ETIT Notes
ETIT Notes
Inter Bank transfer is basically when you transfer the money to any other
Banks apart from State Bank of India. So, let us assume that you have an
account in State Bank of India and you want to transfer a sum of Rs 1 Lakh to
Mr. A. Mr. A now has an account in Axis Bank so this transfer will now be
called as Inter bank transfer.
You can make the Inter Bank transfer through NEFT, IMPS, and RTGS. For
RTGS, the minimum amount is Rs 2 Lakh and for NEFT there is no minimum
amount. In addition to this, NEFT and RTGS are only processed
It should be noted that for Inter Bank Transfer, you would need the account
number and the IFSC code of the person to whom you are transferring the
money. Now let us move on to Intra Bank Transfer.
Intra Bank transfer is when you transfer the money to someone who has a
bank account in the same bank. So, let us assume that you have an account in
State Bank of India and you want to transfer a sum of Rs 1 Lakh to Mr. B. Mr.
B now has an account in SBI so this sbi to sbi transfer will now be called as
Intra Bank transfer.
For all the Intra Bank transfer, you would not need IFSC Code. The only thing
that you would need is the account number along with the payee name.
These were the major differences between the Intra Bank and Inter Bank
transfer. For any other information, you can call the customer service of SBI
and they will help you with the query.
Always enter the e-banking link by typing it yourself and not through an
arriving email it can be a phishing mail. Always connect through a secure
connection to the website and check if the webpage is authenticated like in
the following image, where the connection is a secure Https − and the
authenticity of web I have checked it through the green bar which is a
certificate which means that this web is pre-authenticated.
These programs help detect and prevent viruses and malicious software.
Banks use up-to-date programs to weed out malware and prevent viruses
from spreading.
Firewalls
SSL encryption creates a secure connection with your browser when you log
in, fill out an application, register for services and more. And although the
technology is sophisticated, it’s easy to make sure that SSL encryption is
active on the page you’re using. Just look for the lock symbol in the address
bar of the page or look for https:// at the beginning of the page’s URL/web
address.
Cookies
Also known as MFA, multi-factor authentication can take many forms. This
extra layer of security requires the use of two or three different authentication
factors. For example, you likely enter a password or PIN when you log in to
your bank’s website. If the site needs additional verification from you, it may
prompt you to answer a question that only you know the answer to or send a
security code to a device that you’ve registered. This is also known as
two-factor or multi-step authentication.
Secure Sockets Layer
SSL encrypts data communicated across the web to guarantee a high level of
privacy. Anyone attempting to intercept this data will meet a jumbled mess of
characters nearly hard to decrypt.
SSL begins an authentication process known as a handshake between two
communicating devices to confirm that both devices are who they say they
are.
SSL also digitally certifies data to ensure data integrity, ensuring that it has
not been tampered with before reaching its intended receiver.
SSL has gone through multiple incarnations, each one more secure than the
last. TLS (Transport Layer Security) was introduced in 1999, replacing SSL.
Objectives of SSL
Data integrity − Information is safe from tampering. The SSL Record
Protocol, SSL Handshake Protocol, SSL Change CipherSpec Protocol,
and SSL Alert Protocol maintain data privacy.
Client-server authentication − The SSL protocol authenticates the client
and server using standard cryptographic procedures.
SSL is the forerunner of Transport Layer Security (TLS), a cryptographic
technology for secure data transfer over the Internet.
Confidentiality
Message Integrity
In the SSL Record Protocol application data is divided into fragments. The
fragment is compressed and then encrypted MAC (Message Authentication
Code) generated by algorithms like SHA (Secure Hash Protocol) and MD5
(Message Digest) is appended. After that encryption of the data is done and
in last SSL header is appended to the data.
Handshake Protocol:
Handshake Protocol is used to establish sessions. This protocol allows the
client and server to authenticate each other by sending a series of messages
to each other. Handshake protocol uses four phases to complete its cycle.
Phase-1: In Phase-1 both Client and Server send hello-packets to each
other. In this IP session, cipher suite and protocol version are exchanged
for security purposes.
Phase-2: Server sends his certificate and Server-key-exchange. The
server end phase-2 by sending the Server-hello-end packet.
Phase-3: In this phase, Client replies to the server by sending his
certificate and Client-exchange-key.
Phase-4: In Phase-4 Change-cipher suite occurred and after this
Handshake Protocol ends.
SSL Handshake Protocol Phases diagrammatic representation
Change-cipher Protocol:
This protocol uses the SSL record protocol. Unless Handshake Protocol is
completed, the SSL record Output will be in a pending state. After the
handshake protocol, the Pending state is converted into the current state.
