IT Manual Intermediate
IT Manual Intermediate
ICT has become the heart of the banking sector in Bangladesh now-a-days. The banking
industry is the soul of every robust economy. ICT is helping the banking sector to improve its
efficiency and effectiveness of services offered to customers, and boosts business processes,
managerial decision making, and workgroup collaborations which strengthen their competitive
positions in rapidly changing and emerging economies.
Technology is and will remain fundamental to the future of banking. It provides banks with
multiple and constantly emerging channels to communicate with customers and analyze their
behaviors allowing smoother, more convenient and accessible channels for customers to use
whilst capturing more data to continually improve on this offering. This technology also means
an improvement in banks internal systems and processes, resulting in a more efficient and
ultimately more profitable bank.
All banks in Bangladesh have made substantial investments in ICT platforms and Information
systems, and built multiple distribution channels to provide online financial services to its
customers. By and large, the banks have been successful in developing state-of-the-art product
features, reducing operating costs, enhancing customer service delivery and lessening inherent
risks.
In Bangladesh, banks have established large ATM and POST networks for providing 24/7
customer services. They offer the services to its customers like electronic payment services
through virtual cash and e-cards, ATM/POS, Mobile Banking, Internet and Apps Banking etc.
The bank management are now thinking seriously to reduce administrative/operating cost for
profit maximization through some initiatives/measures like optimum utilizations of IT/IS
resources, reducing cash/paper-based transactions, enhancing virtual cash and digital payment,
online internal communications among the employees and others stakeholders of banks
through Intranet and Extranet platform. With a view to increase cashless transactions, banks
are now introducing innovative digital services like Mobile Apps, QR-code payment, Digital
Wallet etc.
As many financial products and services directly or indirectly depend on ICT, banks have to
think how to utilize IT resources efficiently and introduce innovative digital financial
technology to lessen the cost; improvement of the efficiency and productivity of employees;
ensuring secured, reliable and speedy internal IT operations; and how to provide better services
to the modern tech-savvy customers. Otherwise, banks may face serious IT risks as well as
business risks in the present competitive and digital age.
2020 1666
2019 2478
2018 2021
2017 2035
2016 1793
Hardware
Software 2016
Network 2017
2018
Security
2019
Training 2020
Audit
Others
72
66
62
47
35
30
28
28
28
25
9
In our country, 74% banks (providing MFS) have introduced mobile banking App. Among
them, 23% banks have developed it with joint collaboration of local vendor, 44% have
developed the app in-house, whereas local vendors have developed the app for remaining 33%
banks. Major challenges regarding mobile banking faced by banks are summarized in Box-1.
Most POSTs (91.6%) are being operated in urban areas. In Dhaka city, 86% POSTs are in
operation. In Bangladesh only, PCBs provide this service. In 2020, total number of transactions
of POS was recorded at 2.8 crore which was 3.1 crore in previous year (2019).
1.3.7 ATM
An automated teller machine (ATM) enables banks’ customers to perform transactions, like
cash withdrawal, deposit, funds transfer, or inquiries about account information, at any time
and without the need for direct communication with bank employee. The growth of ATM in
Bangladesh is shown in Table-4.
Table-4: Number of ATM
2015 2016 2017 2018 2019 2020
ATM 7839 9019 9522 10355 10924 11923
Source: e-Banking and e-Commerce Statistics Unit, (July 2021), BB
1.3.8 Cash Recycler Machines (CRM) and Cash Deposit Machine (CDM)
New types of ATMs are now revolutionizing the banking industry. These machines, called
CRMs, are designed to recycle deposited cash for use in subsequent withdrawal transactions.
The benefit of deploying a CRM is enhanced efficiency – both in terms of operations as well
as costs, consistent and reliable counting of cash. Currency-recycling technology allows cash
to be accepted, validated, sorted, stored and dispensed at a later time, cutting down the need
for daily monitoring and replenishment, while offering greater quality control and the ability
to make automatic, real-time deposits. Only 28% banks in Bangladesh installed CRMs and 780
CRMs has been installed by these banks in 2020, increasing from 254 in 2019, which shows a
Using CDM (Cash Deposit Machine), customers can deposit money in real-time and get instant
reflections of the transaction with an instant notification message. In 2020, only 47% banks in
Bangladesh installed CDMs and there were 1648 CDMs in the market which was 1407 in 2019.
One point worth mentionable that, only 30% CDMs are installed in rural areas.
1.4 Current Status of IT Based products and Services of NCC Bank Limited
National Credit and Commerce Bank Limited (NCCBL) bears a unique history of its own. The
organization started its journey in the financial sector of the country as an investment company
back in 1985. The aim of the company was to mobilize resources from within and invest them
in such way so as to develop country's Industrial and Trade Sector and playing a catalyst role
in the formation of capital market as well. Its membership with the browse helped the company
to a great extent in these regards. The company operated upto 1992 with 16 branches and
thereafter with the permission of the Central Bank converted into a full-fledged private
commercial Bank in 1993 with paid up capital of Tk. 39.00 crore to serve the nation from a
broader platform. Since its inception NCC Bank Ltd. has acquired commendable reputation by
providing sincere personalized service to its customers in a technology-based environment.
The Bank has set up a new standard in financing in the Industrial, Trade and Foreign exchange
business. Its various deposit & credit products have also attracted the clients-both corporate
and individuals who feel comfort in doing business with the Bank.
Information technology is one of the most priority areas for NCCBL. It invested more than Tk
100 crore for the development of its ICT infrastructure from its inception. In last year (2021)
the bank invested approximately Tk 13 crore for the development of its ICT. However, the
consistent investment in IT takes the bank in a different level. IT investment report of the bank
shows that it basically invests in the area of hardware, software, network, information security
and so on.
The bank has a competent and strong IT team headed by a Head of IT (HoIT). Currently, 58
employees are working restlessly to ensure an uninterrupted ICT infrastructure of the bank.
Most of the IT employees work in branch and zonal IT support. A good number of employees
continuously monitoring and updating the security system of the bank. IT employees also work
in the head office development team, IT audit, DC/DRS management, ADC system
The bank uses number of Alternative Delivery Channels (ADCs) to facilitate customers.
Among various services Internet Banking, Cards, ATMs, POS, and CRM are remarkable. The
bank has more than eight thousand internet banking (IB) users. In last year (2021),
approximately Tk 52 crore were transected using IB facilities by the customers. The bank has
57936 debit cards and 21987 credit cards respectively till December 2021. All together card
users made a transaction volume of approximately Tk 60 crore. It is to be noted that all cards
are chip based. However, to provide 24/7 banking facilities the bank has 136 ATMs, 74 POS
terminal and 8 Cash Recycler Machines. All the ADCs are doing good in terms of number of
transactions and volume of transactions.
NCC bank uses Flora Bank, fully Web based, as its core banking software. The CBS has been
provided by Flora Systems Limited. Other than CBS, the bank uses more than 40 application
software for smooth operation. Among them Structural Liquidity, Remittance API, Corporate
Payment Portal, LC Transmission SMS to customer, Credit Card Bill Payment Solution,
Document Archiving, Transaction Monitoring, SWIFT Message Processing System, Sanction
Screening etc. are remarkable.
The bank has a strong database management system for managing data. It is also seen that the
bank has a separate MIS division which helps report preparation and decision making.
However, the bank did not introduce data mining and data analytics tools for analyzing large
data set. Data mining and data analytics may help bank analyzing large volume of data and find
various pattern for decision making.
The Data Centre of NCC bank is located in NCCBL Head Office, Motijheel whereas the
Disaster Recovery Site (DRS) is located in Gulshan-2, Dhaka. The bank has high speed
multiprotocol labeling switching network, clustered servers, virtualized server environments,
precision cooling systems, and central UPS backed by standby generators.
2.1 Data
Data can be defined as a representation of facts, concepts, or instructions in a formalized
manner, which should be suitable for communication, interpretation, or processing by human
or electronic machine. Data is represented with the help of characters such as alphabets (A-Z,
a-z), digits (0-9) or special characters (+,-,/,*,<,>,= etc.). When we look at a computer, we see
text and images and shapes. To a computer, all of that is just binary data, 1s and 0s. For
example, the following 1s and 0s represents a tiny GIF.
