications in sensitive master data, accessing or copying of sensitive
data/information; and granting, modification or revocation of systems access rights
or privileges for accessing sensitive IT assets.
Audit trails should be secured to ensure the integrity of the information captured,
including the preservation of evidence. Retention of audit trails should be in line
with business, regulatory and legal requirements.
Metrics can be an effective tool for security managers to discern the effectiveness
of various components of their security policy and programs, the security of a
specific system, product or process, effectiveness and efficiency of security
services delivery, the impact of security events on business processes and the
ability of staff or departments within an organization to address security issues for
which they are responsible. Additionally, they may be used to raise the level of
security awareness within the organization. The measurement of security
characteristics can allow management to increase control and drive further
improvements to the security procedures and processes.
Each dimension of the IT security risk management framework can be measured
by at least one metric to enable the monitoring of progress towards set targets and
the identification of trends. The use of metrics needs to be targeted towards the
areas of greatest criticality. Generally, it is suggested that effective metrics need to
follow the SMART acronym i.e. specific, measurable, attainable, repeatable and
time-dependent.
In addition, a comprehensive set of metrics that provide for prospective and
retrospective measures, like key performance indicators and key risk indicators,
can be devised.
The efficacy of a security metrics system in mitigating risk depends on
completeness and accuracy of the measurements and their effective analysis. The
measurements should be reliable and sufficient to justify security decisions that
affect the institution’s security posture, allocate resources to security-related tasks,
and provide a basis for security-related reports.
Some illustrative metrics include coverage of anti-malware software and their
updation percentage, patch latency, extent of user awareness training, vulnerability
related metrics, etc.
Network Security
Financial institutions have four primary firewall types from which to choose:
packet filtering, stateful inspection, proxy servers, and application-level firewalls.
Any product may have characteristics of one or more firewall types. The
selection of a firewall type is dependent on many characteristics of the security
zone, such as the amount of traffic, the sensitivity of the systems and data, and
applications.
Packet filter firewalls evaluate the headers of each incoming and outgoing packet to
ensure it has a valid internal address, originates from a permitted external address,
connects to an authorized protocol or service, and contains valid basic header
instructions. If the packet does not match the pre -defined policy for allowed traffic, then
the firewall drops the packet. Packet filters generally do not analyze the packet
contents beyond the header information. Among the major weaknesses associated with
packet filtering firewalls include inability to prevent attacks that exploit
applicationspecific vulnerabilities and functions because the packet filter does not
examine packet contents and logging functionality is limited to the same information
used to make access control decisions.
Stateful inspection firewalls are packet filters that monitor the state of the TCP
connection. Each TCP session starts with an initial “handshake” communicated through
TCP flags in the header information. When a connection is established the firewall adds
the connection information to a table. The firewall can then compare future packets to
the connection or state table. This essentially verifies that inbound traffic is in response
to requests initiated from inside the firewall.
Proxy servers act as an intermediary between internal and external IP addresses and
block direct access to the internal network. Essentially, they rewrite packet headers to
substitute the IP of the proxy server for the IP of the internal machine and forward
packets to and from the internal and external machines. Due to that limited capability,
proxy servers are commonly employed behind other firewall devices. The primary
firewall receives all traffic, determines which application is being targeted, and hands
off the traffic to the appropriate
proxy server. Common proxy servers are the domain name server (DNS), Web server
(HTTP), and mail (SMTP) server. Proxy servers frequently cache requests and
responses, providing potential performance benefits. Additionally, proxy servers provide
another layer of access control by segregating the flow of Internet traffic to support
additional authentication and logging capability, as well as content filtering. Web and e-
mail proxy servers, for example, are capable of filtering for potential malicious code and
application -specific commands. Proxy servers are increasing in importance as
protocols are tunnelled through other protocols.
Application-Level Firewalls
Firewall Policy
A firewall policy states management’s expectation for how the firewall should function
and is a component of the overall security management framework. Acceptable
inbound communication types for the organization need to be explicitly defined in the
firewall policies. As the firewall is usually one of the first lines of defense, access to the
firewall device itself needs to be strictly controlled.
At a minimum, the policy should address various aspects like Firewall topology and
architecture and type of firewalls being utilized, physical placement of the firewall
components, permissible traffic and monitoring firewall traffic, firewall updating,
coordination with security monitoring and intrusion response mechanisms,
responsibility for monitoring and enforcing the firewall policy, protocols and applications
permitted, regular auditing of a firewall’s configuration and testing of the firewall’s
effectiveness, and contingency planning.
Firewalls should not be relied upon, however, to provide full protection from attacks.
Banks should complement firewalls with strong security policies and a range of other
controls. In fact, firewalls are potentially vulnerable to attacks including spoofing trusted
IP addresses, denial of service by overloading the firewall with excessive requests or
malformed packets, sniffing of data that is being transmitted outside the network,
hostile code embedded in legitimate HTTP, SMTP, or other traffic that meet all firewall
rules, etc. Banks can reduce their vulnerability to these attacks through network
configuration and design, sound implementation of its firewall architecture that includes
multiple filter points, active firewall monitoring and management, and integrated
security monitoring. In many cases, additional access controls within the operating
system or application will provide additional means of defense.
Given the importance of firewalls as a means of access control, good firewall related
practices include:
Using a rule set that disallows all inbound and outbound traffic that is not
specifically allowed Using NAT and split DNS to hide internal system names and
addresses from external networks
Using proxy connections for outbound HTTP connections and filtering malicious
code
Backing up firewalls to internal media and not backing up the firewall to servers
on protected networks
Logging activity, with daily administrator review and limiting administrative
access to few individuals
Using security monitoring devices and practices to monitor actions on the
firewall and to monitor communications allowed through the firewall
Perimeters may contain proxy firewalls or other servers that act as a control point for
Web browsing, e-mail, P2P, and other communications. Those firewalls and servers
frequently are used to enforce the institution’s security policy over incoming
communications. Enforcement is through anti-virus, antispyware, and anti-spam
filtering, the blocking of downloading of executable files, and other actions. To the
extent that filtering is done on a signature basis, frequent updating of the signatures
may be required, as had been explained earlier.
Perimeter servers also serve to inspect outbound communications for compliance with
the institution’s security policy. Perimeter routers and firewalls can be configured to
enforce policies that forbid the origination of outbound communications from certain
computers. Additionally, proxy servers could be configured to identify and block
customer data and other data that should not be transmitted outside the security
domain.
The goal of an IDS is to identify network traffic in near real time. Most IDSs use
signatures to detect port scans, malware, and other abnormal network
communications. The ideal placement of an IDS is external to the organization as well
as internally, just behind the firewall. This would enable a bank to view the traffic
approaching the organization as well as the traffic that successfully passed through the
firewall. Conversely, there will be visibility on internal traffic trying to communicate
externally to the network – particularly useful for situations where malicious activity
originates from inside the firewall.
To use a network IDS (NIDS) effectively, an institution should have a sound
understanding of the detection capability and the effect of placement, tuning, and other
network defences on the detection capability.
The signature-based detection methodology reads network packets and compares the
content of the packets against signatures, or unique characteristics, of known attacks.
When a match is recognized between current readings and a signature, the IDS
generates an alert. A weakness in the signaturebased detection method is that a
signature must exist for an alert to be generated. Signatures are written to either
capture known exploits, or to alert to suspected vulnerabilities. Vulnerability-based
detection is generally broad based, alerting on many exploits for the same vulnerability
and potentially alerting on exploits that are not yet known which is not the case with
exploit-based signatures which may be based on specific exploits only and may not
alert when a new or previously unknown exploit is attempted.
This problem can be particularly acute if the institution does not continually update its
signatures to reflect lessons learned from attacks on itself and others, as well as
developments in attack tool technologies. It can also pose problems when the
signatures only address known attacks. Another weakness is in the capacity of the
NIDS to read traffic. If the NIDS falls behind in reading network packets, traffic may be
allowed to bypass the NIDS. Such traffic may contain attacks that would otherwise
cause the NIDS to issue an alert.
The anomaly -based detection method generally detects deviations from a baseline.
The baseline can be either protocol- based, or behaviour-based. The protocol-based
baseline detects differences between the detected packets for a given protocol and the
Internet’s RFCs (Requests for Comment) pertaining to that protocol. For example, a
header field could exceed the RFC-established expected size.
The behaviour -based anomaly detection method creates a statistical profile of normal
activity on the host or network. Normal activity generally is measured based on the
volume of traffic, protocols in use, and connection patterns between various devices.
Benchmarks for activity are established based on that profile. When current activity
exceeds the identified boundaries, an alert is generated. Weaknesses in this system
involve the ability of the system to accurately model activity, the relationship between
valid activity in the period being modelled and valid activity in future periods, and the
potential for malicious activity to take place while the modelling is performed. This
method is best employed in environments with predictable, stable activity.
Because the placement is meant to gain intelligence on attackers rather than to alert on
attacks, tuning generally makes the NIDS less sensitive than if it is placed inside the
firewall. A NIDS outside the firewall will generally alert on the greatest number of
unsuccessful attacks while NIDS monitoring behind the firewall is meant to detect and
alert on hostile intrusions. Multiple NIDS units can be used, with placement determined
by the expected attack paths to sensitive data. In general, the closer the NIDS is to
sensitive data, the more important the tuning, monitoring, and response to NIDS alerts.
It is generally recommended that NIDS can be placed at any location where network
traffic from external entities is allowed to enter controlled or private networks.
“Tuning” refers to the creation of signatures and alert filters that can distinguish
between normal network traffic and potentially malicious traffic apart from involving
creation and implementation of different alerting and logging actions based on the
severity of the perceived attack. Proper tuning is essential to both reliable detection of
attacks and the
enabling of a priority-based response. If IDS is not properly tuned, the volume of alerts
it generates may degrade the intrusion identification and response capability.
Switched networks pose a problem for a network IDS since the switches ordinarily do
not broadcast traffic to all ports while NIDS may need to see all traffic to be effective.
When switches do not have a port that receives all traffic, a bank may have to alter its
network to include a hub or other device to allow the IDS to monitor traffic. Encryption
poses a potential limitation for a NIDS. If traffic is encrypted, the NIDS’s effectiveness
may be limited to anomaly detection based on unencrypted header information. This
limitation can by overcome by decrypting packets within the IDS at rates
commensurate with the flow of traffic. Decryption is a device-specific feature that may
not be incorporated into all NIDS units.
All NIDS detection methods result in false positives (alerts where no attack exists) and
false negatives (no alert when an attack does take place). While false negatives are
obviously a concern, false positives can also hinder detection. When security personnel
are overwhelmed with the number of false positives, their review of NIDS reports may
be less effective thereby allowing real attacks to be reported by the NIDS but not
suitably acted upon. Additionally, they may tune the NIDS to reduce the number of false
positives, which may increase the number of false negatives. Risk-based testing is
necessary in this regard to ensure the detection capability is adequate.
Network Intrusion Prevention Systems (NIPS) are an access control mechanism that
allow or disallow access based on an analysis of packet headers and packet payloads.
They are similar to firewalls because they are located in the communications line,
compare activity to pre-configured decisions of the type of packets to filter or block, and
respond with pre-configured actions. The IPS units generally detect security events in a
manner similar to IDS units and are subject to the same limitations. After detection,
however, the IPS unit have the capability to take actions beyond simple alerting to
potential malicious activity and logging of packets such as blocking traffic flows from an
offending host. The ability to sever communications can be useful when the activity can
clearly be identified as malicious. When the activity cannot be clearly identified, for
example where a false positive may exist, IDS-like alerting commonly is preferable to
blocking. Although IPS units are access control devices, many of these units implement
a security model that is different from firewalls. Firewalls typically allow only the traffic
necessary for business purposes, or only “known good” traffic. IPS units typically are
configured to disallow traffic that triggers signatures, or “known bad” traffic, while
allowing all else. However, IPS units can be configured to more closely mimic a device
that allows only “known good” traffic. IPS units also contain a “white list” of IP
addresses that should never be blocked. The list helps ensure that an attacker cannot
achieve a denial of service by spoofing the IP of a critical host.
d) Quarantine
Quarantining a device protects the network from potentially malicious code or actions.
Typically, a device connecting to a security domain is queried for conformance to the
domain’s security policy. If the device does not conform, it is placed in a restricted part
of the network until it does conform. For example, if the patch level is not current, the
device is not allowed into the security domain until the appropriate patches are
downloaded and installed.
e) DNS Placement
Effective protection of the institution’s DNS servers is critical to maintaining the security
of the institution’s communications. Much of the protection is provided by host security
However, the placement of the DNS also is an important factor. The optimal placement
is split DNS, where one firewalled DNS server serves public domain information to the
outside
and does not perform recursive queries, and a second DNS server, in an internal
security domain and not the DMZ, performs recursive queries for internal users.
In addition to the above, the following are among the factors that need to be followed
for improving the security of networks:
Remote Access:
Banks may sometimes provide employees, vendors, and others with access to the
institution’s network and computing resources through external connections. Those
connections are typically established through modems, the internet, or private
communications lines. The access may be necessary to remotely support the
institution’s systems or to support institution operations at remote locations. In
some cases, remote access may be required periodically by vendors to make
emergency programme fixes or to support a system.
Configure modems not to answer inbound calls, if modems are for outbound
use only Use automated callback features so the modems only call one
number although this is subject to call forwarding schemes
Install a modem bank where the outside number to the modems uses a different
prefix than internal numbers and does not respond to incoming calls
Banks need to be aware that using VPNs to allow remote access to their systems
can create holes in their security infrastructure. The encrypted traffic can hide
unauthorized actions or malicious software that can be transmitted through such
channels. Intrusion detection systems and virus scanners able to decrypt the traffic
for analysis and then encrypt and forward it to the VPN endpoint should be
considered as preventive controls. A good practice will terminate all VPNs to the
same end-point in a so called VPN concentrator, and will not accept VPNs directed
at other parts of the network.
