Documente Academic
Documente Profesional
Documente Cultură
1.
Explain at least 5 different transactions that can be done using internet
banking
There are many different kinds of transactions that one can be done using
internet banking. For instance, one may view their account balance, view
recent transactions, download bank statements, order chequing books, view
images of paid cheques, etc. By using internet banking, a bank customer can
also initiate funds transfers between their linked accounts, pay third parties
for bill payments (for instance, through BPAY), make investment purchases or
sales through these services, engage in loan transactions such as repayment
of enrollments, register utility billers in order to make bill payments, and
utilize many different credit card applications.
2.
Voice recognition lies at the core of IVR, as the words spoken by the caller
are chopped into smaller pieces and then compared to the words stored in
a database. This therefore allows customers to avoid dual-tone multifrequency signalling commands. Similarly, speech recognition does not
restrict the input to ten digits. Overall, voice recognition the translation of
spoken words to text is a developing technology that has many
applications, one of which is interactive voice response. By analyzing
predefined grammatical syntax and statistically trained natural language
models, interpretation of customer can be made to provide an automated
response.
7.
Since voice recognition is still in its infancy, voice recognition is not perfect,
and therefore comes with a few disadvantages. Some voice recognition
software for instance, will not always interpret words accurately, leading to
errors due to misinterpretation. Yes and No answers may resolve this
issue, but this also limits the advantage of using voice recognition if it limits
input to two options. Background noise interference and accents may also
compound these problems. The time and cost associated with implementing
a voice recognition system acts as another limitation, as the time needed to
correct and recognize errors, adapt and interpret user voices, and the time
for the user to learn how to use the system should all be considered.
8.
Most evidently, one of the most prominent cost advantages to the bank is
that they may reduce their staff at a local branch, as there will be fewer
customers to serve physically. Because transactions take place online, less
staff is needed at the branch. In addition, by shifting transactions online,
physical bank locations may be reduced, thus saving the costs for running
the building. Furthermore, once an online banking service is implemented,
there is usually little to no changes required in the future. Thus, this one time
investment will effectively serve customers much into the foreseeable future.
By moving the transfer of money online, there is a decreased need for
physical currency transfer, thereby reducing the costs in this respect as well.
9.
Explain the benefits (convenience) of using online banking for the
customer
A benefit for the customer is that they may manage their finances essentially
wherever internet connection is possible. Instead of physically heading to the
bank to make financial transactions, the customer may now manage their
savings at the comfort of their home. Similarly, time is saved by the
customer, as they no longer need to contact the appropriate persons at the
bank to have their requests fulfilled.
10.
12.
What is two factor (in some cases, multifactor) authentication
method?
Two-factor authentication is the identification of a user through the use of
two different components. These components may take the form of
something the user has, knows, or is. For instance, to withdraw money from
an ATM machine, users require a bank card and a PIN number. Two-factor
authentication is essentially a form of multi-factor authentication. By using
two-factor authentication, a users identity is less likely to be compromised
by fraud and identity theft.
13.
What is TAN?
What is OTP?
OTP refers to a one-time password that is valid only for one login transaction.
As opposed to traditional static passwords which are reused, OTPs offer the
advantage of providing protection against replay attacks, as even if a record
of a used OTP is obtained, it will no longer allow access. Another advantage
is the fact that a user who uses similar passwords for multiple systems is not
immediately at risk on all of them. While there are many advantages to the
use of OTPs, there are also many disadvantages concerning the methods
used to generate and deliver the OTPs between the appropriate parties.
15.
factor authentication used by the bank, it is difficult for hackers to hack into
an account, as this form of multi-factor authentication utilizes many pieces of
information that must be compromised, such as the users personal details,
alongside a generated TAN that is a single use one-time password.
16.
What is phishing?
From your research, explain various steps taken by the bank to protect
customers from phishing and evaluate their effectiveness.
What is Trojan?
What is encryption?
Symmetric encryption refers to the encryption algorithms that use the same
cryptographic keys for the encryption and decryption of plaintext and
ciphertext respectively. In practice, these two keys are held in secret and are
not disclosed publicly. While symmetric-key encryption is simpler and faster
to operate compared to public-key encryption, it requires that two parties
must exchange the key in a secure way. Symmetric encryption is sometimes
referred to as secret-key encryption.
26.
Secure Sockets Layer (SSL) protocol is the predecessor to the Transport Layer
Security (TLS) cryptographic protocol that is implemented to provide
communications security over a communications network. It is a widely used
security protocol that provides a secure channel between two machines
operating over the Internet or over an internal network. Presently, the SSL
protocol is usually employed when web browsers need to secure a
connection.
31.
Encryption key length refers to the key size, measured in bits of the key used
in cryptographic algorithms. Encryption systems are usually grouped into
distinct categories with a different level of cryptographic complexity that
corresponds to different key sizes for the same level of security. For instance,