000101010101101010101010010100001110000111010010101101010
101001001010110101010101010101001010000101010010100001110
000101010101101010010101101010101010101010010100001110000
101101010101010101010010100000001010101011010100101011010
011010101010101001010000111000011101010110101001010110101
000101010101101010010101101010101010101010010100001110000
000101010101101010010101101010101010101010010100001110000
000101010101101010010101101010101010101010010100001110000
The ASCII (American Standard Code for Information Interchange) character set is an 8-bit
structure allows 128 different characters. That is enough for every upper-case letter, lower-case
letter, digit and punctuation mark on most keyboards. ASCII is only used for the English
language. Unicode is the new standard for representing characters of all the languages of the
2.2 Information
Information is organized or classified data, which has some meaningful values for the receiver.
Information is the processed data on which decisions and actions are based.
For the decision to be meaningful, the processed data must qualify for the following
characteristics −
• Timely − Information should be available when required.
• Accuracy − Information should be accurate.
• Completeness − Information should be complete.
• Input − In this step, the input data is prepared in some convenient form for processing.
The form will depend on the processing machine. For example, when you create an account
and do transactions, you give input to the computer.
Control Unit: This unit controls the operations of all parts of the computer but does not carry
out any actual data processing operations. Functions of this unit are −
• It is responsible for controlling the transfer of data and instructions among other units
of a computer.
• It manages and coordinates all the units of the computer.
• It obtains the instructions from the memory, interprets them, and directs the operation
of the computer.
• It communicates with Input/ Output devices for transfer of data or results from storage.
• It does not process or store data.
Memory or Storage Unit: This unit can store instructions, data, and intermediate results. This
unit supplies information to other units of the computer when needed. It is also known as
internal storage unit or the main memory or the primary storage or Random Access Memory
(RAM). Its size affects speed, power, and capability. Primary memory and secondary memory
are two types of memories in the computer. Functions of the memory unit are −
• It stores all the data and the instructions required for processing.
• It stores intermediate results of processing.
• It stores the final results of processing before these results are released to an output device.
• All inputs and outputs are transmitted through the main memory.
A memory is just like a human brain. It is used to store data and instructions. Computer memory
is the storage space in the computer, where data is to be processed and instructions required for
processing are stored. The memory is divided into large number of small parts called cells.
Each location or cell has a unique address. Memory is primarily of three types −
• Cache Memory: Cache memory is a very high-speed memory which can speed up the
CPU. It acts as a buffer between the CPU and the main memory. It is used to hold those
parts of data and program which are most frequently used by the CPU. The parts of data
and programs are transferred from the disk to cache memory by the operating system,
from where the CPU can access them.
Cache Primary Secondary
Memory Memory Memory
CPU
(Hard
(RAM) Disk)
RAM (Random Access Memory) is the internal memory of the CPU for storing data,
program, and program result. It is a read/write memory which stores data until the machine
is working. Access time in RAM is independent of the address, that is, each storage
location inside the memory is as easy to reach as other locations and takes the same amount
of time. Data in the RAM can be accessed randomly.
RAM is volatile, i.e. data stored in it is lost when we switch off the computer or if there is
a power failure. Hence, a backup Uninterruptible Power System (UPS) is often used with
computers. RAM is small, both in terms of its physical size and in the amount of data it
can hold. RAM is of two types − Static RAM (SRAM) and Dynamic RAM (DRAM)
The memory from which we can only read but cannot write on it (Now a days in special
cases some ROM are writeable). This type of memory is non-volatile. The information is
stored permanently in such memories during manufacture. A ROM stores such instructions
that are required to start a computer. This operation is referred to as bootstrap. ROM chips
are not only used in the computer but also in other electronic items like washing machine
and microwave oven.
• Secondary Memory: This type of memory is also known as external memory or non-
volatile. It is slower than the main memory. These are used for storing data/information
permanently. CPU directly does not access these memories. The contents of secondary
memories are first transferred to the main memory (RAM), and then the CPU can access
it. For example, hard disk, CD-ROM, DVD, etc.
When talking about data storage, we often measure whole system storage capacity in
terabytes, but most individual files take up megabytes or gigabytes for large files. Because
a byte contains so little information, the processing and storage capacities of computer
hardware are usually given in gigabytes (GB; one billion bytes) and terabytes (TB; one
In terms of ASCII character (8-bit structure) 6597069766656 letters, symbols like ‘A’, ‘$’
can be stored (!)
Again 6 Terabyte = 6 × 1024 × 1024 × 1024 × 1024 × 8 Bits
= 52776558133248 Bits
We can store 52776558133248 binary signals ‘0’s or ‘1’s.
In general, a higher clock speed means a faster CPU. Your CPU processes many instructions
(low-level calculations like arithmetic) from different programs every second. The clock speed
measures the number of cycles your CPU executes per second, measured in GHz (gigahertz).
A “cycle” is technically a pulse synchronized by an internal oscillator, but for our purposes,
they’re a basic unit that helps understand a CPU’s speed. During each cycle, billions of
transistors within the processor open and close. A CPU with a clock speed of 3.2 GHz executes
3.2 billion cycles per second. (Older CPUs had speeds measured in megahertz, or millions of
cycles per second.)
Processor cores are individual processing units within the computer’s central processing unit
(CPU). The processor core receives instructions from a single computing task, working with
the clock speed to quickly process this information and temporarily store it in the Random
Access Memory (RAM). Permanent information is saved to your hard drive when you request
it.
Most computers now have multiple processor cores that enable your computer to complete
multiple tasks at once. Having the ability to run numerous programs and request multiple tasks
like making edits to a document, while watching a video, while opening a new program, is
made possible with multiple processor core units.
For complex video games or programs, it is essential to have a CPU that can keep up with
information like the audio and video feed being distributed rapidly. In a digital age where we’re
all expert multi-taskers, processor cores have become increasingly important to computer users.
Having multiple processor cores gives you the freedom to increase productivity at work, play
complex video games, or explore a new world with virtual reality.
Now a days, processor like Intel® Core™ i9-12900 is available in the market which has 16
cores, 30M cache and up to 5.10 GHz clock speed (5.1 billion cycle per second).
Programming, also known as coding, refers to the process of writing instructions for computing
devices and systems. A computer program translates those instructions into a language that
computers can understand. Computer programmers use many different languages to command
computers. Popular programming languages include R, Python, JavaScript, Java, and the C-
languages (C, C++, C#).
Computer programmers created every application that computers run - from photo editing
software to word processors and web browsers. Programming languages unlock the power of
computing systems. And without computer programming, our computing devices would not
function. Programming languages also manage the hidden side of computing. Programs pull
information from databases, implement security procedures to protect private data, and operate
memory backup systems. Computer programmers write code in languages like Java, Python,
and C++. Depending on their focus area - web development, mobile application development,
software engineering, and so on - they use different languages.
A computer program is a list of instructions that enable a computer to perform a specific task.
Computer programs can be written in high- and low-level languages, depending on the task
and the hardware being used.
Assembly Language: Few programmers write programs in low level assembly language, but
it is still used for developing code for specialist hardware, such as device drivers. It is easy
distinguishable from a high-level language as it contains few recognizable human words but
plenty of mnemonic code. Assembly language is one level above machine language. It uses
short mnemonic codes for instructions and allows the programmer to introduce names for
blocks of memory that hold data. One might thus write “add 5, 2” instead of
“0110101100101000” for an instruction that adds two numbers. Assembly language is
designed to be easily translated into machine language. Like machine language, assembly
language requires detailed knowledge of a particular internal computer architecture. It is useful
when such details are important, as in programming a computer to interact with input/output
devices (printers, scanners, storage devices, and so forth).
User
Motherboard: The motherboard serves as a single platform to connect all of the parts of a
computer together. It connects the CPU, memory, hard drives, optical drives, video card, sound
card, and other ports and expansion cards directly or via cables. It can be considered as the
backbone of a computer.
Port: A port is a physical docking point using which an external device can be connected to
the computer. It can also be programmatic docking point through which information flows
from a program to the computer or over the Internet. USB, PS/2, LPT are common example.