Distributed Denial of service attacks(DDoS/DoS):
The best known ISMS is described in ISO/IEC 27001 and ISO/IEC 27002 and
related standards published jointly by ISO and IEC. ISO 27001 is concerned with
how to implement, monitor, maintain and continually improve an Information
Security Management System while ISO 27002 provides detailed steps or a list
of security measures which can be used when building an ISMS. Other
frameworks such as COBIT and ITIL though incorporate security aspects, but
are mainly geared toward creating a governance framework for information and
IT more generally. As with all management processes, an ISMS must remain
effective and efficient in the long term, adapting to changes in the internal
organization and external environment. ISO/IEC 27001, thus, incorporates the
typical "Plan-Do-Check-Act" (PDCA), or Deming cycle, approach:
The Plan phase is about designing the ISMS, assessing information security
risks and selecting appropriate controls.
The Do phase involves implementing and operating the controls.
The Check phase objective is to review and evaluate the performance
(efficiency and effectiveness) of the ISMS.
In the Act phase, changes are made where necessary to bring the ISMS
back to peak performance.
An ISMS developed and based on risk acceptance/rejection criteria, and using
third party accredited certification to provide an independent verification of the
level of assurance, is an extremely useful management tool. It offers the
opportunity to define and monitor service levels internally as well as with
contractor/partner organizations, thus demonstrating the extent to which there is
effective control of security risks.
Wireless Security
Shielding the area in which the wireless LAN operates to protect against
stray emissions and signal interference
Monitoring and responding to unauthorized wireless access points and
clients
All wireless Access Points / Base Stations connected to the corporate network
must be registered and approved by Information Security function of a bank. These
Access Points / Base Stations need to subjected to periodic penetration tests and
audits. Updated inventory on all wireless Network Interface Cards used in
corporate laptop or desktop computers must be available. Access points/Wireless
NIC should not be installed /enabled on a bank’s network without the approval of
information security function.
Banks should ensure that each wireless device connected to the network matches
an authorized configuration and security profile, with a documented owner of the
connection and a defined business need. Organizations should deny access to
those wireless devices that do not have such a configuration and profile.
Banks should ensure that all wireless access points are manageable using
enterprise management tools.
Network vulnerability scanning tools should be configured to detect wireless
access points connected to the wired network. Identified devices should be
reconciled against a list of authorized wireless access points. Unauthorized (i.e.,
rogue) access points should be deactivated.
Banks should use wireless intrusion detection systems (WIDS) to identify rogue
wireless devices and detect attack attempts and successful compromise. In
addition to WIDS, all wireless traffic should be monitored by a wired IDS as traffic
passes into the wired network.
Where a specific business need for wireless access has been identified, banks
should configure wireless access on client machines to allow access only to
authorized wireless networks.
Banks should ensure all wireless traffic leverages at least AES encryption used
with at least WPA2 protection. Banks should ensure wireless networks use
authentication protocols such as EAP/TLS or PEAP, which provide credential
protection and mutual authentication. Banks should ensure wireless clients use
strong, multi-factor authentication credentials to mitigate the risk of unauthorized
access from compromised credentials.
Banks should disable peer-to-peer wireless network capabilities on wireless
clients, unless such functionality meets a documented business need.
Banks should disable wireless peripheral access of devices (such as Bluetooth),
unless such access is required for a documented business need.
Banks may consider configuring all wireless clients used to access other critical
networks or handle organization data in a manner so that they cannot be used to
connect to public wireless networks or any other networks beyond those
specifically allowed by the bank.
All computers with wireless LAN devices must utilize a Virtual Private
Network (VPN) that configured to drop all unauthenticated and unencrypted
traffic
Wireless implementations must maintain point-to-point hardware encryption
of at least 128 bits
Supporting a hardware address, like MAC address, that can be registered
and tracked and supporting strong user authentication which checks against
an external database such as TACACS+, RADIUS etc
Events that trigger the implementation of a business continuity plan may have
significant security implications. Depending on the event, some or all of the elements of
the security environment may change. Different tradeoffs may exist between
availability, integrity, confidentiality, and accountability, with a different appetite for risk
on the part of management. Business continuity plans should be reviewed as an
integral part of the security process.
Risk assessments should consider the changing risks that appear in business
continuity scenarios and the different security posture that may be established.
Strategies should consider the different risk environment and the degree of risk
mitigation necessary to protect the institution in the event the continuity plans must be
implemented. The implementation should consider the training of appropriate personnel
in their security roles, and the implementation and updating of technologies and plans
for back-up sites and communications networks. These security considerations should
be integrated with the testing of business continuity plan implementations. More
information on “Business Continuity Planning” is provided in a separate chapter.
Information security assurance
Penetration Testing:
Audits
Assessment
A bank needs to regularly assess information security vulnerabilities and evaluate the
effectiveness of the existing IT security risk management framework, making any
necessary adjustments to ensure emerging vulnerabilities are addressed in a timely
manner. This assessment should also be conducted as part of any material change.
Robust performance evaluation processes are needed to provide organizations with
feedback on the effectiveness of cyber security policy and technical implementation. A
sign of a mature organization is one that is able to self-identify issues, conduct root
cause analyses, and implement effective corrective actions that address individual and
systemic problems. Self-assessment processes that are normally part of an effective
cyber security program include routine scanning for vulnerabilities, automated auditing
of the network, and - assessments of organizational and individual business line
security related performance.
A bank should manage the information security risk management framework on an
ongoing basis as a security programme following project management approach,
addressing the control gaps in a
systematic way.
Banks are responsible for the safety and soundness of the services and
systems they provide to their customers. Reciprocally, it is also important that
customers take appropriate security measures to protect their devices and
computer systems and ensure that their integrity is not compromised when
engaging in online banking. Customers should implement the measures
advised by their banks regarding protecting their devices or computers which
they use for accessing banking services.
Internet banking:
Banks need to ensure suitable security measures for their web applications and take
reasonable mitigating measures against various web security risks indicated earlier in
the chapter.
ii.Web applications should not store sensitive information in HTML hidden fields,
cookies, or any other client-side storage leading to compromise in the integrity of the
data. Critical web applications should enforce at least SSL v3 or Extended Validation –
SSL / TLS 1.0 128 bit encryption level for all online activity.
There is a legal risk in not using the asymmetric cryptosystem and hash function
for authenticating electronic transactions. However, it is observed that some
banks still use weak user id/password based authentication for fund transfers
using internet banking. For carrying out critical transactions like fund transfers,
the banks, at the least, need to implement robust and dynamic two-factor
authentication through user id/password combination and second factor like (a)
a digital signature (through a token containing digital certificate and associated
private key) (preferably for the corporate customers) or (b) OTP/dynamic access
code through various modes (like SMS over mobile phones or hardware token).
To enhance online processing security, confirmatory second channel
procedures(like telephony, SMS, email etc) should be applied in respect of
transactions above pre-set values, creation of new account linkages, registration
of third party payee details, changing account details or revision to funds transfer
limits. In devising these security features, the bank should take into account their
efficacy and differing customer preferences for additional online protection.
Based on mutual authentication protocols, customers could also authenticate the
bank’s web site through security mechanisms such as personal assurance
messages/images, exchange of challenge response security codes and/or the
secure sockets layer (SSL) server certificate verification. In recent times,
Extended Validation Secure Sockets Layer (EV-SSL) Certificates are
increasingly being used. These are special SSL Certificates that work with high
security Web browsers to
clearly identify a Web site's organizational identity. It should, however, be noted
that SSL is only designed to encrypt data in transit at the network transport layer.
It does not provide endto-end encryption security at the application layer.
Changes in mobile phone number may be done through request from a branch
only
Implementation of virtual keyboard
A cooling period for beneficiary addition and SMS and E-mail alerts when new
beneficiaries are added
Customers should be advised to adopt various good security precautions and
practices in protecting their personal computer and to avoid conducting financial
transactions from public or internet café computers.
Specific OTPs for adding new payees: Each new payee should be
authorized by the customer based on an OTP from a second channel which
also shows payee details or the customer’s handwritten signature from a
manual procedure which is verified by the bank.
Individual OTPs for value transactions (payments and fund
transfers) :Each value transaction or an approved list of value transactions
above a certain rupee threshold determined by the customer should require
a new OTP.
Discussed below are some emerging technologies which are increasingly being
adopted/likely to be considered in the near future. However, the security concerns in
respect of such technologies need to be considered.
Virtualization
Background:
Over the last 10 years, the trend in the data center has been towards decentralization,
also known as horizontal scaling. Centralized servers were seen as too expensive to
purchase and maintain. Due to this expense, applications were moved from a large
shared server to their own physical machine. Decentralization helped with the ongoing
maintenance of each application, since patches and upgrades could be applied without
interfering with other running systems. For the same reason, decentralization improves
security since a compromised system is isolated from other systems on the network.
Challenges of Virtualization
There is a misconception that if we virtualize, let's say, a Windows 2003 Server, that
virtualized system should be secure because it is completely separate from the VM
Server operating system and it could be potentially "protected" by VM Server. This is
not true and there are a lot of aspects one needs to know about virtualization security.
The ultimate attack on a virtual host system would be for a guest system to run
malicious code allowing it to gain elevated privilege and gain access to the underneath
VM Server. If the malicious code could create a new "phantom" virtual machine that
could be controlled by the attacker, they would have full access to the virtual host and
all virtual guests. With this form of "hyperjacking", the attacker would be invisible to
traditional virtualization management software and security tools. From there, the
attacker would perform a DoS (denial of service) attack by overloading the virtual guest
systems.
The below covers full virtualization environments that are most commonly used in
servers. A few major indicative measures are provided below. Additionally, detailed
vendor recommended security measures may be followed.
Cloud Computing
The term cloud computing probably comes from the use of a cloud image to represent
the Internet or some large networked environment. We don’t care much what’s in the
cloud or what goes on there except that we get the services we require. Service may
include software, platform or infrastructure.
At the backend, cloud computing can make use of virtualization and grid computing. In
grid computing, networked computers are able to access and use the resources of
every other computer on the network.
Cloud Computing Concerns
Perhaps the biggest concerns about cloud computing are security and privacy. The
idea of handing over important data to another company worries some people.
Corporate executives might hesitate to take advantage of a cloud computing system
because they can't keep their company's information under lock and key.
Privacy is another matter. If a client can log in from any location to access data and
applications, it's possible the client's privacy could be compromised. Cloud computing
companies will need to find ways to protect client privacy by implementing reliable
authentication techniques.
A cloud computing system must ensure backup of all its clients' information.
Some questions regarding cloud computing are more legal. Does the user or company
subscribing to the cloud computing service own the data? Does the cloud computing
system, which provides the actual storage space, own it? Is it possible for a cloud
computing company to deny a client access to that client's data? Several companies,
law firms and universities are debating these and other questions about the nature of
cloud computing. Thus, there are issues relating to data security and privacy,
compliance and legal/contractual issues.
The cloud provider often takes responsibility for information handling, which is a
critical part of the business. Failure to perform to agreed-upon service levels can
impact not only confidentiality but also availability, severely affecting business
operations.
Service providers must demonstrate the existence of effective and robust security
controls, assuring customers that their information is properly secured against
unauthorized access, change and destruction. Key questions to decide are: What
employees (of the provider) have access to customer information? Is segregation of
duties between provider employees maintained? How are different customers’
information segregated? What controls are in place to prevent, detect and react to
breaches
IS AUDIT
Introduction:
In the past decade, with the increased technology adoption by Banks, the complexities
within the IT environment have given rise to considerable technology related risks
requiring effective management.
This led the Banks to implement an Internal Control framework, based on various
standards and its own control requirements and the current RBI guidelines. As a result,
Bank’s management and RBI, need an assurance on the effectiveness of internal
controls implemented and expect the IS Audit to provide an independent and objective
view of the extent to which the risks are managed.
As a consequence, the nature of the Internal Audit department has undergone a major
transformation and IS audits are gaining importance as key processes are automated,
or enabled by technology. Hence, there is a need for banks to re-assess the IS Audit
processes and ensure that IS Audit objectives are effectively met.
Board of Directors and senior management are responsible for ensuring that an
institution’s system of internal controls operates effectively. One important element of
an effective
internal control system is an internal audit function that includes adequate IT coverage.
To meet its responsibility of providing an independent audit function with sufficient
resources to ensure adequate IT coverage, the Board, or its Audit Committee, should
enable an internal audit function, capable of evaluating IT controls adequately.
Bank's compliance with legal and regulatory requirements such as (among others)
Information Technology Act-2000, Information Technology (Amendment) Act-
2008, Banker's Books
(Evidence) Act-1891, The Banking Regulation Act-1949, Reserve Bank of India
Act-1934 and RBI circulars and guidelines
Performance of IS Audit
Internal Audit is a part of the Board’s assurance process with regard to the integrity
andeffectiveness of systems and controls. It is an independent group that reports
directly to the Audit Committee or the Board of Directors. IS Audit, being an integral part
of Internal Audit, requires an organisation structure with well-defined roles which needs
to function in alignment with the Internal Audit, and provide technical audit support on
key focus areas of audit or its universe, identified by an Internal Audit department. A
well-defined IS Audit organisation structure ensures that the tasks performed fulfill a
bank’s overall audit objective, while preserving its independence, objectivity and
competence.
In this regard, banks require a separate IS Audit function within an Internal Audit
department led by an IS Audit Head reporting to the Head of Internal Audit or Chief
Audit Executive (CAE). The personnel needs to assume overall responsibility and
accountability of IS Audit functions. Where the bank leverages external resources for
conducting IS Audit on areas where skills are lacking, the responsibility and
accountability for such external IS Audits still remain with the IS Audit Head and CAE.
