0% found this document useful (0 votes)
69 views

ETIT Notes

The document discusses inter-bank and intra-bank transfers. Inter-bank transfers involve transferring money between accounts at different banks, requiring the account number and IFSC code. Intra-bank transfers are between accounts at the same bank, only requiring the account number. The document also discusses how to safely conduct online banking transactions, including using HTTPS, firewalls, encryption, and multi-factor authentication.

Uploaded by

Aniket Binewale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views

ETIT Notes

The document discusses inter-bank and intra-bank transfers. Inter-bank transfers involve transferring money between accounts at different banks, requiring the account number and IFSC code. Intra-bank transfers are between accounts at the same bank, only requiring the account number. The document also discusses how to safely conduct online banking transactions, including using HTTPS, firewalls, encryption, and multi-factor authentication.

Uploaded by

Aniket Binewale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Unit 3

Inter Bank Transfer

Inter Bank transfer is basically when you transfer the money to any other
Banks apart from State Bank of India. So, let us assume that you have an
account in State Bank of India and you want to transfer a sum of Rs 1 Lakh to
Mr. A. Mr. A now has an account in Axis Bank so this transfer will now be
called as Inter bank transfer.

You can make the Inter Bank transfer through NEFT, IMPS, and RTGS. For
RTGS, the minimum amount is Rs 2 Lakh and for NEFT there is no minimum
amount. In addition to this, NEFT and RTGS are only processed

It should be noted that for Inter Bank Transfer, you would need the account
number and the IFSC code of the person to whom you are transferring the
money. Now let us move on to Intra Bank Transfer.

Intra Bank Transfer (Third Party Transfer)

Intra Bank transfer is when you transfer the money to someone who has a
bank account in the same bank. So, let us assume that you have an account in
State Bank of India and you want to transfer a sum of Rs 1 Lakh to Mr. B. Mr.
B now has an account in SBI so this sbi to sbi transfer will now be called as
Intra Bank transfer.

For all the Intra Bank transfer, you would not need IFSC Code. The only thing
that you would need is the account number along with the payee name.

These were the major differences between the Intra Bank and Inter Bank
transfer. For any other information, you can call the customer service of SBI
and they will help you with the query.

How to do an e-Banking Transaction Safely?

Always enter the e-banking link by typing it yourself and not through an
arriving email it can be a phishing mail. Always connect through a secure
connection to the website and check if the webpage is authenticated like in
the following image, where the connection is a secure Https − and the
authenticity of web I have checked it through the green bar which is a
certificate which means that this web is pre-authenticated.

Be cautious of any unexpected or suspicious looking pop-ups that appear


during your online banking session. Think about the process you normally go
through to make a payment to someone – be suspicious if it differs from the
last time you used it.
Never give anyone your login details in full either by email or over the phone –
your bank will never request these in this way. Check your bank statements
regularly and contact your bank immediately if you find any transactions that
you did not authorize.
When you send money via your online bank account, always double check the
amount you are sending as well as the account number and sort code you are
sending it to.

Anti-virus and anti-malware protection

These programs help detect and prevent viruses and malicious software.
Banks use up-to-date programs to weed out malware and prevent viruses
from spreading.

Firewalls

Firewalls screen data coming in and out of computer networks, blocking


unauthorized access and stopping traffic from unsafe internet sources.

Secure socket layer (SSL) encryption

SSL encryption creates a secure connection with your browser when you log
in, fill out an application, register for services and more. And although the
technology is sophisticated, it’s easy to make sure that SSL encryption is
active on the page you’re using. Just look for the lock symbol in the address
bar of the page or look for https:// at the beginning of the page’s URL/web
address.

Cookies

By placing a cookie (a piece of text stored on a user’s computer by their web


browser) on your computer after your initial login, banks can then recognize or
authenticate your computer when you log in to your account again. If you use
a new computer to log in to your account — or you erase your cookies — you
will be required to enter additional information at the time of your next login.