A Standard Specification of a PC
Component Specification
10th or 11th Gen Intel Core i5, i7 or i9 Processor, or Apple M1 Processor
Processor
(CPU)
Operating System Microsoft Windows Pro or Enterprise version
Office Suite Microsoft Office 365 for Windows
Memory (RAM) 8-16 GB of RAM
Storage 240 GB solid state drive, or larger.
Integrated or Discrete graphics processor capable of 1440 X 900 resolution,
Video/Graphics
or better (1920 X 1080 or 1200 ideal).
Monitor 19″ – 27″ widescreen flat-panel display
Mouse Built-in or external trackpad, wireless and/or USB, 2-button, optical mouse
Sound Sound card or built-in audio, and speakers
Headphones Headphones or Earbuds, with Built-in Microphone
Webcam Either external USB device or built-in
Network 802.11ac Wi-Fi capability.
Warranty 3 years warranty.
Cleaning your computer regularly can help extend its shelf life, saving you time and money
on repairs and replacements. Remember that computers are especially prone to dust
and overheating, so these steps can help reduce risk and keep your computer running optimally.
• Dust your keyboard using compressed air: Dusting your keyboard off at least once a
week can help maintain it (and reduce health risks). Wipe down your keyboard with a damp
lint-free cloth, but be sure not to soak it in water. For harder to reach areas such as in
between the keyboard keys, use a compressed air canister.
• Wipe down your monitor: Fingerprints and other stains can appear regularly on your
monitor. In order to keep your screen view fresh and clean, wipe down your monitor once
a week using a dry lint-free cloth. Gently wipe in long motions as pressing too hard can
damage your device. Oftentimes, your computer will come with a microfiber cleaning cloth
upon purchase. Use this cloth or order a similar one for optimal cleaning.
Backup Data
At least once a week you should backup your drive. If you’re working on an important project,
you can do this daily to ensure your files are securely stored. Backing up your data
saves important files in the event of a hard drive failure or system crash.
Just like an automobile, your computer needs to be regularly maintained to run properly. Doing
regular computer maintenance can greatly extend the lifespan of the device and may keep you
safer while browsing online. Through completing just a few simple steps, you’ll get a faster
and healthier operating system to work on.
Note: Remember every bank has its own ICT management and security guidelines. Follow the
instructions of your bank before take any action regarding maintenance of a computer system.
First Generation The period of first generation: 1946-1959. Vacuum tube based.
Third Generation The period of third generation: 1965-1971. Integrated Circuit based.
Fourth Generation The period of fourth generation: 1971-1980. VLSI microprocessor based.
Fifth Generation The period of fifth generation: 1980-onwards. ULSI microprocessor based.
2.12.2 Workstation
Workstation is a computer used for engineering applications (CAD/CAM), desktop
publishing, software development, and other such types of applications which require a
moderate amount of computing power and relatively high-quality graphics capabilities.
Workstations generally come with a large, high-resolution graphics screen, large amount of
RAM, inbuilt network support, and a graphical user interface. Most workstations also have
mass storage device such as a disk drive, but a special type of workstation, called diskless
workstation, comes without a disk drive. Common operating systems for workstations are
UNIX and Windows NT. Like PC, workstations are also single-user computers like PC but are
typically linked together to form a local-area network, although they can also be used as stand-
alone systems.
2.12.4 Mainframe
Mainframe is very large in size and is an expensive computer capable of supporting hundreds
or even thousands of users simultaneously. Mainframe executes many programs concurrently
and supports many simultaneous executions of programs. Mainframe computer likes as a big
centralized machine that contains the large memory, huge storage space, multiple high-grade
processors, so it has ultra-processing power compared to standard computer systems.
So, mainframe computer system’s importance is increasing for large scale organization,
scientific research, consumer statistics, and census data, because it is capable to execute
multiple complex programs concurrently at the ultra-speed. Today, most eminent vendors of
mainframe computers are IBM, Hitachi, Amdahl, and Unisys.
2.12.5 Supercomputer
Supercomputers are one of the fastest computers currently available. Supercomputers are very
expensive and are employed for specialized applications that require immense amount of
mathematical calculations (number crunching). For example, weather forecasting, scientific
Sample Questions
1. Describe how does a computer represents data?
2. What is the difference between data and information? Discuss data processing cycle
with example.
3. Discuss different types of memories with example?
4. What is CPU? What is the role of CPU in a computer system?
5. Write a standard specification to buy a PC to use as a banking terminal?
6. Distinguish among high, low and mid-level language with example.
7. Classify different types of software with example.
8. How will you take care of your PC so that it can last long?
3.1 Introduction
Data Communication is defined as exchange of data between two devices via some form of
transmission media such as a cable, wire or it can be air or vacuum also. For occurrence of data
communication, communicating devices must be a part of communication system made up of
a combination of hardware or software devices and programs. Computer networks are essential
to modern organizations for many reasons. First, networked computer systems enable
organizations to become more flexible so that they can adapt to rapidly changing business
conditions. Second, networks allow companies to share hardware, computer applications, and
data across the organization and among different organizations. Third, networks make it
possible for geographically dispersed employees and workgroups to share documents, ideas,
and creative insights. This sharing encourages teamwork, innovation, and more efficient and
effective interactions. In addition, networks are a critical link between businesses, their
business partners, and their customers.
Sender: To transfer message from source to destination, someone must be there who will play
role of a source. Sender plays part of a source in data communication system. It is simple a
device that sends data message. The device could be in form of a computer, mobile, telephone,
laptop, video camera, or a workstation, etc.
Receiver: It is destination where finally message sent by source has arrived. It is a device that
receives message. Same as sender, receiver can also be in form of a computer, telephone
mobile, workstation, etc.
Set of Rules (Protocol): To govern data communications, various sets of rules had been
already designed by the designers of the communication systems, which represent a kind of
agreement between communicating devices. These are defined as protocol. In simple terms,
the protocol is a set of rules that govern data communication. If two different devices are
connected but there is no protocol among them, there would not be any kind of communication
between those two devices. Thus, the protocol is necessary for data communication to take
place.
A typical example of a data communication system is sending an e-mail. The user which send
email act as sender, message is data which user wants to send, receiver is one whom user wants
to send message, there are many protocols involved in this entire process, one of them is Simple
Mail Transfer Protocol (SMTP). The Simple Mail Transfer Protocol (SMTP) is an internet
standard communication protocol for electronic mail transmission. Both sender and receiver
must have an internet connection which uses a set of medium to send and receive email.
Twisted Pair: The most prevalent form of communications wiring - twisted-pair wire - is used
for almost all business telephone wiring. As the name suggests, it consists of strands of copper
wire twisted in pairs. Twisted-pair wire is
relatively inexpensive to purchase, widely
available, and easy to work with. However, it also
has some significant disadvantages. Specifically,
it is relatively slow for transmitting data, it is
subject to interference from other electrical
sources, and it can be easily tapped by unintended
receivers to gain unauthorized access to data.
Fiber Optic: Fiber-optic cable consists of thousands of very thin filaments of glass fibers that
transmit information via light pulses generated by lasers. The fiber-optic cable is surrounded
by cladding, a coating that prevents the light from leaking out of the fiber. Fiber-optic cables
are significantly smaller and lighter than traditional cable media. They also can transmit far
more data, and they provide greater security from
interference and tapping. As of early-2015, optical
fiber had reached data transmission rates of more than
50 trillion bits (terabits) per second in laboratory
experiments. Fiber-optic cable is typically used as the
backbone for a network, whereas twisted-pair wire
and coaxial cable connect the backbone to individual
devices on the network.
Microwave: Microwave works by sending and receiving high-frequency radio waves, which
may carry speech, video, and data. Microwave connections are commonly utilized for point-
to-point communications because their short wavelength permits narrow beams to be directed
directly at the receiving antenna. Unlike lower frequency radio waves, microwave devices can
utilize the same frequencies without interfering.