Because the IS Audit is an integral part of the Internal Auditors, auditors will also be
required to be independent, competent and exercise due professional care.
related to the audit, the IS Audit should be independent of the auditee, both in attitude
and appearance. The Audit Charter or Policy, or engagement letter (in case of external
professional service provider), should address independence and accountability of the
audit function. In case independence is impaired (in fact or appearance), details of the
impairment should be disclosed to the Audit Committee or Board. Independence should
be regularly assessed by the Audit Committee. In case of rotation of audit staff
members from IT department to the IS Audit, care should be taken to ensure that the
past role of such individuals do not impact their independence and objectivity as an IS
Auditor.
Auditors have the right to conduct independent data inspection and analysis
Due Professional Care: IS Auditors should exercise due professional care, which
includes following the professional auditing standards in conducting the audit. The IS
Audit Head should deal with any concerns in applying them during the audit. IS
Auditors should maintain the highest degree of integrity and conduct. They should not
adopt methods that could be seen as unlawful, unethical or unprofessional to obtain or
execute an audit.
Audit Charter or Policy is a document, which guides and directs activities of an internal
audit function. IS Audit, being integral part of an Internal Audit department, should also
be governed by the same charter or policy. The charter should be documented to
contain a clear description of its mandate, purpose, responsibility, authority and
accountability of relevant members or officials in respect of the IS Audit (namely the IS
Auditors, management and Audit Committee) apart from the operating principles. The
IS Auditor will have to determine how to achieve the implementation of the applicable
IS Audit standards, use professional judgment in their application, and be prepared to
justify any departure therefrom.
Responsibility:
Mission Statement
Scope or Coverage
Audit Methodology
Objectives
Independence
Relationship with External Audit
Auditee’s Requirements
Critical Success Factors
Key Performance Indicators
Other Measures of Performance
Providing Assurance on Control Environment
Reviewing Controls on Confidentiality, Integrity and Availability of Data or Systems
Authority:
Risk Assessment
Mandate to perform an IS Audit
Allocation of resources
Right to access the relevant information, personnel, locations and systems
Scope or limitations of scope
Functions to be audited
Auditee’s expectations
Organizational structure
Gradation of IS Audit Officials or Staff
Auditees’ Rights
Independent Quality Reviews
Assessment of Compliance with Standards
Benchmarking Performance and Functions
Assessment of Completion of the Audit Plan
Agreed Actions (e.g. penalties when either party fails to carry out responsibilities)
Co-ordinate with and provide Oversight over other control functions like risk
management, security and compliance
The policy should also cover Audit Rating Methodology and Quality Assurance
Reviews. There should also be annual review of IS Audit Policy or Charter to ensure
continued relevance.
Determining relationship between the service offered, and the needs of the auditee
The Audit Charter forms a basis for communication with an auditee. It should include
relevant references to service-level agreements for aspects like the following, as
applicable:
Availability for Unplanned Work
Delivery of reports
Costs
Quality of Service
Review of Performance
Needs Assessment
Reporting Process
Agreement of Findings
Engagement letters are often used for individual assignments. They set out the scope
and objectives of a relationship between an external IS audit agency and an
organisation. The letter should address the three aspects of responsibility, authority and
accountability.
Planning an IS Audit
(a) Introduction
However, in the changing scenario, there is an increased need for widening, as well as
redirecting, the scope of Internal Audit to evaluate the adequacy of IT Risk
Management procedures and internal control systems. To achieve these, banks are
moving towards risk-based internal audit, which include, in addition to selective
transaction testing, an evaluation of the Risk Management systems and control
procedures prevailing in a bank’s operations.
Defining the IS Audit Universe: This covers the IS Audit Universe, which defines the
areas to be covered
Scoping for IS Audit: This addresses the scoping requirements and includes:
Defining control objectives and activities
Considering materiality
RBI issued the “Guidance Note on Risk-based Internal Audit” in 2002 to all scheduled
commercial banks, introducing the system of “risk-based internal audit”.
Development of risk profile and drawing up of risk matrix taking inherent business
risk and effectiveness of the control system for monitoring the risk
Preparation of annual audit plan, covering risks and prioritization, based on level
and direction of each risk
Setting up of communication channels between audit staff and management, for
reporting issues that pose a threat to a bank’s business
Periodic evaluation of the risk assessment methodology
The overall plan, arrived at, using the risk assessment approach enables the Internal
Audit to identify and examine key business areas that have highest exposure and
enables effective allocation of Audit resources. As stated earlier, IS Audit, being an
integral part of the Internal Audit, there is a need for IS Auditors to focus on the IT risks,
related to the high-risk business areas identified by the Internal Audit for review during
a year. This enables the IS Audit to provide an assurance to the management on the
effectiveness of risk management and internal controls underlying the high-risk
business processes, which when read in conjunction with the Internal Audit reports,
provides a holistic view of the effectiveness.
Further, while identifying IT risks, an IS Auditor must consider the impact of non-
alignment with any information security-related guidelines issued by RBI based on
recommendations in Chapter 2 of this report. It should also be ensured that all systems,
domains and processes, irrespective of their risklevels, are covered within a period of
three years.
(c) Adopting a Suitable Risk Assessment Methodology
The IS Auditor must define, adopt and follow a suitable risk assessment methodology.
This should be in consonance with the focus on risks, to be addressed as a part of the
overall Internal Audit Strategy.
Major risk factors used in scoring systems include: Adequacy of internal controls,
business criticality, regulatory requirements, amount or value of transactions
processed, if a key customer information is held, customer facing systems, financial
loss potential, number
On the basis of risk matrix of business criticality and system or residual risk,
applications or systems can be graded, based on where they fall on the “risk map” and
accordingly their audit frequency can be decided. Banks should develop written
guidelines on the use of risk assessment tools and risk factors and review these with
the Audit Committee or the Board. Risk assessment guidelines will vary for banks
depending on size, complexity, scope of activities, geographic diversity and technology
systems used. Auditors should use the guidelines to grade major risk areas and define
range of scores or assessments
(e.g., groupings such as low, medium, or high risk or a numerical sequence such as 1
to 5).
Maximum length for audit cycles based on the risk assessment process: For
example, very high to high risk applications audit cycle can be at a frequency
ranging from six months upto 12, medium risk applications can be 18 months (or
below) and up to 36 months for low-risk areas. Audit cycles should not be open-
ended.
Timing of risk assessments for each business area or department: While risk
assessment is expected to be on an annual basis, frequent assessments may
be needed if an institution experiences rapid growth or change in operation or
activities.
IS Auditors should periodically review results of internal control processes and analyse
financial or operational data for any impact on a risk assessment or scoring.
Accordingly, auditee units should be required to keep auditors up-to- date on major
changes, such as introduction of a new product, implementation of a new system,
application conversions, significant changes in organisation or staff, regulatory and
legal requirements, security incidents.
An Audit Universe is an outcome of the risk assessment process. It defines the audit
areas to be covered by the IS Auditor. It is usually a high-level structure that identifies
processes, resources, risks and controls related to IT, allowing for a risk-based
selection of the audit areas. The IT risks faced by banks due to emerging technologies,
prioritisation of IS Audit Universe, selection of types of audits that need to be
performed, optimisation of available resources, and ensuring quality of findings, are
challenges faced by IS Audit.
The IS Audit Universe can be built around the four types of IT
The challenge is to provide the “right level of granularity” in the definition of the
universe, so as to make it effective and efficient.
Though this is different for every bank, below are some of the
considerations for defining IS Audits:
Using overly-broad definitions for IS Audits (e.g. IT general controls) will ensure a
scope creep in audit procedures. The IS Audit Head should make sure that the
definition of each IS Audit is an accurate description of what is being reviewed.
Audit Universe for a year should touch upon all layers in the IT environment.
Though each IT environment is different, layers tend to be the same. If an IS
Audit plan does not include some review for each of the layers, odds are that the
plan, as a whole, is deficient.
IS Audits should be structured in such a way as to provide for effective and logical
reporting. For example: IS Audits of pervasive technologies (e.g. networks or
processes) are more effective when audited at an enterprise level.
IS Audits should address appropriate risks. In many cases, IS Audit budgets are
determined before the IT risk assessment is performed. This inevitably leads to
one of two situations:
Information gathered by the IS Auditors during IT risk assessment about the IT system
processing and operational environment, threats, vulnerabilities, impact and controls,
enables identification of the control objectives and activities to be tested for design and
implementation effectiveness and its operating effectiveness.
Scoping plays a crucial role in overall effectiveness. This is exacerbated by the need
for the IS Auditors to integrate with the process, operational or financial auditors, and
the procedures they are performing, particularly in environments with large integrated
CBS applications, where a high number of key process controls are contained within
the systems. (An illustrative list of areas which can form a part of IS
Audit scope are given in Annex-B.)
IS Audits should also cover branches, with focus on large and medium branches, in
areas such as control of passwords, user ids, operating system security, anti-malware,
maker-checker, segregation of duties, physical security, review of exception reports or
audit trails, BCP policy and or testing.
Reports and circulars issued by RBI for specific areas which also
need to be covered in the
IS Audit Scope:
Report of the Committee on Computer Audit (dated: April 2, 2002) Circular
on Information System Audit–A Review of Policies and Practices
IT control objectives, based on well known frameworks can be included in the scope.
Materiality
In planning and performing an audit to reduce risks to a low level, the auditor should
consider the risk of irregularities and illegal acts. He should maintain professional
skepticism during an audit, recognising the possibility that “material mis-statements due
to irregularities and illegal acts” could exist, irrespective of their evaluation of risk of
irregularities and illegal acts.
IS Auditors are also required to consider and assess the risk of fraud, while performing
an audit. They should design appropriate plans, procedures and tests, to detect
irregularities, which can have a material effect on either a specific area under an audit,
or the bank as a whole. IS Auditors should consider whether internal control
weaknesses could result in material irregularities, not being prevented or detected. The
auditor should design and perform procedures to test the appropriateness of internal
control and risk of override of controls. They should be reasonably conversant with
fraud risk factors and indicators, and assess the risk of irregularities connected with the
area under audit.
business
Technical sophistication and complexity of the information system(s) supporting the
area under audit
The IS Audit Head is responsible for the annual IS Audit Plan, prepared after
considering the risk assessment and scoping document. The plan covers overall audit
strategy, scoped areas, details of control objectives identified in the scoping stage,
sample sizes, frequency or timing of an audit based on risk assessment, nature and
extent of audit and IT resource skills availability, deployment and need for any external
expertise. A report on the status of planned versus actual audits, and any changes to
the annual audit plan, needs to be periodically presented to Audit Committee and
Senior Management on a periodic basis.
Scoped Systems: Identified IT resources that are in the scope based on the risk
assessment process
System Overview: Details of System Environment based on the risk assessment
process
Audit Details: Details of risks and controls identified, based on the risk assessment
process
Nature and Extent of Tests: Controls testing for effectiveness of design and
implementation of controls, substantive testing for operating effectiveness of
controls implemented
Method of Internal Audit: Brief audit approach and methodology
Team and Roles and Responsibilities: Identified skills and names of IS Auditors
including their roles and responsibilities
Co-ordination: Names of the project lead and higher official for escalation of
Test of Control Implementation: Tests are performed to confirm that the control that
has been appropriately designed is implemented and is operating at the time of
testing. Mitigating or compensating controls are also reviewed wherever
necessary
On case-to -case basis, the auditor should exercise professional judgment and decide
the nature and extent of procedures that need to be adopted for conclusions. ISA 330
gives guidance on the nature, timing and extent of procedures.
During an audit, auditors should obtain sufficient, reliable and relevant evidence to
achieve their objectives. Findings and conclusions should be supported by appropriate
analysis and interpretation. Auditors should consider sample selection techniques,
which result in a statistically-based representative sample for performing compliance or
substantive testing. Statistical sampling involves the use of techniques from which
mathematically-constructed conclusions regarding the population can be drawn. Non-
statistical sampling is not statistically -based. Its results should not be extrapolated over
the population as a sample is unlikely to be representative of the population. Examples
of compliance testing of controls where sampling could be considered, include user-
access rights, programme change control procedures, procedures documentation,
programme documentation, follow-up of exceptions, review of logs and software
licences audits. Examples of substantive tests where sampling could be considered,
include re-performance of a complex calculation (e.g., interest applied), on a sample of
accounts, sample of transactions to vouch to supporting documentation, etc.
Design of A Sample
characteristics, explicitly defined, so that each sample unit can belong to only one
stratum.
Selection of A Sample
One challenge that the IS Auditors face is knowing what to audit against as a
However, this does not detract from the concept of control objectives.
Resource Management
The main issue is having staff with the requisite range of IS Audit skills, needed to audit
an IS Audit universe, effectively. If internal expertise is inadequate, the Board should
consider using qualified external sources, such as management consultants,
independent auditors, or professionals, to supplement internal resources and support
bank's objectives.
Executing IS Audit
As mentioned earlier, auditors must understand the business and IT environment, risks
and internal control framework. During audit, auditors should obtain evidences, perform
test
ICAI, in March 2009, had published a “Standard on Internal Audit (SIA) 14: Internal
Audit in an Information Technology Environment” covering the requirements of
executing a plan that an IS
Auditor should follow. Additionally, IIA has also provided guidance in their “Management
of IS Auditing” under their “Global Technology Audit Guide” series. The ITGI has also
provided guidance on execution of assurance initiative in its “IT Assurance Guide Using
COBIT”.
The first step of the execution stage is refining the understanding of an IT environment,
in which a review is being planned. This implies understanding of a bank’s business
processes to confirm the correct scope and control objectives. The scope of the IS
Audit need to be communicated to and agreed upon by stakeholders.
The IS Auditor can structure this step along the following lines:
Collect and read process description, policies, input or output, issues, meeting
minutes, past audit reports, past audit recommendations, business reports
Prepare a scoping task (process objective, goals and metrics)
This section lists the different techniques that will be used in detailed audit steps.
Testing of controls is performed covering the main test objectives:
In the testing phase, different types of testing can be applied. Five generic testing
methods include enquire and confirm, inspect, compare actual with expected findings,
re-perform or re-calculate and review automated evidence collection through analyzing
date using computer assisted audit techniques and extracting exceptions or key
transactions.