Change-cipher protocol consists of a single message which is 1 byte in
length and can have only one value. This protocol’s purpose is to cause the
pending state to be copied into the current state.
Alert Protocol:
This protocol is used to convey SSL-related alerts to the peer entity. Each
message in this protocol contains 2 bytes.
The level is further classified into two parts:
Are you ready to protect your website? The following is the fundamental
approach for requesting a publicly trusted SSL/TLS website certificate −
The individual or organization requesting the certificate generates a
pair of public and private keys, which should be stored on the server
being protected.
A certificate signing request is generated using the public key, the
domain name(s) to be protected, and (for OV and EV certificates)
organizational information about the company requesting the
certificate (CSR).
A publicly trusted CA receives the CSR (such as SSL.com). The CA
verifies the information in the CSR and generates a signed certificate
that the requester can install on their web server.
Secure Sockets Layer (SSL) is a standard protocol used for the protected
transmission of files over a network. It is developed by Netscape, SSL
technology makes a secure link between a network server and browser to
provide private and integral data transmission. SSL needs Transport Control
Protocol (TCP) for communication.
When using SSL for secure web transactions, a Web server require an SSL
certificate to create a secure SSL connection. SSL encrypts network
connection segments following the transport layer, which is a network
connection element the program layer.
SSL follows an asymmetric cryptographic mechanism, in which an internet
browser generates a public key and a private (secret) key. The public key is
located in a data file called a certificate signing request (CSR). The private
key is expressed to the recipient only.
SSL uses a cryptographic system that provides two keys to encrypt data a
public key familiar to everyone and a private or secret key known only to the
recipient of the message. Some web browsers provides Secure Sockets
Layer and its successor TSL, and some websites use the protocol to acquire
confidential user information such as credit card numbers. By convention,
URLs that needed an SSL connection start with https rather than HTTP.
SSL works by performing a three-step handshake that is layered on top of a
TCP connection −
When an internet browser attempt to connect to a website, the browser
will first request the internet server identify itself. This prompts the
computer server to send the browser a copy of the certificate.
The browser checks to view if the certificate is trusted and if it is, the
browser sends a verification message to the internet server.
The server responds to the browser with a digitally signed acceptance
to begin an encrypted session. This enables encrypted information to
be shared between the browser and the server, as recognized by the
HTTPS label rather than HTTP.
SSL guarantees that all data traveling among the two devices is private. This
creates it useful for securing online communications such over email, and
bankcard transactions. Web browsers will display an SSL-protected website
as having a padlock in the window where the URL is presented. The URL
prefix is also presented as HTTPS from its old HTTP.
SSL connections are created through the purchasing of SSL certificates from
a certificate authority before they are related to a web server. However, the
certificate authority will charge an inquiry and therefore applicants should
correspond with and submit files to the authority. Because this process is
satisfied, the authority will grant the service provider the ability to need SSL.
Certificates are subject to expiration dates and should be reauthorized with
the certificate authority.
Unit 4
E-governance is about the use of ICT for steering the citizens and promoting
the public service. It includes a pragmatic application and usage of ICT for
delivering efficient and cost effective services and information and knowledge
to the citizens being governed, thereby realizing the vast potential of the
government to serve the citizens (Prabhu: 2015). It made correlations
between state and society, government and people, people to people,
governance and society.
Objectives of E Governance
Types of E-Governance
It provides quality services in several ways. Those ways are also called as
types of e-governance. These are mentioned below-
As people are the key concept of politics and government as well as
governance, the government is compelled to connect with citizens through
the transparent and accountable order. In this connection the government is
responsible for promoting the social opportunities and public services in the
field of-
G2G has been referring to raising the quality of the government process by
cost cutting, managing performance, and making strategic connections within
government.
E-taxation,
Getting a license from the government etc.
Secure Electronics Transactions.
It has included the policy of government with business. According to S.P
Kumar, ‘the essentials for achievement of G2B services for secure and
authentic transactions include: Standards for electronic transactions, a secure
payment mechanism and Public key infrastructure’ (Kumar: 2011).
e-learning methods;
Consolidating the employee and
Share of knowledge among the employees.
It has also facilitated the employee to access information regarding pay and
benefit policies and manage their profits through online.
Data Dissemination
The other target of the bank is to provide the services to its customers all over
the world. This project enables the customers of the Global Bank to see the
general information about the products, services, and schemes offered by the
bank.
The Customers of the bank will be given an email id for each product, where
they can send an e-mail when they have a query to register.
The email will be converted into complaints and then assigned to the persons
handling the product. Persons handling the complaint will have a facility to
communicate with the customer via emails through the system.
Advantages:
Modules:
Administrator
Products
Services
complaints