Microwave is a high-frequency (300 MHz–300 GHz) signal sent through the air. Terrestrial
(Earth-bound) microwaves are transmitted by line-of-sight devices, so the line of sight between
the transmitter and receiver must be unobstructed. Typically, microwave stations are placed in
a series - one station receives a signal, amplifies it, and retransmits it to the next microwave
transmission tower. Such stations can be located roughly 30 miles apart before the curvature
of the Earth makes it impossible for the towers to “see” one another. Microwave signals can
carry thousands of channels at the same time. Because they are line-of-sight transmission
Intermediate Level IT Manual for NCC Bank Limited Page | 41
devices, microwave dishes are frequently placed in relatively high locations, such as
mountains, towers, or tall buildings.
NIC or Network Interface Card: Network Interface Card is a hardware device that is installed
on the computer so that it can be connected to the internet. It is also called Ethernet
Card or Network Adapter. Every NIC has a 48-bit unique serial number called a MAC address
which is stored in ROM carried on the card. Every computer must have at least one NIC if it
wants to connect to the internet.
Hub: A hub is a networking device used to connect multiple devices directly to the network
using cables. Each connection is called a 'port.' The connections typically consist of a fiber
optic Ethernet cable. When the hub receives data at one of its ports, it distributes the data to the
other ports in the network. Typically, a hub sends all the data it receives to all the other ports.
Switch: Switches tend to be more intelligent than hubs in most cases. Switches contain many
ports to connect different network segments. They are similar to hubs, but offer greater
performance. When a network contains a large number of devices, switches are needed instead
of hubs to make sure the communications between devices do not slow down. Contrary to hubs,
switches send the data it receives only to specific ports.
Bridge: Bridges are networking devices that divide up the network into different segments to
manage the amount of traffic. This prevents unnecessary traffic from entering other parts of
the network and reduces congestion. As a network becomes more complex, bridges make sure
your network speed doesn't drop dramatically.
Gateway: A computer that sits between different networks or applications. The gateway
converts information, data or other communications from one protocol or format to another. A
router may perform some of the functions of a gateway. An Internet gateway can transfer
communications between an enterprise network and the Internet. Because enterprises often use
protocols on their local-area networks (LANs) that differ from those of the Internet, a gateway
will often act as a protocol converter so that users can send and receive communications over
the Internet.
Network Operating Systems (NOS): A network operating system (NOS) is systems software
that controls the computer systems and devices on a network and allows them to communicate
with each other. The NOS performs similar functions for the network as operating system
software does for a computer, such as memory and task management and coordination of
hardware. When network equipment (such as printers, plotters, and disk drives) is required, the
NOS makes sure that these resources are used correctly. Novell NetWare, Windows 2000,
Windows 2003, and Windows 2008 are common network operating systems.
A client is any computer (often a user’s personal computer) that sends messages requesting
services from the servers on the network. A client can converse with many servers
concurrently. For example, a user at a personal computer initiates a request to extract data that
resides in a database somewhere on the network. A data request server intercepts the request
and determines on which database server the data resides. The server then formats the user’s
request into a message that the database server will understand. When it receives the message,
the database server extracts and formats the requested data and sends the results to the client.
The database server sends only the data that satisfies a specific query - not the entire file.
Personal Area Network or PAN: A personal area network (PAN) is a wireless network that
connects information technology devices close to one person. With a PAN, you can connect a
laptop, digital camera, and portable printer without cables. You can download digital image
data from the camera to the laptop and then print it on a high-quality printer—all wirelessly.
Additionally, a PAN enables data captured by sensors placed on your body to be transmitted
to your smartphone as input to applications that can serve as calorie trackers, heart monitors,
glucose monitors, and pedometers.
Local Area Network or LAN: If you work in a business that uses networking, you are
probably connecting to other employees and groups via a local area network. A local area
network (LAN) is designed to connect personal computers and other digital devices within a
half-mile or 500-meter radius. LANs typically connect a few computers in a small office, all
the computers in one building, or all the computers in several buildings in close proximity.
LANs also are used to link to long-distance wide area networks (WANs, described later in this
section) and other networks around the world, using the Internet.
Wide Area Network or WAN: Wide area networks (WANs) span broad geographical
distances—entire regions, states, continents, or the entire globe. The most universal and
powerful WAN is the Internet. Computers connect to a WAN through public networks, such
as the telephone system or private cable systems, or through leased lines or satellites.
Internet Protocol (IP) Address: Addresses on the Internet. Each computer on the Internet has
an assigned address, called the Internet Protocol (IP) address, that distinguishes it from all other
computers. The IP address consists of sets of numbers, in four parts, separated by dots. For
example, the IP address of one computer might be 135.62.128.91. You can access a Web site
by typing this number in the address bar of your browser. IP addresses must be unique so that
computers on the Internet know where to find one another.
Web Browser: A web browser is a piece of software that allows you to surf the internet (World
Wide Web). It acts as a conduit between the server and the client, allowing requests for web
pages and services to be sent to the server.
Web Server: A web server is used for locating and managing stored web pages. It locates the
web pages a user requests on the computer where they are stored and delivers the web pages
to the user’s computer. Server applications usually run on dedicated computers. The most
common web server in use today is Apache HTTP Server, followed by Microsoft Internet
Information Services (IIS). Apache is an open source product that is free of charge and can be
downloaded from the web.
Web Page: A web page (or webpage) is a hypertext document provided by a website and
displayed to a user in a web browser. A website typically consists of many web
pages linked together in a coherent fashion. The name "web page" is a metaphor of paper
pages bound together into a book. A URL address may be entered into a browser's address bar
to view a web page. URL stands for Uniform Resource Locator. A URL is nothing more than
the address of a given unique resource on the Web. Text, pictures, and linkages to other
websites and files may all be found on a web page.
Web Development: The term "web development" refers to the process of constructing,
producing, and managing websites. It comprises features such as website design, online
publishing, web development, and database administration. Web development has two
different phases and they are frontend development and backend development.
Frontend refers to the component of a website with which a visitor may directly interact. Also
known as "the client side," it's where users interact with the program. Some languages are
required for front-end development such as CSS, HTML, JavaScript, AJAX, and so forth. The
server side of a website is known as the backend. It is a section of the website that visitors are
unable to view or interact with. It's the part of the program that doesn't interact with users
directly. It is used to organize and store data. PHP, Node.js, Python, Ruby, C#, C++ Java,
JavaScript, and so forth are some programming languages that are required for backend
development.
Now that you have a working knowledge of what networks are and how you can access them,
The Internet enables users to access or discover information located in databases all over the
world. By browsing and searching data sources on the Web, users can apply the Internet’s
discovery capability to areas ranging from education to government services to entertainment
to commerce. Although having access to all this information is a great benefit, it is critically
important to realize that there is no quality assurance for information on the Web. The Web is
truly democratic in that anyone can post information to it. Therefore, the fundamental rule
about information on the Web is “User beware!”
Sample Questions:
1. What is computer network? Briefly discuss different types of communication media used
in a bank network.
2. Make a list of networking devices used for designing whole network system of a bank.
3. Distinguish among Internet, Intranet and Extranet.
4. Briefly discuss about various components of a telecommunication systems.
5. Write short note on: WWW, Web Development, Client server system.
Cash Deposit Machine: The Cash Deposit Machine (CDM) is an ATM like machine that
allows you to deposit cash directly into your account. You can use this machine to instantly
credit your account without visiting the branch. The transaction receipt also gives you your
updated account balance. Instant money credit anytime of the day throughout the week is one
of the most remarkable features of Cash Deposit Machine.
Internet Banking: Nowadays, Alternative Delivery Channels (ADCs) are gaining popularity
in the banking domain. However, beyond all technologies, Internet Banking is the most
powerful real time online banking with least cost. An Internet Banking account is simple to
open and easy to operate. It's convenient, because customers can easily pay any kind of bills
without standing in a long queue and transfer funds between accounts from nearly anywhere
in the world. Also, customers do not have to keep receipts of all of their bills, as they can now
easily view transactions. It is available all the time. Account holders can perform account
related tasks from anywhere and at any time, even at night or on holidays when the bank is
closed. The only thing needs to have is an active Internet connection. It is fast and efficient.