The auditor should obtain direct or indirect evidence for selected items or periods to
ensure that the control under review is working effectively by applying a selection of
testing techniques as presented in step on test of control design. The IS Auditor should
also perform a limited review of the adequacy of the process deliverables, determine
the level of substantive testing and additional work needed to provide assurance that
the IT process is adequate. Substantive testing would involve performing analytical
procedures and tests of details, to gain assurance on areas where control weaknesses
are observed. Substantive testing is performed to ascertain the actual impact of control
weaknesses.
IS Auditors should obtain sufficient and reliable audit evidence to draw reasonable
conclusions on which to base the audit results.
When information produced by a bank is used by auditors, they should obtain evidence
about the completeness and accuracy by the following means:
Performing tests of the operating effectiveness of controls over the production and
maintenance of information, to be used as audit evidence
Auditors should consider the following controls over production and maintenance of
information produced by a bank:
– Controls over the integrity, accuracy, and completeness of the source data
– Controlsover the creation and modification of the applicable report logic and
parameters
(f) Documentation
Audit evidence gathered should be documented and organised to support findings and
conclusions. IS Audit documentation is a record of the work performed and evidence
supporting findings and conclusions.
– Supervisory review
Extent of an IS Auditor’s documentation may depend on needs for a
particular audit and should include such things as:
IS Auditor’s understanding of an area to be audited, and its environment
Maintain effective controls over processing and distribution of reports relating to the
IS Audit
Since IS Audit budgets can be difficult to estimate and manage, CAEs can consider
using testing accelerators—tools or techniques that help support procedures that the IS
Auditors will be performing —to increase efficiency and effectiveness. CAEs can use an
accelerator to do the same audit in less time, or do more detailed audit procedures in
the same amount of time. Audit accelerators can be divided into two categories:
Audit Facilitators
Testing Accelerators
Testing accelerators can automate time-consuming audit tasks, such as reviewing large
populations of data. Also, using a tool to perform audit procedures helps establish
consistency. For example, if a tool is used to assess server security configuration,
servers tested with that tool will be assessed along the same baselines. Performing
these procedures manually allows for a degree of interpretation on the part of the IS
Auditor. Lastly, the use of tools enables IS Auditors to test an entire population of data,
rather than just a sample of transactions. This provides for a much higher degree of
audit assurance.
Data Analysis Software: These allow an auditor to perform robust statistical analysis of
large data sets. They can also be used to support process or operational audits like
KYC reviews. They can support types of testing. One consideration when using a data
analysis tool is that it may be difficult to extract the data from the original source. It is
critical that audit procedures be performed to ensure the completeness and accuracy of
the source data.
Security Analysis Tools: These are a broad set of tools that can review a large
population of devices or users and identify security exposures. There are different types
of security analysis tools. Generally they can be categorised as follows:
Gathering information about what traffic is permitted across a network (which would
directly support the IT risk assessment process).
Hacking Tools: Most technologies have a number of standard vulnerabilities,
such asthe existence of default IDs and passwords or default settings when the
technology is installed out-of-the-box. Hacking tools provide for an automated
method of checking for these. Such tools can be targeted against Firewalls,
servers, networks and operating systems.
The CAE should be aware that most of these come with a set of pre-configured rules,
or vendortouted “best practices”. Implementation of one will need to be accompanied
by a substantive project to create a rule set that is relevant for that particular
organisation. Failure to do so will result in audit reports that contain a number of either
false-positives or false-negatives.
Tools cost money. The CAE should be sure that the benefits outweigh the costs
That IS Auditors will need to be trained on the new tool. It is not uncommon that a
tool sits unused in an Internal Audit Department
That the tool will need support, patch management and upgrades. Depending on
the quality, it may require a standalone server, as well. For this, any tool
selection should be managed with the IT department’s assistance
Sometimes, IT management or third -party service providers are not allowed tools to
access the production environment directly. They are instead asked to do so from a
copy of data from an alternative site, or standby server. Any use of tools or scripts
should be thoroughly discussed with and approved by IT management and be tested
fully before deploying.
CAATs may be used in critical areas ( like detection of revenue leakage, treasury
functions, assessing impact of control weaknesses, monitoring customer transactions
under AML requirements and generally in areas where a large volume of transactions
are reported).
Obtain access to the bank’s IS facilities, programmes, systems and data, including
file definitions
Document CAATs to be used, including objectives, high-level flowcharts, and run
instructions
CAATs may be used to perform the following audit procedures
among others:
– Test of transactions and balances, such as recalculating
interest
– Penetration testing
IS Auditors should use and document results of appropriate procedures to provide for
ongoing integrity, reliability, usefulness and security of the CAATs. Example: this should
include a review of programme maintenance and change controls over embedded audit
software to determine that only authorised changes were made to the CAATs.
In instances where CAATs reside in an environment not under the control of the IS
Auditor, an appropriate level of control should, in effect, be placed to identify changes.
When the CAATs are changed, IS Auditors should obtain assurance of their integrity,
reliability, usefulness and security, through appropriate planning, design, testing,
processing and review of documentation, before placing their reliance.
Finally, with continuous auditing, the analysis results are integrated into all aspects of
the audit process, from the development and maintenance of the enterprise audit plan
to the conduct and follow-up of specific audits. Depending on the level of
implementation and
Where weaknesses identified during the application systems review are considered
IS Auditors should, where appropriate, consider using the work of other experts for
audit
They should assess, and then be satisfied with professional qualifications,
competencies, relevant experience, resources, independence and quality control
processes, prior to engagement
They should assess, review and evaluate work of experts, as a part of an audit, and
then conclude the extent of use and reliance of the work
They should determine and conclude whether the work of experts is adequate and
competent to enable them to conclude on current audit objectives. Such
conclusion should be documented
They should apply additional test procedures to gain and include scope limitation,
where required evidence is not obtained through additional test procedures
An expert could be an IS Auditor from external auditing firm, a management
consultant, an IT domain expert, or an expert in the area of audit, who has been
appointed by management or by the IS Audit Team
An IS Auditor should have access to all papers, supporting documents and reports
of other experts, where such access does not create legal issues. Where access
creates legal issues, or such papers are not accessible, auditors should
determine and conclude on the extent of use and reliance on expert’s work
The IS Auditor’s views, relevance and comments on adopting the expert’s report
should form a part of the IS Auditor’s Report
A bank may use a third-party service provider (service organisation) to obtain services
of packaged software applications and technology environment, which enables
customers to process financial and operational transactions (ATM management,
networking and infrastructure development and maintenance, document imaging and
indexing, software development and maintenance). RBI has issued “Guidelines on
Managing Risks and Code of Conduct in Outsourcing of Financial Services by Banks”
(circular no:DBOD.NO.BP.40/21.04.158/ 2006-07 dated November 3,
2006), asking banks to adhere toguidelines before outsourcing activities related to
financial services.
Services provided by a third party are relevant to the scope of IS Audit. Especially,
when those services and controls within them, are a part of the bank’s information
systems. Though controls at the service organisation are likely to relate to financial
reporting, there may be other controls that may also be relevant to the IS Audit
(controls over safeguarding of assets or document images).
The way events and conditions, other than transactions, significant to bank’s
Information System are captured
User manual
System overview
Technical manuals
IS Auditors may use a service auditor to perform procedures such as tests of controls
Reporting and
Follow-up
by a service organisation. 5)
This phase involves reporting audit findings to the CAE and Audit Committee. Before
reporting the findings, it is imperative that IS Auditors prepare an audit summary
memorandum providing overview of the entire audit processing from planning to audit
findings, discuss the findings with auditee and obtain responses. Additionally, reviewing
the actions taken by management to mitigate the risks observed in audit findings and
appropriately updating the audit summary memorandum is also important. Reporting
entails deciding the nature, timing and extent of follow-up activities and planning future
audits.
Professional bodies like ISACA, IIA, ICAI have issued guidance in this regard.
– Archiving documents
Senior Management may decide to accept the risk of not correcting the reported
condition because of cost or other considerations. The Board (or the Audit
Committee, if one exists) should be informed of Senior Management’s decision on
significant observations and recommendations. When Auditors IS believes that an
organisation has accepted a level of residual risk that is inappropriate for the
organisation, they should discuss the matter with Internal Audit and Senior
Management. If the IS Auditors are not in agreement with the decision, regarding
residual risk, IS Auditors and Senior Management should report the matter to the
Board, or Audit Committee, for resolution.
Events sometimes occur, subsequent to the point in time or period of time of the
subject matter being tested, but prior to the date of the IS Auditor’s report, that have
a material effect on the subject matter and therefore require adjustment or
disclosure in the presentation of the subject matter or assertion.
Major findings identified during an audit should have a definite time line indicated for
remedial actions, these should be followed up intensively and compliance should be
confirmed.
(e) Follow-up
Procedures
Procedures for follow-up activities should be
established which includes:
–Changes in the bank, its environment and banking industry that come to the attention
after the completion of the audit planning memorandum and that caused to change
audit plan –Conclusion regarding the appropriateness of the going concern assumption
and the effect, if any, on financial statements
–The result of subsequent reviews and conclusion regarding the effect of subsequent
events on financial statements
Archival of
(g)
Documents
Banks are recommended to have an archiving/ retention policy to archive the audit
results.
Quality Review
Supervision
Due Care
The standard of “due care” is that level of diligence which a prudent and competent
person would exercise under a given set of circumstances. “Due professional care”
applies to an individual who professes to exercise a special skill such as IS auditing.
Due professional care requires the individual to exercise that skill to a level commonly
possessed by auditors with the specialty.
Due professional care applies to the exercise of professional judgment in the conduct
of work performed. It implies that the professional approaches matters requiring
professional judgment with proper diligence. Despite the exercise of due professional
care and professional judgment, situations may arise where an incorrect conclusion
may be drawn from a diligent review of the available facts and circumstances.
Therefore, the subsequent discovery of incorrect conclusions does not, in and of itself,
indicate inadequate professional judgment or lack of diligence on the part of the IS
Auditor.
Due professional care should extend to every aspect of the audit, including the
evaluation of audit risk, the formulation of audit objectives, the establishment of the
audit scope, the selection of audit tests, and the evaluation of test results.
In doing this, IS Auditors should determine or evaluate:
Significance of identified risks and the potential effect of such risks on the audit
With a view to provide assurance to bank’s management and regulators, banks are
required to conduct a quality assurance, at least once in three years, on the bank's
Internal Audit, including IS Audit function, to validate approach and practices adopted
by them in the discharge of its responsibilities as laid out in the Audit Policy.
Assess efficiency and effectiveness of an Internal Audit for current and future
business goals
Determine value addition from Internal Audit to the business units
Benchmark, identify and recommend, successful practices of Internal Audit
Others:
In this phase we plan the information system coverage to comply with the audit
objectives specified by the Client and ensure compliance to all Laws and Professional
Standards. The first thing is to obtain an Audit Charter from the Client detailing the
purpose of the audit, the management responsibility, authority and accountability of the
Information Systems Audit function as follows:
1. Responsibility: The Audit Charter should define the mission, aims, goals
and objectives of the Information System Audit. At this stage we also define the
Key Performance Indicators and an Audit Evaluation process;
2. Authority: The Audit Charter should clearly specify the Authority assigned
to the Information Systems Auditors with relation to the Risk Assessment work
that will be carried out, right to access the Client’s information, the scope and/or
limitations to the scope, the Client’s functions to be audited and the auditee
expectations; and
The Audit Charter should be approved and agreed upon by an appropriate level within
the Client’s Organization.
Risk is the possibility of an act or event occurring that would have an adverse effect on
the organisation and its information systems. Risk can also be the potential that a given
threat will exploit vulnerabilities of an asset or group of assets to cause loss of, or
damage to, the assets. It is ordinarily measured by a combination of effect and
likelihood of occurrence.
More and more organisations are moving to a risk-based audit approach that can be
adapted to develop and improve the continuous audit process. This approach is used
to assess risk and to assist an IS auditor’s decision to do either compliance testing or
substantive testing. In a risk based audit approach, IS auditors are not just relying on
risk. They are also relying on internal and operational controls as well as knowledge of
the organisation. This type of risk assessment decision can help relate the cost/benefit
analysis of the control to the known risk, allowing practical choices.
The process of quantifying risk is called Risk Assessment. Risk Assessment is useful in
making decisions such as:
Inherent Risk: Inherent risk is the susceptibility of an audit area to error which could be
material, individually or in combination with other errors, assuming that there were no
related internal controls. In assessing the inherent risk, the IS auditor should consider
both pervasive and detailed IS controls. This does not apply to circumstances where
the IS auditor’s assignment is related to pervasive IS controls only. A pervasive IS
Control are general controls which are designed to manage and monitor the IS
environment and which therefore affect all IS-related activities. Some of the pervasive
IS Controls that an auditor may consider include:
• Changes in IS management
• Pressures on IS management which may predispose them to conceal or
misstate information (e.g. large business-critical project over-runs, and hacker
activity)
• The nature of the organisation’s business and systems (e.g., the plans for
electronic commerce, the complexity of the systems, and the lack of integrated
systems)
• The level of third party influence on the control of the systems being audited
(e.g., because of supply chain integration, outsourced IS processes, joint business
ventures, and direct access by customers)
• The integrity, experience and skills of the management and staff involved in
applying the IS controls
Control Risk: Control risk is the risk that an error which could occur in an audit area,
and which could be material, individually or in combination with other errors, will not be
prevented or detected and corrected on a timely basis by the internal control system.
For example, the control risk associated with manual reviews of computer logs can be
high because activities requiring investigation are often easily missed owing to the
volume of logged information. The control risk associated with computerised data
validation procedures is ordinarily low because the processes are consistently applied.
The IS auditor should assess the control risk as high unless relevant internal controls
are:
Identified
• Evaluated as effective
Detection Risk: Detection risk is the risk that the IS auditor’s substantive procedures
will not detect an error which could be material, individually or in combination with other
errors. In determining the level of substantive testing required, the IS auditor should
consider both:
The higher the assessment of inherent and control risk the more audit evidence the IS
auditor should normally obtain from the performance of substantive audit procedures.