Multi-factor authentication measures

Also known as MFA, multi-factor authentication can take many forms. This
extra layer of security requires the use of two or three different authentication
factors. For example, you likely enter a password or PIN when you log in to
your bank’s website. If the site needs additional verification from you, it may
prompt you to answer a question that only you know the answer to or send a
security code to a device that you’ve registered. This is also known as
two-factor or multi-step authentication.
Secure Sockets Layer

Secure Sockets Layer (SSL) is a standard technique for transmitting


documents securely across a network. SSL technology, created by Netscape,
establishes a secure connection between a Web server and a browser,
ensuring private and secure data transmission. SSL communicates using the
Transport Control Protocol (TCP).
The term "socket" in SSL refers to the method of sending data via a network
between a client and a server.
A Web server requires an SSL certificate to establish a secure SSL
connection while using SSL for safe Internet transactions. SSL encrypts
network connection segments atop the transport layer, a network connection
component above the program layer.
SSL is based on an asymmetric cryptographic process in which a Web
browser generates both a public and a private (secret) key. A certificate
signing request is a data file that contains the public key (CSR). Only the
recipient receives the private key.

How Does SSL Work?

SSL encrypts data communicated across the web to guarantee a high level of
privacy. Anyone attempting to intercept this data will meet a jumbled mess of
characters nearly hard to decrypt.
SSL begins an authentication process known as a handshake between two
communicating devices to confirm that both devices are who they say they
are.
SSL also digitally certifies data to ensure data integrity, ensuring that it has
not been tampered with before reaching its intended receiver.
SSL has gone through multiple incarnations, each one more secure than the
last. TLS (Transport Layer Security) was introduced in 1999, replacing SSL.

Objectives of SSL

The goals of SSL are as follows −


Data integrity − Information is safe from tampering. The SSL Record
Protocol, SSL Handshake Protocol, SSL Change CipherSpec Protocol,
and SSL Alert Protocol maintain data privacy.


Client-server authentication − The SSL protocol authenticates the client
and server using standard cryptographic procedures.


SSL is the forerunner of Transport Layer Security (TLS), a cryptographic
technology for secure data transfer over the Internet.

Secure Socket Layer Protocols: 


 SSL record protocol
 Handshake protocol
 Change-cipher spec protocol
 Alert protocol

SSL Record Protocol: 

SSL Record provides two services to SSL connection. 

 Confidentiality
 Message Integrity
In the SSL Record Protocol application data is divided into fragments. The
fragment is compressed and then encrypted MAC (Message Authentication
Code) generated by algorithms like SHA (Secure Hash Protocol) and MD5
(Message Digest) is appended. After that encryption of the data is done and
in last SSL header is appended to the data. 
 

Handshake Protocol: 
Handshake Protocol is used to establish sessions. This protocol allows the
client and server to authenticate each other by sending a series of messages
to each other. Handshake protocol uses four phases to complete its cycle. 
 Phase-1: In Phase-1 both Client and Server send hello-packets to each
other. In this IP session, cipher suite and protocol version are exchanged
for security purposes. 
 Phase-2: Server sends his certificate and Server-key-exchange. The
server end phase-2 by sending the Server-hello-end packet. 
 Phase-3: In this phase, Client replies to the server by sending his
certificate and Client-exchange-key. 
 Phase-4: In Phase-4 Change-cipher suite occurred and after this
Handshake Protocol ends. 
 
SSL Handshake Protocol Phases diagrammatic representation

Change-cipher Protocol: 

This protocol uses the SSL record protocol. Unless Handshake Protocol is
completed, the SSL record Output will be in a pending state. After the
handshake protocol, the Pending state is converted into the current state. 
Change-cipher protocol consists of a single message which is 1 byte in
length and can have only one value. This protocol’s purpose is to cause the
pending state to be copied into the current state. 

Alert Protocol: 

This protocol is used to convey SSL-related alerts to the peer entity. Each
message in this protocol contains 2 bytes.
The level is further classified into two parts: 
 

How to Obtain an SSL/TLS Certificate?

Are you ready to protect your website? The following is the fundamental
approach for requesting a publicly trusted SSL/TLS website certificate −


The individual or organization requesting the certificate generates a
pair of public and private keys, which should be stored on the server
being protected.


A certificate signing request is generated using the public key, the
domain name(s) to be protected, and (for OV and EV certificates)
organizational information about the company requesting the
certificate (CSR).


A publicly trusted CA receives the CSR (such as SSL.com). The CA
verifies the information in the CSR and generates a signed certificate
that the requester can install on their web server.