Funds get transferred from one account to the other very fast. Users can keep an eye on their
transactions and account balance all the time. Customers no longer need to get passbooks
updated to know their total account balance. Internet Banking helps in maintaining genuine
records and aids security to the customers. Customers can get to know about any fraudulent
activity or threat to their account before it can pose any severe damage. It's a great medium for
the banks to endorse their products and services. More online services include loans and
investment options.
While Internet Banking has many positives, there are also a few cons. Understanding the usage
of Internet Banking might be difficult at the first. So, a person who is new to technology might
face some difficulties. Users cannot have access if they don’t have an Internet connection; thus,
without the availability of Internet access, it may not be useful. Security of transactions is a big
issue. Account information might get hacked by unauthorized people over the Internet. If the
There are three types of Internet Banking: informational, communicative and transactional.
Informational Internet Banking is a fundamental level of banking. It does not allow patrons to
view or maintain accounts, nor does it allow for communication between the financial
institution and customers. It simply means the bank offers basic information about its products
and services, much like a booklet. This is meant for marketing purposes only, and there is no
connection to the bank's main computer systems. Communicative Internet Banking permits for
some communication between the client and bank. However, this is typically restricted to
fundamental interactions such as account inquiries, new account updates, loan or mortgage
applications, contact information updates and balances. It may connect with the bank's main
computer systems. Transactional Internet Banking is the most popular online banking type. It
offers all of the benefits of a traditional brick-and-mortar organization. This includes full
control over customers’ accounts—deposits, withdrawals, transfers, updates and online
payments.
Agent Banking: Agent Banking is an alternate delivery channel of banking services through
engaged agents under a valid agency agreement, rather than a teller/ cashier. It is the owner of
an outlet who conducts banking transactions on behalf of a bank. Globally these retailers are
being increasingly utilized as important distribution channels for financial inclusion.
Bangladesh Bank has introduced agent banking in the country in 2013. The main purpose is to
provide a safe, limited scale banking and financial services to the under-privileged, under-
Intermediate Level IT Manual for NCC Bank Limited Page | 53
served population who generally live in geographically remote location that are beyond the
reach of the traditional banking networks as well as existing bank customer. Banks can deliver
a variety of banking services including savings, loans, remittances, and various payment
services (such as utility bills, taxes, government transfer benefits) to the customers through an
agent. This model is thus, gaining popularity as a cost-effective delivery channel as well as a
convenient way of providing banking services going proximate to the mass people who would
otherwise have remained unbanked due to distant location.
Banking App/E-Wallet: A banking app is a mobile app where you can access the details of
your bank account and complete transactions directly from your phone, tablet, or mobile
device. Based on the bank you're accessing, you'll be able to complete a variety of actions via
your banking app. In today’s age of smart phones, young generation is preferring e-wallet
instead of their ATM and Debit card. E-wallet has become a great option for cashless payment.
E-wallet is also known as Digital wallet and it is electronic software or online service that
allows you to transfer fund electronically to other. It also facilitates storage of entire
information of your bank account and reduces the need to enter account detail at the time of
online payment. For this, the customer has to install the e-wallet application and link it with
his own bank account, after which the customer can make any type of payment through that
wallet.
Call Center: Open lines of communication is basic requirement for institutions that handle
someone’s money. Customers need the feeling of control and financial security. So, operators
of a bank should give the customer care. Call centers serve various purposes for a bank: provide
information, conduct transactions, or submit enquiries 365 days a year, 24 hours a day, 7 days
a week. The other major reason is operating costs reduction. Bank call center should call
potential customers, conduct surveys, review products, and launch advertising campaigns. The
call center managers initiate these services, their job is to decide the way agents call to
customers. These calls are used to promote a new product or service. One more outbound calls
purpose is the customer's education. The agents need to tell the customers the importance of
accounts security, and what to do in case of fraudulent activities etc. It is not the secret that
modern banks use not only human interface, but also Interactive Voice Response (IVR). Calls
can be taken by the IVR in several languages. It provides certain banking services without
requiring them to speak to an agent. IVR helps financial sphere to automate the handling up to
85% of all inquiries.
Chatbot: At the most basic level, a chatbot is an AI (Artificial Intelligence) based computer
program that simulates and processes human conversation (either written or spoken), allowing
humans to interact with digital devices as if they were communicating with a real person. They
are also known as digital assistants that understand human capabilities. Bots interpret the user
intent, process their requests, and give prompt relevant answers. Bots can communicate
through voice as well as text and can be deployed across websites, applications, and messaging
channels such as Facebook Messenger, Twitter, or Whatsapp. Chatbots work by analyzing and
identifying the intent of the user’s request to extract relevant entities, which is the most
important task of a chatbot. Once the analysis is done appropriate response is delivered to the
user.
Data center design includes routers, switches, firewalls, storage systems, servers, and
application delivery controllers. Because these components store and manage business-critical
data and applications, data center security is critical in data center design. A data center has to
offer a secure environment that minimizes the chances of a security breach. A data center must,
therefore, keep high standards for assuring the integrity and functionality of its hosted computer
environment. Since IT operations are crucial for business continuity, it generally
includes redundant or backup components and infrastructure for power supply, data
communication connections, environmental controls (e.g., air conditioning, fire suppression),
and various security devices.
4.2.2 Classification of DC
Data center tiers are a standardized ranking system that indicates the reliability of data center
infrastructure. This classification ranks facilities from 1 to 4, with 1 being the worst and 4 the
best-performing level.
A data center receives this international ranking from the Uptime Institute, an independent
organization that determines the facility level primarily based on:
• Uptime guarantees.
• Fault tolerance (the ability to handle both planned and unplanned disruptions).
• Service cost.
Tier 1 Data Center: A Tier 1 data center is a type of data center that has only one source of
servers, network links and other components. It is one of the simplest forms of data center tiers
and lacks any redundant or backup supply of data center infrastructure components and
operational services. A Tier 1 data center is also known as a Level 1 data center. A Tier 1 data
center is the basic-intermediate level of data center tiers. Introduced by the Uptime Institute, it
is used to provide neutral classification of data centers, in terms of availability. A Tier 1 data
center only has essential components or data center infrastructure and is not suited for
enterprise or mission critical data center services, as it lacks any redundant source of servers,
Tier 2 Data Center: A Tier 2 data center is a location that has multiple sources of servers,
network links and other data center components. It is a center that has redundant components
but only one path/source or partial redundancy in data center power and cooling resources. A
Tier 2 data center is also known as a Level 2 data center. A Tier 2 data center has the same or
enhanced components and features of a Tier 1 data center, but with redundant capacity or
infrastructure components. It is the second tier of data centers introduced by the Uptime
Institute. In a Tier 2 data center, a power component or equipment can be replaced or removed
without interrupting power supply to the core computing components. It guarantees 99.741%
availability with approximately 22 hours of downtime per year. It is generally used by medium-
sized businesses.
Tier 3 Data Center: A Tier 3 data center is a location with redundant and dual-powered
servers, storage, network links and other IT components. It is one of the most commonly used
data center tiers, where IT components are powered with multiple, active and independent
sources of power and cooling resources. A Tier 3 data center is also known as a Level 3 data
center. A Tier 3 data center combines and exceeds features and capabilities of Tier 1 and Tier
2 data centers but with redundant capacity and data center infrastructure components. It is the
third level/tier of data centers introduced by the Uptime Institute. Like a Tier 2 data center, IT
components can be replaced or removed without interrupting routine data center operations.
With the redundant and always active power supply, there is minimal planned and unplanned
downtime. It guarantees 99.982 percent availability with a fractionally of less than two hours
of downtime per year.
Tier 4 Data Center: A Tier 4 data center is an enterprise class data center tier with redundant
and dual-powered instances of servers, storage, network links and power cooling equipment. It
is the most advanced type of data center tier, where redundancy is applied across the entire data
center computing and non-computing infrastructure. A Tier 4 data center is also known as a
Level 4 data center. A Tier 4 data center combines and exceeds features and capabilities of all
preceding data center layers. It provides end-to-end fault resistance by deploying and
maintaining entire data center infrastructure duplicates. It is the last level/tier of data centers
introduced by the Uptime Institute. Being an enterprise class data center, Tier 4 data center
guarantees 99.995 percent availability with just 26.3 minutes of downtime per year.