The Chat to the right summarises the business process analysis phase.
The template xxx will provide you with a guideline to document an Organisations
Business Sub
Processes identified during the risk analysis phase.For each of the sub-processes, we
identify a list of What Could Go Wrong (WCGW). This WCGW represent the threat
existing on a particular process. A single process would have multiple WCGW’s. For
each of the WCGW’s identified in the prior phase we will determine the Key Activities
within that process.For each Key Activity:
2. For each of the Controls Identified, we would rate the impact/effect of the
lack of that control (on a rating of 1 - 5, with 5 indicating the highest impact),we
will then determine the likelyhood of the threat occuring( also on a rating of 1 - 5
with 5 representing the highest likelyhood).
• We document our work by describing audit work done and audit evidence
gathered to support the auditors’ findings.
Based on our risk assessment and upon the identification of the risky areas, we move
ahead to develop an Audit Plan and Audit Program. The Audit Plan will detail the
nature, objectives, timing and the extent of the resources required in the audit.
2. Specific Controls
The Chat below to the left shows the Control Review Tests that can be performed in the
two Control Tests above.
The Control Objectives for Information and related Technology (COBIT) is a set of best
practices (framework) for information (IT) management created by the Information
Systems Audit and Control Association (ISACA), and the IT Governance Institute (ITGI)
in 1992.
COBIT provides managers, auditors, and IT users with a set of generally accepted
measures, indicators, processes and best practices to assist them in maximizing the
benefits derived through the use of information technology and developing appropriate
IT governance and control in a company.
COBIT helps meet the multiple needs of management by bridging the gaps
between business risks, control needs and technical issues. It provides a best
practices framework for managing IT resources and presents management control
activities in a manageable and logical structure. This framework will help optimise
technology information investments and will provide a suitable benchmark measure.
The Framework comprises a set of 34 high-level Control Objectives, one for each of
the IT processes listed in the framework. These are then grouped into four domains:
planning and organisation, acquisition and implementation, delivery and support,
and monitoring. This structure covers all aspects of information processing and
storage and the technology that supports it. By addressing these 34 high-level
control objectives, we will ensure that an adequate control system is provided for
the IT environment. A diagrammatic representation of the framework is shown
below.
We shall apply the COBIT framework in planning, executing and reporting the
results of the audit. This will enable us to review the General Controls Associated
with IT Governance Issues. Our review shall cover the following domains;
• Planning and organisation of information resources;
• The planning and acquisition of systems and path in stage growth model
of information systems;
The above control objectives will be matched with the business control objectives to
apply specific audit procedures that will provide information on the controls built in
the application, indicating areas of improvement that we need to focus on achieving.
• Applications Security
• Whether the application performs as expected
The Information Systems Audit Standards require us that during the course of an
audit, the IS auditor should obtain sufficient, reliable and relevant evidence to
achieve the audit objectives. The audit findings and conclusions are to be supported
by the appropriate analysis and interpretation of this evidence. CAATs are useful in
achieving this objective.
Computer Assisted Audit Techniques (CAATs) are important tools for the IS auditor
in performing audits.They include many types of tools and techniques, such as
generalized audit software, utility software, test data, application software tracing
and mapping, and audit expert systems.For us, our CAATs include ACL Data
Analysis Software and the Information Systems Audit Toolkit(ISAT).
CAATs may produce a large proportion of the audit evidence developed on IS audits
and, as a result, the IS auditor should carefully plan for and exhibit due professional
care in the use of CAATs.The major steps to be undertaken by the IS auditor in
preparing for the application of the selected CAATs are:
and run instructions Make appropriate arrangements with the Auditee and
ensure that:
1. Data files, such as detailed transaction files are retained and made
available before the onset of the audit.
See Template here for example tests that you can perform with ACL
PHASE 4: Reporting
Upon the performance of the audit test, the Information Systems Auditor is required
to produce and appropriate report communicating the results of the IS Audit. An IS
Audit report should:
2. State the scope, objectives, period of coverage, nature, timing and the
extend of the audit work
The Information Systems (IS) audit group assesses the University's critical systems,
technology architecture and processes to assure information assets are protected,
reliable, available and compliant with University policies and procedures, as well as
applicable laws and regulations. We emphasize the importance of mitigating
security risks during our audit coverage of the University’s application, operating
and networking systems. Through our integrated and IT governance audits, we
evaluate information technology’s impact on the University’s processes and its
abilities to achieve its goals and objectives. Our evaluations are objective and
professional, utilizing COBIT (Control Objectives for Information and related
Technology) framework, an international standard for good IT control practices.
Introduction
The Information Technology Act, 2000 (IT Act, 2000) was enacted to handle
certain issues relating to Information Technology. The IT Amendment Act, 2008
has made further modifications to address more issues such as cyber crimes. It
is critical that impact of cyber laws is taken into consideration by banks to
obviate any risk arising there from.
Operational Risk Group: This group needs to incorporate legal risks as part of
operational risk framework and take steps to mitigate the risks involved in
consultation with its legal functions within the bank.
Legal Department: The legal function within the bank needs to advise the
business groups on the legal issues arising out of use of Information Technology
with respect to the legal risk identified and referred to it by the Operational Risk
Group.
The IT Act, 2000 as amended, exposes the banks to both civil 2and
criminal3liability. The civil liability could consist of exposure to pay damages by
way of compensation upto 5 crore under the amended Information Technology
Act before the Adjudicating Officer and beyond five crore in a court of competent
jurisdiction. There could also be exposure to criminal liability to the top
management of the banks given the provisions of Chapter XI of the amended IT
Act4and the exposure to criminal liability could consist of imprisonment for a term
which could extend from three years to life imprisonment as also fine. Further,
various computer related offences are enumerated in the aforesaid provisions.
Critical aspects
Legal risk and operational risk are same. Most risks are sought to
be covered by documentation, particularly where the law is silent.
The Basel-II accord
http://www.bis.org/publ/bcbsca07.pdf
Sections 43-45
Sections 65-74
Section 85
As the law on data protection and privacy, in the Indian context are in
an evolving stage, banks have to keep in view the specific provisions
of IT Act, 2000 (as amended in 2008), various judicial and quasi
judicial pronouncements and related developments in the Cyber laws
in India as part of legal risk mitigation measures. Banks are also
required to keep abreast of latest developments in the IT Act, 2000
and the rules, regulations, notifications and orders issued there under
pertaining to bank transactions and emerging legal standards on
digital signature, electronic signature, data protection, cheque
truncation, electronic fund transfer etc. as part of overall operational
risk management process.
The Information Technology (Amendment) Act, 2008
The main Indian act that addresses legal challenges specifically as they relate to
the Internet is the Information Technology (Amendment) Act, 2008, or for short, the
IT Act. We highlight the sections that have the greatest relevance for the Internet
and democracy. This includes sections relating to government takedowns,
monitoring and interception of communication and intermediary liability.
Section 69A and the Blocking Rules: Allowing the Government to block
content under certain circumstances
Section 69A of the IT (Amendment) Act, 2008, allows the Central Government to
block content where it believes that this content threatens the security of the State;
the sovereignty, integrity or defence of India; friendly relations with foreign States;
public order; or to prevent incitement for the commission of a cognisable offence
relating to any of the above. A set of procedures and safeguards to which the
Government has to adhere when doing so have been laid down in what have
become known as the Blocking Rules.
The large amounts of ‘obscene’ material that circulate on the Internet have long
attracted comment in India. Not surprsingly, then, in the same way as obscenity is
prohobited offline in the country, so it is online as well. The most important tools to
curtail it are sections 67 and 67A of the IT Act, prohibiting obscene and sexually
explicit material respectively.
Section 66A of the Information Technology (Amendment) Act, 2008 prohibits the
sending of offensive messages though a communication device (i.e. through an
online medium). The types of information this covers are offensive messages of a
menacing character, or a message that the sender knows to be false but is sent for
the purpose of ‘causing annoyance, inconvenience, danger, obstruction, insult,
injury, criminal intimidation, enmity, hatred, or ill will.’ If you’re booked under Section
66A, you could face up to 3 years of imprisonment along with a fine.
• Freedom of expression
To balance freedom of expression with other human rights is, at times, a difficult
and delicate task. From hate speech to intermediary liability, we tease out and shed
greater light on the various challenges that make this task particularly complicated,
proposing ways forward that can further strengthen and promote the right to
freedom of expression, in India and beyond, as well.
With the advent of new technology, new security threats have emerged for people,
businesses and states. Oftentimes, responses to such threats, including states’
exercise of their unprecedented power to surveil their populations, have been
criticised for their negative impact on human rights. Can security and human rights
no longer be reconciled in the Internet age?
The Information Technology (Amendment) Act, 2008 an act to amend the IT Act
2000 received the assent of the President on 5th February 2009. Several legal &
security experts are in the process of analyzing the contents and possible impacts
of the amendments. The objective of this note is to try and study the possible
implications and impacts on Indian companies. This note is not intended to be a
comprehensive analysis of the amendments, but only certain key points which could
impact Indian Companies
Data Protection
The IT Act 2000 did not have any specific reference to Data Protection, the closet
being a provision to treat data vandalism as an offense. The Government
introduced a separate bill called “Personal Data Protection Act 2006” which his
pending in the Parliament and is likely to lapse. The ITA 2008 has introduced two
sections which address Data Protection aspects to an extent, which gives rise to
certain key considerations for the sector.
The sections under consideration are:
Section 43A: Compensation for failure to protect data
Section 72A: Punishment for disclosure of information in breach of lawful contract
Section 43A states
Where a body corporate, possessing, dealing or handling any sensitive personal
data or information in a computer resource which it owns, controls or operates, is
negligent in implementing and maintaining reasonable security practices and
procedures and thereby causes wrongful loss or wrongful gain to any person, such
body corporate shall be liable to pay damages by way of compensation, to the
person so affected.
By way of explanation: "Body corporate means Indian companies"
"Reasonable security practices mean a mutual contract between the customer and
service provider OR as per the specified law. In absence of both then as specified
by the Central Government
Hence it would be important for Indian companies to seriously look at SLA’s and
agreements which have been signed with clients to understand the data protection
implications. The same goes for understanding the applicable laws.
A major modification is that this clause doesn’t mention the compensation limit of
Rs. 1 Crore which was there as part of section 43 of the ITA 2000. This implies that
there is no upper limit for damages that can be claimed. This essentially is
“unlimited liability” for Indian companies, which could cause serious business
implications.
Section 72A:
Under this section disclosure without consent exposes a person including an
"intermediary" to three years imprisonment of fine upto Rs. Five lacs or both.
This section uses the term “personal information” and not “sensitive personal
information” as in section 43A. Hence it could apply to any information which is
obtained in order to deliver services. Hence in some ways broadens the definition of
information.
2. Information Preservation
Across the amendments there are several references to “service providers” or
“intermediaries”, which in some form would apply to all Indian companies.
e.g. Section 67C: Preservation and Retention of information by intermediaries.
Intermediary shall preserve and retain such information as may be specified for
such duration and in such manner and format as the Central Government may
prescribe”. Any intermediary who intentionally or knowingly contravenes the
provisions shall be punished with an imprisonment for a term which may extend to 3
years and shall also be liable to fine.
The notifications on time for preservation etc. are not yet released. However since
this is a “cognizable” offense any police inspector can start investigations against
the CEO of a company.
Apart from the two aspects discussed in this note, there are other areas which could
also be considerations for E.g.
Sec 69: Power to issue directions for interception or monitoring or decryption of any
information through any computer resource.
Sec 69B: Power to authorize to monitor and collect traffic data or information
through any computer resource for Cyber Security.etc.
In summary, IT Risk management and response needs to be looked at by all
companies for various reasons including customer assurance, compliance,
customer regulations, protection of information assets etc. The ITA 2008
amendments provide us with few additional factors for considerations which could
have significant impact on business. Information technology regulations and laws
would only get more stringent and defined; hence it’s imperative for organizations to
be aware and prepared.
Additional Information:
Information Technology (Amendment) Act, 2008
BRIEF HISTORY
The Indian Information Technology Act 2000 (“Act”) was a based on the Model Law
on Electronic Commerce adopted by the United Nations Commission on
International Trade Law[1]; the suggestion was that all States intending to enact a
law for the impugned purpose, give favourable consideration to the said Model Law
when they enact or revise their laws, in view of the need for uniformity of the law
applicable to alternatives to paper-based methods of communication and storage of
information. Thus the Act was enacted to provide legal recognition for transactions
carried out by means of electronic data interchange and other means of electronic
communication, commonly referred to as "electronic commerce", which involved the
use of alternatives to traditional or paper-based methods of communication and
storage of information, to facilitate electronic filing of documents with the
Government agencies. Also it was considered necessary to give effect to the said
resolution and to promote efficient delivery of Government services by means of
reliable electronic records. The Act received the assent of the President on the 9th
of June, 2000.Disclaimer
While every effort has been made by me to avoid errors or omissions in this
publication, any error ordiscrepancy noted may be brought to my notice throughr e-
mail to
[email protected] shall be taken care of in the subsequent
editions. It is also suggested that toclarify any doubt colleagues should cross-check
the facts, laws and contents of this publication with original Govt. / RBI /
Manuals/Circulars/Notifications/Memo/Spl Comm. of our bank. Blog for
updates: https://iibfadda.blogspot.com/
The Act was subsequently and substantially amended in 2006 and again in 2008
citing the following objectives:
The Act extends to the whole of India, save as otherwise provided in this Act. It can
also apply to any offence or contravention provided for in the Act,
whether committed in India & outside India by any person, if the
act or conduct constituting the offence involves a computer,
computer system or computer network located in India .
The main provisions of the Act come in to force on the 9 th of June 2000. Certain
provisions were given effect on later dates by issuing specific notifications in this
regards.