Secure Sockets Layer (SSL) is a standard protocol used for the protected
transmission of files over a network. It is developed by Netscape, SSL
technology makes a secure link between a network server and browser to
provide private and integral data transmission. SSL needs Transport Control
Protocol (TCP) for communication.
When using SSL for secure web transactions, a Web server require an SSL
certificate to create a secure SSL connection. SSL encrypts network
connection segments following the transport layer, which is a network
connection element the program layer.
SSL follows an asymmetric cryptographic mechanism, in which an internet
browser generates a public key and a private (secret) key. The public key is
located in a data file called a certificate signing request (CSR). The private
key is expressed to the recipient only.
SSL uses a cryptographic system that provides two keys to encrypt data a
public key familiar to everyone and a private or secret key known only to the
recipient of the message. Some web browsers provides Secure Sockets
Layer and its successor TSL, and some websites use the protocol to acquire
confidential user information such as credit card numbers. By convention,
URLs that needed an SSL connection start with https rather than HTTP.
SSL works by performing a three-step handshake that is layered on top of a
TCP connection −


When an internet browser attempt to connect to a website, the browser
will first request the internet server identify itself. This prompts the
computer server to send the browser a copy of the certificate.


The browser checks to view if the certificate is trusted and if it is, the
browser sends a verification message to the internet server.


The server responds to the browser with a digitally signed acceptance
to begin an encrypted session. This enables encrypted information to
be shared between the browser and the server, as recognized by the
HTTPS label rather than HTTP.

SSL guarantees that all data traveling among the two devices is private. This
creates it useful for securing online communications such over email, and
bankcard transactions. Web browsers will display an SSL-protected website
as having a padlock in the window where the URL is presented. The URL
prefix is also presented as HTTPS from its old HTTP.
SSL connections are created through the purchasing of SSL certificates from
a certificate authority before they are related to a web server. However, the
certificate authority will charge an inquiry and therefore applicants should
correspond with and submit files to the authority. Because this process is
satisfied, the authority will grant the service provider the ability to need SSL.
Certificates are subject to expiration dates and should be reauthorized with
the certificate authority.

Unit 4

What is E-Governance or Electronic Governance?


A new paradigm shift has been developed in the field of governance by the
application of ICT in the processes of governing called
Electronic-Governance or E-Governance. 

E-governance raises the transparency, accountability, efficiency, and


effectiveness and inclusiveness in the governing process in terms of reliable
access to the information within government, between government, national,
state, municipal, and local level governments, citizens, and businesses and
empowers business through access and use of information

The main focus of the E-Governance or electronic governance is to provide


transparent, equitable, and accountable service delivery to the citizens. The
aim of the e-governance facilitates and improves the quality of governance
and ensures people’s participation in the governing process through
electronic means like e-mail, websites, SMS connectivity, and others. 

E-governance is about the use of ICT for steering the citizens and promoting
the public service. It includes a pragmatic application and usage of ICT for
delivering efficient and cost effective services and information and knowledge
to the citizens being governed, thereby realizing the vast potential of the
government to serve the citizens (Prabhu: 2015). It made correlations
between state and society, government and people, people to people,
governance and society.

Objectives of E Governance

The objectives of e governance are as follows-

1. One of the basic objectives of e-governance is to make every


information of the government available to all in the public interest.
2. One of its goals is to create a cooperative structure between the
government and the people and to seek help and advice from the people,
to make the government aware of the problems of the people.
3. To increase and encourage people’s participation in the governance
process.
4. e-Governance improves the country’s information and communication
technology and electronic media, with the aim of strengthening the
country’s economy by keeping governments, people and businesses in
tune with the modern world.
5. One of its main objectives is to establish transparency and
accountability in the governance process.
6. To reduce government spending on information and services.
Features of E Governance

It has been proven from the concept of e-governance that it is a powerful


means of public service in the present era. Some of its features can be found
by observing the functioning of e-governance.
1. De bureaucratization: Due to e-governance, the gap between the
people and the government in all the services of the government is
narrowing and the dependence of the people on the bureaucracy is also
greatly reduced.
2. E-Services: Its main feature is the provision of services through the
Internet. As a result, we get G2C, G2B, G2E, etc. services. This is already
discussed in the section of ‘types of governance’.
3. International Services: through e-governance, all the essential services
can be delivered to the citizens who are living outside of their country
for job purposes or any other reasons. 
4. It enhances the right to express to the citizens. Using the means of
e-governance anyone can share their views with the government on any
bill or act or decision taken by the government. 
5. Economic Development: With the introduction of e-governance, various
information like import-export, registration of companies, investment
situations, etc. are available through the internet. As a result, time is
saved, procrastination decreases, and economic dynamism increases. 
6. Reduce inequality: using e-governance tools everyone can gather
information and empower themselves. In this globalized world,
knowledge is power, and means of e-governance empower us by
providing relevant information at minimal cost, effort, and time. 
Types of E Governance

E-Governance can be considered as the social inclusive policy for


development of transparency and accountability of both people in society and
administration. This policy involves providing the services to the people with
collection of information through the institutional and communicational
development.  