Intermediate Level IT Manual for NCC Bank Limited Page | 58
4.3 Alternative Data Center (ADC) and Disaster Recovery (DR) Site
Data centers are critical to the organization. Because mission-critical systems are used to run
the business, assist in the decision-making process, and form the basis of growth and revenue
generation, a failure in the data center could be disastrous. Therefore, most organizations have
two data centers — a primary data center (PDC) and a secondary data center (SDC), which in
some cases is also referred to as the alternative data center (ADC) or the alternative site or
disaster recovery (DR) site.
One of the key elements in any Disaster Recovery plan is the selection of a secondary site for
data storage to help prevent data loss in the event of cyber-attacks or a natural disaster. There
are three major types of disaster recovery sites that can be used: cold sites, warm sites, and hot
sites. A disaster recovery (DR) site is a facility an organization can use to recover and restore
its technology infrastructure and operations when its primary data center becomes unavailable.
The decision about what kind of DR site an organization needs and its location requires careful
planning and a balance of costs against any risks. Banks with large information requirements
and aggressive recovery time objectives are more likely to use a DR site. The DR site is
typically a second data center and allows a company to recover and resume operations
following a disaster at the primary center. The DR site options are hot, warm and cold sites:
Hot Computing Sites: At a hot site, an organization has access to a fully functional data center
with hardware and software, personnel and customer data. It is typically staffed around the
clock and is ready for organizations to operate their IT in the event of a disaster. This is the
ideal disaster recovery site but can be challenging to attain.
Cold Computing Sites: A cold disaster recovery site is the most simplistic type of disaster
recovery site. A cold site is only an option for business systems that can be down for an
extended period. An organization can use a cold site to supplement hot and warm sites in the
event of a disaster that lasts a long time. A cold site consists of elements to provide power and
networking capability as well as cooling. It does not include other hardware elements such as
servers and storage until an organization activates DR plans and installs equipment. The use of
a cold site is very limiting to a business since before it can be used, backup data along with
some additional hardware must be sent to the site and installed. This will impede workflow.
Banking technology deployment is not restricted to only core banking solution. It also covers
other applications like Enterprise wide General Ledger, Risk Management, Anti-Money
Laundering, Cheque Truncation, Credit Cards, Mutual Funds, On-line Trading, Data
Warehousing, Customer Relationship Management, SWIFT, RTGS, EFT, NPSB, Internet
Payment gateway, Global Treasury, Human Resources Management System, Employee Pay
Roll, Cash Management, Mobile Banking, SMS delivery, Retail Depository, Phone Banking,
More and more financial institutions are turning to IT outsourcing because they do not have
the expertise nor the economies of scale that a modern outsourcer can offer. Maintaining a
state-of-the-art IT ecosystem is a daunting task. It requires multiple layers of tools and expertise
that many banks simply cannot recruit and afford. Managed IT services provide the flexibility
and scalability that financial institutions need to grow and evolve, and ensures a bank’s assets,
systems and applications stay current and continuous.
Sample Questions:
1. What are Alternative Delivery Channels (ADC)? What are the advantages and
disadvantages of ADCs compared to branch?
2. What are the roles of Data Center (DC), Alternative Data Center (ADC) and Disaster
Recovery Site (DRS) in banks? Which type of DC is the best and why?
3. Classify different types of Disaster Recovery Sites (DRSs) with example.
4. What is a CBS? Why do we need it in banking business?
5. What are the major roles of ICT department in a bank?
6. What is outsourcing? Why do we need to outsource some IT jobs in banks?
The following section covers the conceptual issues related to data, information, database,
DBMS, Data Warehouse, Data Mining and Data Analytics. This section also focuses on various
issues related to access control and authentication mechanisms.
Data: Data are the raw facts. Data can be number, text, image, audio, and video. However,
data are meaningless until we process them. Banks generate huge volume of data from various
transaction points. So, banks must be careful while dealing with data. It is said that those who
rule data will rule the entire world. Hence, we realize the significance of data in an organization.
Information: Information is data that have been processed, organized, and structured. It puts
data in context and helps people make decisions. We use data as input and we get information
as output.
To access information from a database, you need a database management system (DBMS). This
is a collection of programs that enables you to enter, organize, and select data in a database.
There are many different types of DBMSs, ranging from small systems that run on personal
computers to huge systems that run on mainframes. Some examples of popular database
software or DBMSs include MySQL, Microsoft Access, Microsoft SQL Server, Oracle, DB2,
PostgreSQL, etc. In generally a bank uses database for improving business processes, keeping
track of their customers, storing user’s data and maintaining and accessing data.
Centralized Database: Centralized database system is the database where the data is stored
centrally. Due to its centralized location the client users are able to access the stored data from
different locations through several applications. The authentication process is maintained in
the application to let users securely access their data.
Figure: Architecture of Centralized Database System
The fundamental function of database administration is to guarantee that the database is always
accessible when it is required. This will usually need proactive monitoring and troubleshooting
regularly. This, in turn, necessitates considerable technical expertise on the DBA's part. The
DBA or database administrator will require expertise and maybe training in the platform
(database engine and operating system) on which the database operates, in addition to an in-
depth understanding of the database in the issue.
Restricting Access
Steps to restrict database access within an organization:
• Implement Separation of Duties (SOD) a preventive control.
• Establish test and production environments which are preventive control.
• Restrict user account and Database administrator access which is a preventive control.
• Turn on audit trails, monitoring software, or exception reports which are detective
controls.
Password Policy
Passwords are an important aspect of computer security. They are the front line of protection
for user accounts. A poorly chosen password may result in a compromise of bank’s entire
systems. So, banks need to deploy a password policy for protecting the system from unexpected
incidents. A password policy is a set of rules designed to enhance computer security by
encouraging users to employ strong passwords and use them properly. A password policy is
often part of an organization's official regulations and may be taught as part of security
awareness training.
Types of Authentication:
Single-factor authentication:
As the weakest level of authentication, only a single component from one of the three categories
of factors is used to authenticate an individual’s identity. The use of only one factor does not
offer much protection from misuse or malicious intrusion. This type of authentication is not
recommended for financial or personally relevant transactions.
Multi-factor Authentication:
Instead of using two factors as used in 2FA, multiple authentication factors (more than 2
factors) are used to enhance security. This enhances the security of a transaction in comparison
to the 2FA authentication process. MFA works by requiring additional verification information
(factors). One of the most common MFA factors that users encounter is one-time passwords
(OTP). OTPs are those 4-8-digit codes that you often receive via email, SMS or some sort of
mobile app. With OTPs a new code is generated periodically or each time an authentication
request is submitted.
The popular data backup technique in the early days of personal computers (PC) was to transfer
data from a computer's hard drive onto a collection of tiny floppy disks, which were then kept
in physical containers. Since then, solid-state technology, wireless systems, and other
advancements have allowed IT administrators to back up data remotely or download large
volumes of data onto tiny portable devices. Cloud services and associated alternatives make
distant data storage simple, ensuring data security even if a whole facility or location is hacked,
while RAID (redundant array of independent disks), or mirror, technologies provide automatic
backup solutions.
Full Backup: A full backup is the most complete type of backup where you clone all the
selected data. This includes files, folders, hard drives and more. The highlight of a full backup
is the minimal time it requires to restore data. However, since as everything is backed up in
one go, it takes longer to backup compared to other types of backup.
Differential Backup: A differential backup straddles the line between a full and an
incremental backup. This type of backup involves backing up data that was created or changed
since the last full backup. To put it simply, a full backup is done initially, and then subsequent
backups are run to include all the changes made to the files and folders. It lets you restore data
faster than full backup since it requires only two backup components: an initial full backup and
the latest differential backup. Let’s see how a differential backup works:
Incremental Backup
The first backup in an incremental backup is a full backup. The succeeding backups will only
store changes that were made to the previous backup. Businesses have more flexibility in
spinning these types of backups as often as they want, with only the most recent changes stored.
Incremental backup requires space to store only the changes (increments), which allows for
lightning-fast backups.