The Act shall not apply to documents or transactions specified in the First Schedule.
Every notification issued to amend the first schedule shall be laid before each
House of Parliament. Presently, the First schedule contains the following entries:
For this purpose every notification issued by the Central Government to add, amend
or delete any item mentioned in the schedule as a pre-requisite place before both
houses of the Parliament for their scrutiny and approval.
DEFINITIONS
relating to any State law enacted under List III of the Seventh Schedule to the
ii.
Constitution, the
State Government and in any other case, the Central Government;
(za). "originator" means a person who sends, generates, stores or transmits any
electronic message or causes any electronic message to be sent, generated, stored
or transmitted to any other person but does not include an intermediary;
(zb). "prescribed" means prescribed by rules made under this Act;
(zc). "private key" means the key of a key pair used to create a electronic signature;
(zd). "public key" means the key of a key pair used to verify a electronic signature
and listed in the Electronic Signature Certificate;
(ze). "secure system" means computer hardware, software, and procedure that—
(zf). "security procedure" means the security procedure prescribed under section 16
by the Central Government;
(zh). "verify" in relation to a electronic signature, electronic record or public key, with
its grammatical variations and cognate expressions means to determine whether—
a. the initial electronic record was affixed with the electronic signature by the use of
private key corresponding to the public key of the subscriber;
b. the initial electronic record is retained intact or has been altered since such
electronic record was so affixed with the electronic signature.
Any reference in the Act to any enactment or any provision thereof shall, in relation
to an area in which such enactment or such provision is not in force, is to be
construed as a reference to the corresponding law or the relevant provision of the
corresponding law, if any, in force in that area.
The Act provides that the authentication of the electronic record can be effected by
the use of asymmetric crypto system and hash function which envelop and
transform the initial electronic record into another electronic record.
a. to derive or reconstruct the original electronic record from the hash result
produced by the algorithm;
b. that two different electronic records can produce the same hash result using
the algorithm.
The record can be accessed by the use of public key of the subscriber. The private
key and the public key are unique to the subscriber and constitute a functioning key
pair.
SECTION 3A - AUTHENTICATION OF ELECTRONIC RECORDS BY
USE OF ELECTRONIC SIGNATURE.
a. The signature creation data or authentication data are, within the context
they are used, linked to the signatory, or as the case may be, the
authenticator and to no other person;
b. The signature creation data or authentication data were, at the time of
signing, under the control of the signatory or, as the case may be, the
authenticator and to no other person;
c. Any alteration to the electronic signature made after affixing such signature is
detectable.
d. Any alteration to the information made after its authentication by electronic
signature is detectable.
e. It fulfills other prescribed conditions.
The Central Government can prescribe the procedure for the purpose of
ascertaining who has affixed the signature. The Central Government can also, by
notification in the Official Gazette, add or omit any reliable electronic signature or
electronic authentication technique or the procedure for affixing the same. The
notification of such method or procedure is required to be placed before both
houses of the Parliament.
Where any law provides that information or any other matter shall be in writing or in
the typewritten or printed form, then, notwithstanding anything contained in such
law, such requirement shall be deemed to have been satisfied if such information or
matter is—
Where any law requires that information or any other matter shall be authenticated
by affixing the signature or any document shall be signed or bear the signature of
any person then, notwithstanding anything contained in such law, such requirement
will be deemed to have been satisfied, if such information or matter is authenticated
by means of electronic signature affixed in such manner as prescribed by the
Central Government.
Where any law provides for the filing of any form, application or any other document
with any authority, agency, owned or controlled by the appropriate Government in a
particular manner, Or it provides for the issue or grant of any licence, permit,
sanction or approval or the receipt or payment of money in a particular manner,
then, notwithstanding anything contained in any other law for the time being in
force, such requirement is deemed to have been satisfied if such filing, issue, grant,
receipt or payment, as the case may be, is effected by means of such electronic
form as prescribed by the appropriate Government. The appropriate Government is
empowered to prescribe rules regarding the manner and the format, in which such
electronic records shall be filed, created or issued and the manner or method of
payment of any fee for creating, filing or issuing such record.
SECTION 9 - NO RIGHT TO INSIST DOC. TO BE IN ELECTRONIC
FORM.
NO Person is conferred the right to insist the Government or any body funded or
controlled by it upon accepting, issuing, creating, retaining and preserving any
document in the form of electronic records or effecting any monetary transaction in
the electronic form.
Where any law provides that documents, records or information be retained for a
specific period, then the requirement will be said to have been met if the documents
are retained in electronic format and if the information contained therein remains
accessible so as to be usable for subsequent reference in the format it was
originally created, generated, sent or received or in a format which can be
demonstrated to represent accurately the information originally generated, sent or
received, including the details of the identification of the origin, destination, dispatch
or receipt of such electronic record are available in the electronic record. These
conditions however do not apply to electronic documents which are generated
automatically, solely for the purpose of enabling an electronic record to be retention
of documents, records or information in the form of electronic records.
Where any law provides that any rule, regulation, order, bye-law, notification or any
other matter will be published in the Official Gazette, then, such requirement is
deemed to have been satisfied if such rule, regulation, etc is published in the Official
Gazette or Electronic Gazette and the date of publication in such an Electronic
Gazette is deemed to be the date of the Gazette which was first published in any
form.
Where the originator (sender) & addressee (recipient) have not settled the manner
and form in which the addressee is to acknowledge the of receipt of the electronic
record, then in such a case the addressee will acknowledge the receipt of the
electronic record either by communicating such receipt, through automated or other
means; or by way of conduct of the addressee to indicate to the originator that the
electronic record has been received.
Where the originator has stipulated that the electronic record will be binding only on
receipt of an acknowledgment of such electronic record by him, then in such a case,
unless the addressee sends such an acknowledgment and the originator receives
the same, it will be assumed that the electronic record was never sent.
Where the originator has not stipulated that the electronic record will be binding only
on receipt of such acknowledgment, and the acknowledgment has not been
received by the originator within a reasonable time or a agreed period, then the
originator can give notice to the addressee stating that no acknowledgment has
been received by him and specifying a reasonable time by which the
acknowledgment must be received by him and if an acknowledgment is not
received within the aforesaid time limit he can after giving notice to the addressee,
treat the electronic record as though it has never been sent.
The Originator and the addressee can agree to the time and place of receipt of the
electronic record. Generally, unless otherwise agreed to the contrary by the
originator and the addressee, when an electronic record enters a computer
resource outside the control of the originator or when it enters the computer
resource of the addressee, it is deemed to have been dispatched.
If the addressee has designated a specific computer resource and the electronic
record is sent to such a designated computer resource, then when the electronic
record enters the designated computer resource is deemed to be the time of
receipt. If instead of sending to the designated computer resource of the addressee,
the originator sends to another computer resource then receipt occurs at the time
when the electronic record is retrieved by the addressee from such a computer
resource. These would apply even if the place where the computer resource is
located in a different place.
An electronic record is deemed to "be dispatched at the place where the originator
has his place of business, and is deemed to be received at the place where the
addressee has his place of business inspite of the computer resources are located
at any other place.
It is possible that the originator or the addressee may have more than one place of
business, in such a case the principal place of business, will be the place of
business for the purpose of receipt and despatch. If the originator or the addressee
does not have a place of business, his usual place of residence will be deemed to
be the place of business, in the case the addressee or the originator is a body
corporate, then such usual place will be the place where such a body corporate is
registered.
The primary function of the CCA is to regulate the Certifying Authorities(“CA”). For
the purpose of regulating the CA the CCA may perform all or any of the following
functions, namely:—
The CCA, with the prior approval of the Central Government and subject to the
conditions and restrictions specified in this regards by regulations, by notification in
the Official Gazette, can recognize any foreign CA as a CA for the purposes of this
Act. Once a foreign CA is granted recognition by the CCA, an Electronic Signature
Certificate (“ESC”) issued by such Certifying Authority will be valid for the purposes
of this Act.
If any foreign CA who has been granted recognition by the CCA and if the CCA is
satisfied that such a CA has contravened any of the conditions or restrictions
subject to which the CA was granted recognition under by the CCA, then the CCA
after recording the reasons in writing, revoke such recognition by notification in the
Official Gazette.
Any person can obtain a license to issue an ESC by making an application to the
CCA. After receiving the application the CCA verifies whether or not such an
applicant has satisfied the eligibility criteria, as specified by the Central Government
in respect of qualification, expertise, manpower, financial resources and other
infrastructure facilities. Once the eligibility of the applicant is ascertained, the CCA
issues a license to the applicant. The licensee is thereafter subject such terms and
conditions as are provided for in the regulations issued in this regards. Any license
granted under this section is valid for such period as can be provided for by the
Central Government. It may be noted that such a license is not transferable or
inheritable.
Every application is required to be in the prescribed form. Along with the application
the applicant is also required to file:
• a certification practice statement;
• a statement including the procedures with respect to identification of the
applicant;
• payment of such fees, not exceeding twenty-five thousand rupees (as
prescribed by the Central Government);
• such other documents, as can be prescribed from time to time by the Central
Government
then after giving a reasonable opportunity to show cause against the proposed
revocation, revoke the license. In the alternative, pending such an inquiry, if the
CCA is of the opinion that there exist circumstances for the revocation of the license
of the CA, then the CCA can suspend the license till the completion of the inquiry.
The period of suspension cannot however exceed a period of 10 days unless the
CA has been given a reasonable opportunity of showing cause against the
proposed suspension. The CA is barred from issuing any ESCs during his
suspension period.
After making an inquiry into an allegation of default and after giving the defaulting
CA a reasonable opportunity of being heard, if the CCA is satisfied that the license
of the CA need to be suspended or revoked, he can proceed against the CA and
suspend or revoke his license. The notice of such an action of suspension or
revocation, as the case may be, by the CCA is required to be published in the
database and all the repositories maintained by the CCA. The CCA is required also
make available such a notice of suspension or revocation of license, through a
website which is accessible round the clock. If considered appropriate by the CCA
he may publicise the contents of database in appropriate electronic or other media.
The CCA can delegate or authorize the Dy. CA or the ACA to exercise any of its
power in respect of the regulation of Certified Authorities.
Without prejudice to the provisions of sub-section (1) of section 69, the CCA or any
person authorized by him will, if he has reasonable cause to suspect that the
provisions related to regulation of CAs, rules or regulations made there under, are
being contravened, then they can search or access any computer system, any
apparatus, data or any other material connected with such system to obtain any
information or data contained in or available to such computer system. In doing so
they can direct any person in charge of, or otherwise concerned with the operation
of, the computer system, data apparatus or material, to provide such reasonable
technical and other assistance as the investigating authority may consider
necessary.
The CCA or any officer authorised by him for this purpose can investigate into any
contravention of the provisions of this Act, rules or regulations made thereunder. For
the purpose of investigating the contraventions under this Act, the CCA or any
authorized officer has the powers similar to the powers which are conferred on
Income-tax authorities under Chapter XIII of the Income-tax Act, 1961 and the CCA
can exercise such powers, subject to such limitations laid down under the Income-
tax Act, 1961.
Every CA will, —
and
iv. any other fact that materially and adversely affects either the reliability of a ESC,
which that CA has issued, or the CA's ability to perform its services.
k. Where the CA is of the opinion that the situation so merits which can
materially and adversely affect the integrity of its computer system or the
conditions subject to which a ESC was granted, then, the CA will—
a. Reasonably notify any person who is likely to be affected by that occurrence; or
The CCA can, after consultation with the Cyber Regulations Advisory Committee
and with the previous approval of the Central Government, by notification in the
Official Gazette make regulations consistent with this Act and the rules made there
under to carry out the purposes of this Act. In particular, and without prejudice to the
generality of the foregoing power, such regulations can provide for all or any of the
following matters, namely:
Any person can make an application to the CA for the issue of a ESC. The
application will be in the form prescribed by the Central Government. The
application shall be accompanied with the prescribed fee not exceeding twenty five
thousand rupees, to be paid to the Certifying Authority. The fee could be different
fees for different classes of applicants'. In addition to the fees the application is also
required to be accompanied with a certification practice statement or where there is
no such statement, a statement containing such particulars, as may be required by
regulations.
An ESC can be revoked by the CA with immediate effect, after giving the subscriber
a reasonable opportunity of being heard if, the CA is of the opinion that a material
misrepresentation or concealment of the facts in the ESC or for non fulfillment of
any requirement which were prerequisites for the issue of the ESC or where the
CAs private key or security system has been compromised in a manner materially
affecting the ESCs reliability or where the subscriber has been adjudged insolvent
or on account of death, dissolution or winding-up or any other circumstances as a
result of which the subscriber to the ESC ceases to exist. The revocation of a ESC
by the CA has to be communicated to the subscriber.
DUTIES OF SUBSCRIBERS
Where any Electronic Signature Certificate, the public key of which corresponds to
the private key of that subscriber which is to be listed in the Electronic Signature
Certificate has been accepted by a subscriber, then, the subscriber will generate the
key pair by applying the security procedure. Further the subscriber shall perform
such duties as may be prescribed.
By accepting a ESC the subscriber certifies to all who reasonably rely on the
information contained in the ESC that the subscriber holds the private key
corresponding to the public key listed in the ESC and is entitled to hold the same.
Furthermore all representations made by the subscriber to the CA and all material
relevant to the information contained in the ESC are true to the best of his belief.
CONTROL OF PRIVATE KEY
If the private key is compromised, then, the subscriber will communicate the same
forthwith to the CA in specified manner. The subscriber is liable for all events
occurring as a result of the compromising of the private key from the time
compromise upto the time he has informed the CA of the private key being
compromised.