Types of E-Governance

It provides quality services in several ways. Those ways are also called as
types of e-governance. These are mentioned below-

1. G2C (Government to Citizen) 


2. G2G (Government to Government)
3. G2B (Government to Business) 
4. G2E (Government to Employee) 
1. G2C (Government to Citizen)

 As people are the key concept of politics and government as well as
governance, the government is compelled to connect with citizens through
the transparent and accountable order.  In this connection the government is
responsible for promoting the social opportunities and public services in the
field of-

 Transportation (Registration of motor vehicles, Issue of driving


licenses, Issue of plying permissions, Tax and fee collection through
cash and bank challans and control of pollution etc.), 
 hospitals (linking of various hospitals in different parts of the country
to ensures better medical services to citizens), 
 education ( availability of the e-learning modules to the citizens, right to
education), 
 online job portal and various customer services. 
It also ensures services such as issue of certificates, job cards, passport,
ration cards, payments of bills and filing the taxes from the door step through
e-governance platform. The main objectives of the G2C  services are to
ensure equitable distribution of information for all, acceptance of citizen’s
feedback, and improving welfare services.

2. G2G (Government to Government) 

G2G has been referring to raising the quality of the government process by
cost cutting, managing performance, and making strategic connections within
government. 

It enables government institutions to be more efficient and more effective by


the use of IT tools such as-

 Live fingerprints scanning and verification, 


 Electronic entry of reports and paperwork etc. 
The major key areas in this type of e-governance are 

 E-Secretariat (all the valuable information regarding the function of the


government are interlinking throughout the various departments), 
 E-Police (police personnel records, criminal records etc), and
 E-Court (creating a database of all the previous cases, pending and
ongoing cases) and Statewide Networks (Kumar: 2011).
3. G2B (Government to Business) 

G2B is mainly concerned with these things- 

 E-taxation, 
 Getting a license from the government etc.
 Secure Electronics Transactions.
It has included the policy of government with business. According to S.P
Kumar, ‘the essentials for achievement of G2B services for secure and
authentic transactions include: Standards for electronic transactions, a secure
payment mechanism and Public key infrastructure’ (Kumar: 2011).

4. G2E (Government to Employee) 


The G2E model refers to providing information and services from government
to employee and employee to government as well. It involves training through-

 e-learning methods; 
 Consolidating the employee and 
 Share of knowledge among the employees. 
It has also facilitated the employee to access information regarding pay and
benefit policies and manage their profits through online.

Data Dissemination

The data dissemination is a method of distributing or transmitting the


statistical or another type of data to the end-users. The data can be in the
form of audio, video or any other data services. Organizations use many ways
to release data to the public, such as electronic format, CD-ROM and paper
publications, i.e., files based on aggregated data. Mobile devices receive
output data. A mobile device can select, tune and cache the required data
items, which can be used for application programs.

Nowadays, the most popular dissemination method is non-proprietary open


systems using internet protocols. There are various communication
infrastructures that can be used in data dissemination across any set of
interconnected networks. Data is made available in standard open formats.

Some organizations use proprietary databases to disseminate the data in


order to protect the sovereignty and copyright of the data. If you use
proprietary databases to disseminate the data, it requires specific software
for end-users to view the data. This type of transmitted data cannot be open
in common open formats. This type of data is first converted into the
proprietary data format, and then the organization provides specifically
designed software to their user to read the data.

Query Redressal System .


The Query Redressal System is designed for the customers of the Global Bank.
Through this system, the bank will manage the complaints from the
customers and provide the better services for their customers.

The other target of the bank is to provide the services to its customers all over
the world. This project enables the customers of the Global Bank to see the
general information about the products, services, and schemes offered by the
bank.

The Customers of the bank will be given an email id for each product, where
they can send an e-mail when they have a query to register.
The email will be converted into complaints and then assigned to the persons
handling the product. Persons handling the complaint will have a facility to
communicate with the customer via emails through the system.

Advantages:

 No wastage of time to send a query.


 We also can know the complaint details.
 Requires less man power.

Modules:

 Administrator
 Products
 Services
 complaints

You might also like