Sample Questions:
1. Distinguish between centralized and decentralized database.
2. Discuss the importance of data backup in a bank. Compare different types of backup
with example.
3. Discuss different types of authentication methods with example.
4. Write down the roles and responsibilities of a database administrator in a bank.
5. “Data management is a big challenge for banks” Why?
Plastic Cards: Banking cards like Debit and Credit cards are one of the most used cashless
payment methods across the world. Banking cards come with various benefits like secure
payments, convenience, and many more. One of the biggest advantages of banking cards is that
it can also be used for making other types of digital payments. For example, a user can store
his card information in the mobile wallets or digital payment apps to make cashless payment.
Moreover, banking cards can be also used in online purchases, POS machines, online
transactions, etc. There are many reputed names like MasterCard and Visa when it comes to
banking cards.
USSD: Unstructured Supplementary Service Data (USSD) is a cashless payment option for
those who don’t have a smartphone. The advantage of this method is that the user can make
payments without a smartphone device or internet facility. In this method, the user must dial a
code like *99# to interact with an interactive voice menu via a mobile screen. However, to use
this service, the customer must ensure that his mobile number is the same as that of the one
linked with the bank account.
E-wallets: E-wallets are a popular mode of online payment, (PayTM and MobiKwik being the
most widely used providers in India). The user should register their mobile number with the
app and link their credit or debit card(s) to make payments. Users should also provide their
KYC details to make payments through the digital wallets. KYC is a verification process which
requires firms to collect information from their customers including their identification details
and biometrics. E-wallets can be used in places that debit/credit cards can’t, as not a lot of small
businesses invest in card machines.
QR Codes: QR stands for Quick Response. It’s a two-dimensional code that has a pattern of
black squares which are arranged on a square grid. QR codes are read by imaging devices such
as smartphone cameras. QR codes are widely used for making cashless payments in which a
user just has to scan the QR code of the merchant service to complete the transaction. QR code
payment is a contactless payment method where payment is performed by scanning a QR
code from a mobile app. This is an alternative to doing electronic funds transfer at point of
sale using a payment terminal. This avoids a lot of the infrastructure traditionally associated
with electronic payments such as payment cards, payment networks, payment terminal
and merchant accounts. To make a QR code payment, the consumer scans the QR code
displayed by the merchant with their smartphone to pay for their goods. They enter the amount
they have to pay and finally submit. This is a more secure card-not-present method than others.
POS Terminals: Traditionally, POS terminals are nothing but a handheld device present at the
stores. These devices are used to read banking cards of the customers. However, the scope of
POS is expanding as these services are now available on various mobile platforms via the
internet. Nowadays, POS can be bifurcated into different types like Physical POS, virtual POS,
Mobile POS, etc. Mobile POS is beneficial for small businesses as they don’t need to invest in
expensive electronic registers, since the Mobile POS operates through the smartphones and
tablets. Similarly, virtual POS systems use web-based applications for its operation.
Security: Digital payment modes are made secure with varying levels of encryption and data
authentication. Most payment modes have enabled two-factor authentication (2FA) to add an
extra layer of security. Also, it’s always easier and safer to carry a smartphone rather
than carrying wads of cash.
Reduced Costs and Business Risks: Cashless payments eliminate several business risks at a
time such as theft of cash by employees, counterfeit money, and robbery of cash. Moreover, it
also reduces costs of security, withdrawing cash from bank, transporting, and counting.
Seamless International Payments: Whenever someone visits a foreign country, they need to
buy the foreign currency. However, with cashless payment solutions, they don’t need to do it
any longer as they can make transactions directly from their cashless payment apps in
accordance with the currency exchange rate.
An Efficient Tool to Fight Corruption: Cashless payments can become one of the greatest
means to fight corruption and organized crime throughout the world. If all the people were
connected via end-to-end payment infrastructure that makes a cashless environment, then there
would be complete transparency in the flow of money. No matter, if it’s a private investment
or international aid, everyone digitally connected in the cashless environment would be able to
view where exactly the money went and how it was spent. Any amount of money that is found
outside the framework can be easily detected and investigated. Any sum appearing outside of
that framework could immediately be flagged and investigated. This would narrow the focus
for law enforcement and forensic accountants, making it easier to target and recoup hidden
money.
Plastic card – is a personalized payment tool that provides the ability to use your card the face
of non-cash payment for goods and services, as well as withdraw cash at bank branches and
ATMs. First credit card was found in the early 50-ies of the last century. Subsequently, cards
began to improve in the 70’s first appeared a magnetic strip, which contained information on
the cardholder and the state of his account, and in the 90 years they have become chips.
But the main problem is that if someone can steal the card information during a magnetic stripe
transaction, then they can also use your credit card information for future transactions which is
not safe at all. This is a big problem with the magnetic stripe transaction. But thankfully, the
chip card has solved this issue.
Chip Card
The Chip Card looks and functions just like the magnetic stripe cards but it is more protective
and intricate than magnetic cards and also it excludes the way we interact with the transaction
terminal. Sometimes, they are also known as EMV chip cards, with EMV denoting the
developers of the chip i.e. Europay, Visa and Mastercard. Europay, MasterCard, and Visa were
the founding members of this standard, creating the name EMV in 1993.
Figure: Chip Plastic Card
Objectives of BACPS
• To facilitate the clearing and settlement of paper-based payment instruments
among Scheduled Banks operating in Bangladesh;
• To reduce time and cost of domestic clearing and settlement cycle and to protect
the customer interest;
• Minimize paper handling and manual intervention at the cheque clearing process;
• Ensure timely, accurate and efficient transfer of funds among participants (i.e.
Bank customers) using paper-based instruments and
• Maintain proper risk mitigation measures and dictate storage and retrieval of
image and information of all transactions for future reference.
The Central Bank is ensuring continuous effort to tighten the security of NPSB adapting
International Standards and Best Practices of card-based payment. A safe, secure and efficient
retail payment system always involves active participation from all stakeholders (Banks,
customers, government). Therefore, the Central Bank is in the pledge to step forward with
altogether.
Availability: The capacity of a system to make software systems and data completely
accessible when a user requires it is known as availability. The goal of availability is to make
technological infrastructure, applications, and data accessible when they're required for a
business process or by a company's customers.
All the functions included in information security becomes valueless if the data is not available
when required. So, it is important to ensure this principle. Banks and Financial Institutions can
use Off Site Backups, Disaster Recovery and Business Continuing Plan, and so forth to
maintain availability of data.
Though these three are the most important principles, there are two other principles that should
grab attention of the information security enthusiasts. They are:
Non-Repudiation: This ensures that users cannot deny doing a certain activity and allows you
to hold individuals responsible for their actions. It is critical that individuals may be held
responsible for their acts and that individuals be aware that they will be held accountable in
order to prevent harmful behavior. Additionally, if an employee violates corporate policy or
the law, they may be disciplined and remedial action performed. Bank can ensure this principle
using such tools like Account Logging and Monitoring, Digital Signature (discussed later in
this chapter), and so forth.
Internal threats: These originate from someone who has authorized access to the network,
either with a valid log-on account to a server or direct access to the wire. They are typically
contractors or disgruntled former (or current) employees. A review of reported security
breaches shows that between 60% and 80% of all security breaches fall within this category.
External threats: Individuals working outside the company network and who do not have
authorized access to systems or networks pose these threats. They work their way onto the
network mainly via the Internet and dial-up access servers. Because they are the most widely
reported threats, companies tend to put most money and time into defending against them.
Structured threats: Structured threats come from hackers who are highly motivated,
technically competent and who have time on their side. They know their target’s vulnerabilities
and because they understand coding they can take advantage of them.
Unstructured threats: These come mostly from inexperienced individuals using off-the-peg
hacking scripts and tools that are widely available from the Internet. Nonetheless they must not
be underestimated. Even simple scripts that perform denial of service (DoS) attacks can disable
an entire network.
Disgruntled staff: Angry employees who may have been reprimanded, fired or laid-off might
vent their anger by infecting the corporate network with viruses or by intentionally deleting
important files. This group is especially dangerous because it is usually far more
knowledgeable about the network, the value of information within it, where high priority
information is stored and the safeguards in place to protect it.