If any person without permission (or the knowledge) of the owner or any other
person who is incharge of a computer, computer system or computer network, —
“Reasonable security practices and procedures” would include such practices and
procedures which are designed to protect information from unauthorized access,
damage, misuse, modification, disclosure etc, as may be agreed to between the
parties or as determined by law in force and in the absence of such agreement or
any law, such reasonable security practices and procedures, as may be prescribed
by the Central Government in consultation with such professional bodies or
associations as it may deem fit;
If any person who under this Act or any rules or regulations made there under to—
A penalty imposed or compensation awarded or confiscation under the Act, will not
result in avoidance of an award of compensation or imposition of any penalty or
punishment under any other law.
RESIDUARY PENALTY
Whoever contravenes any rules or regulations made under this Act, and no penalty
has been separately provided for such contravention, will be liable to pay a
compensation not exceeding Rs 25,000/- to the person affected by such
contravention or a penalty of equal amount.
A penalty imposed under this Act, if it is not paid, can be recovered as an arrear of
land revenue and the license or the ESC, as the case may be, can be suspended till
the penalty is paid.
COMPOUNDING OF OFFENCES
can be compounded under section 77A of the Act. However the benefit of
compounding will not be available to a person who has been previously convicted
for the same or similar offence or who is liable to enhanced punishment.
No court can take cognizance of any of the above-mentioned offences unless the
person aggrieved by the offence lodges a complaint. Only an officer of rank of a
Deputy Superintendent of Police can investigate cognizable offences under this act.
When an officer in charge of a police station is given information pertaining to a non
cognizable offence, he is required to record such information in such records as are
prescribed by the State Government. The Officer who receives such information can
exercise the same power of investigation (except the power to arrest without
warrant), as an Officer in charge of police station would have under section 156 of
code of criminal procedure.
Sec 46 confers the power to adjudicate contravention under the Act to an officer not
below the rank of Director to Government of India or equivalent officer of state.
Such appointment shall be made by CG. Person so appointed shall have adequate
exp. in field of Info. Technology and such legal and judicial experience as may be
prescribed by CG.
The adjucating officer shall exercise jurisdiction to adjudicate matters in which the
claim for injury or damage does not exceed rupees five crores.
In respect of claim for injury or damage exceeding rupees five crores, jurisdiction
shall vest with the competent court.
For the purpose of holding an inquiry and for the purposes of adjudication the
Officer will have the powers of a civil court which are conferred oh the Cyber
Appellate Tribunal under sub-section (2) of section 58. All the proceedings held
before the Adjudicating Officer will be deemed to be judicial proceedings within the
meaning of sections 193 and 228 of the Indian Penal Code and for the purposes of
sections 345 and 346 of the Code of Criminal Procedure, 1973 be deemed to be a
civil court.
The Officer for the purpose of holding an inquiry, as prescribed by the Central
Government, is required to give the person being accused of the contravention a
reasonable opportunity for making representation in the matter. If after giving such
an opportunity the officer is of the opinion that such person has as alleged
contravened the provisions of the Act, or any Rules, regulations and direction there
under, can impose such penalty or award such compensation as he thinks fit in
accordance with the provisions.
Sec 47 provides that for the purpose of imposing penalty or for awarding
compensation the Officer will take into consideration the following:
The Central Government in consultation with the Chief Justice of India selects the
Chairperson and other members. The Cyber Appellate Tribunal is made up of a
Chairperson and such number of Members, as the Central Government deems fit.
The Chairperson and one or two Members shal constitute a Bench of the Tribunal.
The Tribunal exercises its jurisdiction and all the powers, authority through such a
Bench. The Central Government has mandated that the Bench of the Tribunal will
sit in New Delhi and at such places which the Central Government in consultation
with the Chairperson may resolve. Once having resolved where the Bench will be
situated, the Central Government demarcates the areas where the Bench will
exercise its jurisdiction notifies such resolution in the Official Gazette. The
Chairperson of the Tribunal can transfer the Member (s) from one Bench to another.
Where the circumstances so merit, at any time before or in the course of a case or
a matter, if the Chairperson or the Member of the Tribunal are of the view that the
nature of the case or matter is such that it ought to be heard by a Bench consisting
of more Members, the case can be transferred by the Chairperson to such a Bench
as the Chairperson deems fit.
The Information Technology Amendment Act 2006 and the Information Technology
Amendment Act 2008 have introduced a slew of changes in the manner of
appointment of the Chairperson and the Members (Judicial as well as non Judicial)
of the Cyber Appellate Tribunal. The changes include the basic eligibility criteria, the
manner in which the salary and other emoluments will be given/ announced, the
requirement of independence and retirement from earlier service.
Only a person who is, or has been, or is qualified to be, a Judge of a High Court.
The Members of the Tribunal, barring the Judicial Member will be appointed by the
Central Government. Such a Member shall from amongst persons who posses
special knowledge and professional experience in the field of Information
Technology, Telecommunication, Industry, Management and Consumer Affairs. The
Government can only select the Members from the cadre of Central or State
Government employees, holding the position of Additional Secretary for a period not
less than 2 years or a Joint Secretary to the Government of India or an equivalent
position with either the Central or the State Government for a period not less than 7
years.
Only a person who is a member of the Indian Legal Service and has held the
position of an Additional Secretary for a period of one year or a Grade I post of the
Legal Service for a period not less than 5 years, is qualified to be selected as the
Judicial Members of the Tribunal.
Before the appointment of the Chairperson and the Members of the Tribunal, the
Central Government satisfies itself that the candidate is an independent person and
a person of integrity who will not be interested either financially or in any other way,
that may prejudicially influence his discharging of the functions of a Chairperson or
as a Member of the Cyber Appellate Tribunal. On his selection, either as a Member
of Chairperson of the Tribunal, the candidate (officer of the Central / State
Government) is required to retire from his service before he is allowed to join as the
Member/ Chairperson of the Cyber Appellate Tribunal
The Chairperson and the Members hold office for a term of five years from the date
of entering his office or until they attain the age of sixty five years, which ever
occurs earlier During the tenure the Chairperson and the Members will be entitled to
such a salary, allowance and other benefits like gratuity, pension, etc as may be
prescribed.
The Chairperson has the power of general supervision and administration of the
conduct of affairs of the Bench. In addition to presiding over the meetings of the
Tribunal the Chairperson exercises and discharges such functions and powers as
are prescribed in this regards.
The Chairperson distributes the business to a Bench of the Tribunal and directs the
manner in which each matter will be dealt with. The Chairperson can also, on
receipt of an application in this regards from any of the parties and after giving a
notice to such parties and giving them a hearing as he deems proper or suo moto
without such a notice, can transfer the matter from one Bench to another for its
disposal.
Once the Chairperson has been appointed neither the salary and allowances nor
the other terms and conditions of his service can be varied to his disadvantage. If,
for reason other than temporary absence, any vacancy occurs in the office of the
Chairperson of a Cyber Appellate Tribunal, then the Central Government is to
appoint another person in accordance with the provisions of this Act to fill the said
vacancy and the proceedings can be continued before the Cyber Appellate Tribunal
from the stage at which the vacancy is filled.
The Central Government can remove the Chairperson from his office only by way of
an order in writing on the grounds of proved misbehavior or incapacity after an
inquiry. Such an inquiry can be made only by a Judge of the Supreme Court in
which the Chairperson concerned has been informed of the charges against. The
Chairperson has to be given a reasonable opportunity of being heard in respect of
these charges. The Central Government can, by rules, regulate the procedure for
the investigation of misbehavior or incapacity of the aforesaid Chairperson.
The order of the Central Government appointing any person as the Chairperson or
Member of a Cyber Appellate Tribunal and no act or proceeding before a Cyber
Appellate Tribunal shall not be called in question in any manner on the ground
merely of any defect in the constitution of a Cyber Appellate Tribunal.
The Chairperson, Members and other officers and employees of a Cyber Appellate
Tribunal, the Controller, the Deputy Controller and the Assistant Controllers shall be
deemed to be Public Servants within the meaning of section 21 of the Indian Penal
Code.
The appeal filed before the Cyber Appellate Tribunal is to be dealt with by it as
expeditiously as possible and an endeavor will be made by the Cyber Appellate
Tribunal to dispose of the appeal finally within six months from the date of receipt of
the appeal. The appellant can either appear in person or through an authorized
representative (one or more legal practitioners) or any of its officers, to present his
or its case before the Cyber Appellate Tribunal.
The Cyber Appellate Tribunal can, after giving the parties to the appeal, an
opportunity of being heard, pass such orders thereon as it thinks fit, confirming,
modifying or setting aside the order appealed against. The Cyber Appellate Tribunal
will send a copy of every order made by it to the parties to the appeal and to the
concerned Controller or adjudicating office
The Cyber Appellate Tribunal is not be bound by the procedure laid down by the
Code of civil Procedure, 1908 but is be guided by the principles of natural justice
and, subject to the other provisions of this Act and of any rules, the Cyber Appellate
Tribunal has the powers to regulate its own procedure including the place at which it
shall have its sittings. For the purposes of discharging its functions under this Act,
the Cyber Appellate Tribunal has the same powers as are vested in a civil court
under the Code of Civil Procedure, 1908, while trying a suit, in respect of the
following matters, namely:—
a. summoning and enforcing the attendance of any person and examining him
on oath;
b. requiring the discovery and production of documents or other electronic
records;
c. receiving evidence on affidavits;
d. issuing commissions for the examination of witnesses or documents;
e. reviewing its decisions;
f. dismissing an application for default or deciding it ex pane;
g. any other matter which may be prescribed.
Any person aggrieved by any decision or order of the Cyber Appellate Tribunal can
file an appeal to the High Court within sixty days from the date of receipt of order of
the Cyber Appellate Tribunal, on any question of fact or law arising out of such
order. Any delay in filing the appeal to the High Court can be condoned by the High
Court, if it is satisfied that the appellant was prevented by sufficient cause from filing
the appeal within the said period, allow it to be filed within a further period not
exceeding sixty days.
At any time, before or after the institution of adjudication proceedings, the CCA or
an Officer specially authorized in this regards or the Adjudicating Office can
compound contraventions under the Act. The compounded amount however cannot,
in any case, exceed the maximum penalty imposable for the contravention under
this Act. Where any contravention has been compounded, no proceeding or further
proceeding, as the case may be, can be taken for the compounded offence. Once a
contravention has been compounded, the same person cannot seek relief of
compounding for the same or similar contraventions committed within a period of 3
years from the date of compounding.
OFFENCES
The Act has specified that Tampering with computer source documents, Hacking
computer system, Publishing of information which is obscene in electronic form or
failure of a CA or its employees to follow the directions/ Orders of the CCA, failure to
comply with Directions of Controller to a subscriber to extend facilities to decrypt
information, accessing a protected system without proper authorization, material
mis-representation, Penalty for publishing Electronic Signature Certificate false
particulars, Publication for fraudulent purpose, sending of grossly offensive
information, false information, etc will be offences.
If any person, dishonestly or fraudulently does any act which results in damage to a
computer or a computer system or secures unauthorized access to a secure
computer system or down loads or copies data etc (acts described under section43
of the Act), the he can be punished with a prison term which can extend upto two
years or with a fine which can extend up to ₹Five Lakhs or both. Here the Act refers
to the India Penal Code for interpreting the meaning of the words “dishonestly” and
“fraudulently”
“Transmit” means to electronically send a visual image with the intent that it be
viewed by a person or persons;
“Private area” means the naked or undergarment clad genitals, pubic area, buttocks
or female breast;
Any person with intent to threaten the unity, integrity, security or sovereignty of India
or to strike terror in the people or any section of the people by denying or cause the
denial of access to any person authorized to access computer resource or
attempting to penetrate or access a computer resource without authorisation or
exceeding authorized access or introducing or causing to introduce any Computer
Contaminant and by means of such conduct causes or is likely to cause death or
injuries to persons or damage to or destruction of property or disrupts or knowing
that it is likely to cause damage or disruption of supplies or services essential to the
life of the community or adversely affect the critical information infrastructure
specified under section 70, or knowingly or intentionally penetrates or accesses a
computer resource without authorisation or exceeding authorized access, and by
means of such conduct obtains access to information, data or computer database
that is restricted for reasons of the security of the State or foreign relations; or any
restricted information, data or computer database, with reasons to believe that such
information, data or computer database so obtained may be used to cause or likely
to cause injury to the interests of the sovereignty and integrity of India, the security
of the State, friendly relations with foreign States, public order, decency or morality,
or in relation to contempt of court, defamation or incitement to an offence, or to the
advantage of any foreign nation, group of individuals or otherwise, commits the
offence of cyber terrorism.
The person committing or conspires to commit cyber terrorism shall be punishable
with imprisonment which may extend to imprisonment for life.
The above three provisions shall not be applicable to any book, pamphlet, paper,
writing, drawing, painting, representation or figure in electronic form if the
publication of which is proved to be justified as being for the public good on the
ground that such book, pamphlet, paper writing, drawing, painting, representation or
figure is in the interest of science, literature, art or learning or other objects of
general concern or which is kept or used for bonafide heritage or religious purposes
"Children" means a person who has not completed the age of 18 years.
An intermediary shall preserve and retain such information as may be specified for
such duration and in such manner and format as the Central Government may
prescribe an any intermediary who intentionally or knowingly abstains from doing
the same shall be punished with an imprisonment for a term which may extend to
three years and shall also be liable to fine.
The CCA can direct a CA or the employees of such a CA to take such measures or
cease carrying on such activities as specified in the order if those are necessary to
ensure compliance with the provisions of this Act, rules or any regulations made
there under. Any person intentionally or knowingly failing to comply with such an
order will have committed an offence and will be liable on conviction to
imprisonment for a term not exceeding two years or to a fine not exceeding one lakh
rupees or to both.
Where the central Government or a State Government or any of its officer specially
authorized by the Central Government or the State Government, as the case may
be, in this behalf may, if is satisfied that it is necessary or expedient to do
after recording the reasons there of in writing, can warrant or direct or order any
agency of the Government to intercept or monitor or decrypt or block any
information transmitted through a computer resource. The Government is required
to specify safeguards, subject to which the interception or monitoring or decryption
is to be done. Any person, be it a subscriber or an intermediary or any other person
who is in charge of the computer resource, is bound to extend all possible
cooperation, technical assistance and facility as may be required by the authorities
to access or to secure access to the computer resource containing such
information; generating, transmitting, receiving or storing such information or
intercept or monitor or decrypt or block the information, as the case may be or
provide information stored in computer resource. Failure to do so is punishable with
an imprisonment for a term which can extend to seven years and also liable to fine.
POWER TO AUTHORIZE TO MONITOR AND COLLECT TRAFFIC
DATA OR INFORMATION THROUGH ANY COMPUTER RESOURCE
FOR CYBER SECURITY
The Central Government may, to enhance Cyber Security and for identification,
analysis and prevention of any intrusion or spread of computer contaminant in the
country, by notification in the official Gazette, authorize any agency of the
Government to monitor and collect traffic data or information generated, transmitted,
received or stored in any computer resource. The Intermediary or any person in-
charge of the Computer resource shall when called upon by such agency provide
technical assistance and extend all facilities to such agency to enable online access
or to secure and provide online access to the computer resource generating ,
transmitting, receiving or storing such traffic data or information. The government
shll prescribe procedure and safeguards for monitoring and collecting traffic data or
information.
"Traffic data" means any data identifying or purporting to identify any person,
computer system or computer network or location to or from which the
communication is or may be transmitted and includes communications origin,
destination, route, time, date, size, duration or type of underlying service or any
other information.
PROTECTED SYSTEM
The Central Government has the powers through notification to designate any
organization of the Government as the national nodal agency for the protection of
Critical Information Infrastructure Protection. Such agency shall be responsible for
all measures including Research and Development relating to protection of Critical
Information Infrastructure.
The Central Government has the powers through notification to appoint an agency
of the government to be called the Indian Computer Emergency Response Team.
The Central Government shall provide such agency with a Director General and
such other officers and employees as may be prescribed. The Indian Computer
Emergency Response Team shall serve as the national agency for performing the
following functions in the area of Cyber Security,-
For carrying out the above functions, the agency may call for information and give
direction to the service providers, intermediaries, data centers, body corporate and
any other person. Any service provider, intermediaries, data centers, body corporate
or person who fails to provide the information called for or comply with such
direction shall be punishable with imprisonment for a term which may extend to one
year or with fine which may extend to one lakh rupees or with both.
Whoever makes any misrepresentation to, or suppresses any material fact from, the
Controller or the Certifying Authority for obtaining any licence or ESC, as the case
may be, can be punished with imprisonment for a term which can extend to two
years, or with fine which can extend to one lakh rupees, or with both.
PENALTY FOR BREACH OF CONFIDENTIALITY AND PRIVACY
Whoever knowingly creates, publishes or otherwise makes available a ESC for any
fraudulent or unlawful purpose can be punished with imprisonment for a term which
can extend to two years, or with fine which can extend to one lakh rupees, or with
both.
The Act gives extra territorial jurisdiction in cases where the offence or
contraventions are committed from outside India, by any person irrespective of his
nationality. The provisions of this Act will apply also to any offence or contravention
committed outside India by any person irrespective of his nationality if the act or
conduct constituting the offence or contravention involves a computer, computer
system or computer network located in India. No penalty imposed or confiscation
made under this Act can prevent the imposition of any other punishment to which
the person affected thereby is liable under any other law for the time being in force.
CONFISCATION
Any computer, computer system, floppies, compact disks, tape drives or any other
accessories related thereto, in respect of which any provision of this Act. rules,
orders or regulations made there under has been or is being contravened, will be
liable to confiscation. Provided that where it is established to the satisfaction of the
court adjudicating the confiscation that the person in whose possession, power or
control of any such computer, computer system, floppies, compact disks, tape
drives or any other accessories relating thereto is found is not responsible for the
contravention of the provisions of this Act, rules, orders or regulations made there
under, the court can, instead of making an order for confiscation of such computer,
computer system, floppies, compact disks, tape drives or any other accessories
related thereto, make such other order authorized by this Act against the person
contravening of the provisions of this Act, rules, orders or regulations made there
under as it may think fit.
For the purpose of providing an expert opinion on electronic form evidence, before
any Court or other statutory body, can specify by notification in official gazette any
department or body or agency of central government as an examiner of electronic
evidence. Here, electronic form evidence means any information of probative
value which is stored and transmitted in electronic form. It includes computer
evidence, digital audio and digital video, cell phones, fax machines etc.
PROTECTION OF ACTION TAKEN IN GOOD FAITH
No suit, prosecution or other legal proceeding will lie against the Central
Government, the State Government, the Controller or any person acting on behalf
of him, the Chairperson, Members, officers and the staff of the Cyber Appellate
Tribunal for anything which is in good faith done or intended to be done in
pursuance of this Act or any rule, regulation or order made there under.
ENCRYPTION METHODS:
The Central Government can prescribe the modes and methods for encryption for
the purposes of secure use of electronic medium and for promotion of e-governance
and e-commerce.
When a person abets any offence and the act being abetted is committed in
consequence of the abetment, such a person can be made liable for the same
offence and penal consequences awarded as a result, even though abetment, by
itself, can not be an offence. An act or offence is said to be committed in
consequence of abetment, when it is committed as a consequence of the instigation
or a conspiracy. Any person committing an offence punishable by this Act or causes
such an offence to be committed, any act during the course of such an attempt is
also an offence, punishable as if it were an offence and imprisonment would extend
to one- half of the longest term of imprisonment imposable or a fine or both.
Any person who attempts to commit an offence punishable by this Act be punished
with imprisonment for a term which may extend to one-half of the longest term of
imprisonment provided for that offence, or with such fine as is provided for the
offence or with both.
OFFENCES BY COMPANIES
Where a contravention of any of the provisions of this Act or of any rule, direction or
order made under this Act is committed by a company, every person who, at the
time the contravention was committed, was in charge of, and was responsible to,
the company for the conduct of business of the company as well as the company,
will be guilty of the contravention and will be liable to be proceeded against and
punished accordingly. Any person liable to punishment if he proves that the
contravention took place without his knowledge or that he exercised all due
diligence to prevent such contravention, will be absolved of the allegation of the
contravention or committing the offence.
Where it is proved that the contravention, of any of the provisions of this Act or of
any rule, direction or order has taken place /been committed by a company with the
consent or connivance of, or is attributable to any neglect on the part of, any
director, manager, secretary or other officer of the company, such director, manager,
secretary or other officer will also be deemed to be guilty of the contravention and
will be liable to be proceeded against and punished accordingly. Here "company"
means any body corporate and includes a firm or other association of individuals;
and "director", in relation to a firm, means a partner in the firm.
REMOVAL OF DIFFICULTIES
If any difficulty arises in giving effect to the provisions of this Act, the Central
Government can, by order published in the Official Gazette, such order/ direction as
it deems necessary or expedient, to remove such difficulties in the provisions of this
Act. However, no order for removal of difficulties can be made after the expiry of a
period of two years from the commencement of this Act. Every order made, for the
removal of difficulties, will be laid as soon as may be after it is made, before each
House of Parliament.
POWER OF CENTRAL GOVERNMENT TO MAKE RULES.
The Central Government can, by notification in the Official Gazette and in the
Electronic Gazette make rules to carry out the provisions of this Act. In particular,
and without prejudice to the generality of the foregoing power, the rules can provide
for all or any of the following matters, namely:—
Every rule made by the Central Government notifying such class of documents or
transactions as can be notified by the Central Government in the Official Gazette
which are outside the purview of this Act and every rule made by it shall be laid, as
soon as can be after it is made, before each House of Parliament, while it is in
session, for a total period of thirty days which can be comprised in one session or in
two or more successive sessions, and if, before the expiry of the session
immediately following the session or the successive sessions aforesaid, both
Houses agree in making any modification in the notification or the rule or both
Houses agree that the notification or the rule should not be made, the notification or
the rule shall thereafter have effect only in such modified form or be of no effect, as
the case may be; so, however, that any such modification or annulment shall be
without prejudice to the validity of anything previously done under that notification or
rule.
The Controller may, after consultation with the Cyber Regulations Advisory
Committee and with the previous approval of the Central Government, by
notification in the Official Gazette, make regulations consistent with this Act and the
rules in relation to the following matters:
Every regulation made under this Act shall be laid, as soon as may be after it is
made, before each House of Parliament, while it is in session, for a total period of
thirty days which may be comprised in one session or in two or more successive-
sessions, and if, before the expiry of the session immediately following the session
or the successive sessions aforesaid, both Houses agree in making any
modification in the regulation or both Houses agree that the regulation should not be
made, the regulation shall there after have effect only in such modified form or be of
no effect, as the ease may be; so, however, that any such modification or
annulment shall be without prejudice to the validity of anything previously done
under that regulation.
POWER OF STATE GOVERNMENT TO MAKE RULES
The State Government can, by notification in the Official Gazette, make rules to
carry out
the provisions of this Act. In particular, and without prejudice to the generality of the
foregoing power, such rules can provide for all or any of the following matters,
namely: —
a. the electronic form in which filing, issue, grant receipt or payment for e
licences;
b. for e returns & e payments
c. any other matter which is required to be provided by rules by the State
Government.
Every rule made by the State Government under this section shall be laid, as soon
as may be after it is made, before each House of the State Legislature where it
consists of two Houses, or where such Legislature consists of one House, before
that House.
The Indian Penal Code, The Indian Evidence Act, 1872, The Bankers' Books
Evidence Act, 1891, The Reserve Bank of India Act, 1934, shall be amended in the
manner specified in the Schedules to this
Act.
say atleast once in two years. The same needs to be incorporated in IS Audit
policy/charter. Further, in order to avoid conflict of interest an audit firm/consultant who
had provided consulting services on a specific area should not audit the area as part of
pre or post implementation audit.
GLOSSORY:
COMPUTER TERMINOLOGY
Hard Disk: A device for storage of data fitted in the processor itself
Modem: Modulator & Demodulator: A device used for converting digital signals to
analog signals & viceversa
the working of a computer or damages the data. Main source of virus is internet (other
Vaccine: Anti Virus Software programme used for preventing entry of virus or repairing
the same
Key used: For digital signatures, there is a pair of keys, private key & public key
Hacking: Knowingly concealing, destroying, altering any computer code used for
computer network
Address: The location of a file. You can use addresses to find files on the Internet and
your computer.
Internet
IMPORTANT ABBREVIATIONS
• Al – Artificial intelligence ,
Bin – Binary
,BASIC - Beginner’s All-purpose Symbollic
Output System,
CC – Carbon Copy,
Data
Processing
FAX - Far Away Xerox/ facsimile ,FDC - Floppy Disk Controller, FDD - Floppy Disk
Drive ,FORTRAN Formula Translation, FS -
File System
Gb – Gigabit ,
GB – Gigabyte ,
GIF - Graphics Interchange Format,
GSM - Global System for Mobile Communication
CyAT
CAA
Digital Signature
BCP
Digital forensics
Normalisation
Internal audit
DBA responsibility
Telecommunications system audit
Power off switches
Cyber terbunal judge or magistrate
DS reissuance
Central depository of DS
Audit trail significance
Bottom up methodology
Audit plan
BCP
IDS
Virtual keyboard
IFMS full from
EFT
RBIA
Inherent risk
Insider threat
IS Audit policy
Information security officer role
DBA responsibility
Stress testing
BCNF
Critical applications
Poor architecture system
SDLC
Prototyping model
RTO application
IT Act 2000
Punishment for copyright as per IT Act
Controller of Certifying Authorities operates the National Repository of Digital
Signatures (NRDC)
Function of modem, which is not an OOP Lang. C C++ Java C#, questns abt DRP,
Trojan horse, sniffing, spoofing, availability, integrity, DBMS, preventive, corrective,
detective controls, BCP
DDL DML DCL TCL commands, CA CCA-Digital certificates
Digital signature complete
Cyber apellate tribunal presiding officer
System testing
Compliance testing
Substantive testing
Telecom control
Db forms
Db commands
Risk based audit
It audit
Dba roles n resp
Prototyping model
Sdlc full
Interface testing
Rbeit ltd reg it subsidiary of rbi
Non repudiation
Bot stroke worms
Certified information System Banker
13.01.2019 3 PM Batch
Moderate Difficulty
Passing Mark 60
Each question carries 1 mark ( 100 questions )
Scored 55 marks
Recollected questions
DR centre location
Data warehouse
Audit charter/policy
Is audit 5 -10 questions
RAM and cache memory
Static RAM
Metadata
Which DB model used in CBS
Characteristics of a table
Many to Many relationship in DB
Simple ,self,outer join
Adaptive maintenance
Multiplexing
Packet switching
Full Duplex method
Bridge,router,switch,gateway
Diff between router and switch
Function of osi model layers 5 questions
Which protocol used in banking http,smtp,tcp/ip
Real time processing
Emergency response
Mirror site and reciprocal agreement
Trojan horse
E money
INFINET
CFMS
SFMS
Spoofing, piggybagging
Pervasive principle in GASSP
Classification of control
Boundary sub system
Audit trail
Attenuation
Types of noise (cross talk)
False positive and negative
Firewall
Intrusion detection systems and tuning
In what circumstances user ID and password will be given to user(emergency access)
Remote Access
OS tasks
Travelling virus procedure
Public and private key encryption
Information system for bankers recollected questions on 18 Oct 2020
Defence in depth
Chapter 6 of it act
Caat
Section 46 of it act
Responsibility of database administrator
IPsec
These are some of the recalled questions from information system banker
Disclaimer
While every effort has been made by me to avoid errors or omissions in this
publication, any error ordiscrepancy noted may be brought to my notice throughr e-mail
to [email protected] shall be taken care of in the subsequent editions.
It is also suggested that toclarify any doubt colleagues
should cross-check the facts, laws and contents of this publication with original Govt. /
RBI / Manuals/Circulars/Notifications/Memo/Spl Comm. of our bank.