Hackers: Typically, computer enthusiasts who take pleasure in gaining access to other
people’s/organization’s computers or networks. Many hackers are content with leaving behind
‘footprints’, such as joke applications or messages. Others, often referred to as ‘crackers’, are
more malicious, crashing entire computer systems, stealing or damaging confidential data,
defacing web pages and ultimately disrupting business. Some amateur hackers use the ready-
made hacking tools available on-line, doing so without much understanding of how they work
or what they do. "Ethical hacking" refers to people who try to break into systems with the sole
purpose of finding and reporting security flaws to the System owner/administrator.
7.5 Cryptography
The study of secure communications techniques that allow only the sender and intended
recipient of a message to read its contents is known as cryptography. This term comes from the
Greek word "kryptos," which means "hidden." It's closely linked to encryption, which is the
process of scrambling plain text into ciphertext and then back again when it's received.
Encrypting and decrypting email and other plain-text messages is the most prevalent usage of
cryptography when transporting electronic data. The symmetric or "secret key" approach is the
most basic method. Data is encrypted with a secret key, and the encoded message and secret
key are then delivered to the recipient for decoding. There arrives a problem. That is, a third
party has all they need to decrypt and read the message if it is intercepted.
Symmetric Cryptography: The use of a single shared secret key to communicate encrypted
data between parties is known as
symmetric cryptography,
sometimes known as secret key
cryptography. Symmetric ciphers
are named as such because they
employ the same key to encrypt
and decode data. To put it another
way, the sender encrypts data
using a password, which the
receiver must know in order to
access the data.
Digital Signature
A digital signature is a mathematical method that is used to verify the validity and integrity of
a communication, piece of software, or other digital document. It's the electronic equivalent of
a handwritten signature or stamped seal, but with far more inherent security. A digital signature
is meant to address the issue of tampering with and impersonating electronic communications.
Figure: Digital Signature
Digital signatures may serve as proof of an electronic document's origin, identity, and status.
Additionally, signers may utilize them to signify informed consent. Digital signatures are
regarded legally binding in many nations, including the United States, in the same way that
conventional handwritten document signatures are.
Certificate Authority
A certificate authority or certification authority (CA) is a kind of organization in cryptography
that provides digital certificates. A digital certificate verifies that the identified subject of the
certificate has a public key. This enables others (relying parties) to place their trust in signatures
Certificate authority are often used to sign certificates used in HTTPS, the World Wide Web's
secure surfing protocol. Another typical use is for national governments to provide
identification cards for the purpose of electronically signing papers.
Firewall: A firewall is a system that prevents a specific type of information from moving
between untrusted networks, such as the Internet, and private networks, such as your
company’s network. Put simply, firewalls prevent unauthorized Internet users from accessing
private networks. All messages entering or leaving your company’s network pass through a
firewall. The firewall examines each message and blocks those that do not meet specified
security rules.
Firewalls range from simple, for home use, to very complex for organizational use. Figure (a)
illustrates a basic firewall for a home computer. In this case, the firewall is implemented as
software on the home computer. Figure (b) shows an organization that has implemented an
external firewall, which faces the Internet, and an internal firewall, which faces the company
network. Corporate firewalls typically consist of software running on a computer dedicated to
the task. A demilitarized zone (DMZ) is located between the two firewalls. Messages from the
Internet must first pass through the external firewall. If they conform to the defined security
rules, they are then sent to company servers located in the DMZ. These servers typically handle
Web page requests and e-mail. Any messages designated for the company’s internal network
(e.g., its intranet) must pass through the internal firewall, again with its own defined security
rules, to gain access to the company’s private network.
The danger from viruses and worms is so severe that many organizations are placing firewalls
at strategic points inside their private networks. In this way, if a virus or worm does get through
both the external and internal firewalls, then the internal damage may be contained.
Virtual Private Network (VPN): VPN or Virtual Private Network refers to the capability of
establishing a secure network connection while using public networks. Virtual private networks
(VPNs) encrypt your internet traffic and mask your online identity. This makes it more difficult
for other parties to monitor your internet activity and steal information. Encryption occurs in
To provide secure transmissions, VPNs use a process called tunneling. Tunneling encrypts each
data packet to be sent and places each encrypted packet inside another packet. In this manner,
the packet can travel across the Internet with confidentiality, authentication, and integrity.
Figure xx illustrates a VPN and tunneling.
IPS and IDS: Intrusion detection systems (IDS) and intrusion prevention systems (IPS)
monitor your network continuously, recognizing potential issues and recording information
about them, resolving the events, and notifying security administrators. Additionally, some
networks use IDS/IPS to discover security policy violations and dissuade persons from
breaching security standards. IDS/IPS have become a vital component of most businesses'
security infrastructures precisely because they may thwart intruders while they collect
information about your network.
7.8 Malware
Malware, short for "malicious software," is a sort of computer program that is meant to infect
and damage a legitimate user's computer in a variety of ways. It's critical that all users
understand how to spot malware in all of its forms and how to protect themselves from it.
Malware is quickly becoming one of the most dangerous threats online, having been employed
in some of the world's worst cyber-attacks, such as the WannaCry incident in 2017, which
impacted over 200,000 people in 150 countries. When a person clicks on a link, downloads a
malicious attachment, or launches a rogue software application, malware is usually placed on
their machine. Attackers may use the virus to spy on your online activity, steal personal and
Updating Software Regularly: In addition to installing anti-virus software, it's critical to keep
software up to date to prevent attackers from exploiting weaknesses in older and obsolete
systems to obtain access to important information of banks.
Using Apps from Trusted Sources: Purchasing software from reputable sources minimizes
the risk of malware infection on your device. Big companies will take great effort to avoid
tarnishing their name by disseminating malware. You may verify a source's validity by looking
at the entire name, list of published applications, and contact information in the app description
on Google Play Store, Apple’s App Store, Microsoft Store, and so forth.
Installing Firewall: Using a firewall to safeguard devices from viruses is another option. A
firewall protects a private computer network from harmful assaults by prohibiting any
unauthorized access to or from it. A firewall, in addition to anti-virus software, acts as an
additional line of defense against malware, lowering the risk of an attack.
Refraining from Clicking on Suspicious Links: Phishing is still the most common method
for hackers to infect your device with malware. Phishing schemes entice victims to open emails
or click on links that look to originate from a credible company or respectable source. The link
may send you to a bogus website that asks for your personal information or to a website that
directly infects your machine with malware. If you're unsure about anything, don't click the
link.
Social engineering is an attack in which the perpetrator uses social skills to trick or manipulate
legitimate employees into providing confidential company information such as passwords. The
most common example of social engineering occurs when the attacker impersonates someone
else on the telephone, such as a company manager or an information systems employee. The
attacker claims he forgot his password and asks the legitimate employee to give him a password
to use. Other common ploys include posing as an exterminator, an air-conditioning technician,
or a fire marshal. Examples of social engineering abound.
In one company, a perpetrator entered a company building wearing a company ID card that
looked legitimate. He walked around and put up signs on bulletin boards reading “The help
desk telephone number has been changed. The new number is 555-1234.” He then exited the
building and began receiving calls from legitimate employees thinking they were calling the
company help desk. Naturally, the first thing the perpetrator asked for was username and
password. He now had the information necessary to access the company’s information systems.
Two other social engineering techniques are tailgating and shoulder surfing. Tailgating is a
technique designed to allow the perpetrator to enter restricted areas that are controlled with
locks or card entry. The perpetrator follows closely behind a legitimate employee and, when
the employee gains entry, the attacker asks him or her to “hold the door.” Shoulder surfing
Do not open emails or attachments from unknown senders - You do not need to respond to
an email if you do not know the sender. Even if you know them and are wary of their message,
double-check and validate the information from other sources, such as the phone or a service
provider's website. Remember that email addresses are often fake; even an email seeming to
come from a reputable source might have been sent by an attacker.
Use multifactor authentication - User credentials are one of the most important information
for attackers. Multifactor authentication helps secure your account in the event that the system
is hacked.
Be careful of appealing offers — If an offer seems too good to be true, think twice before
taking it. You can rapidly evaluate if you're dealing with a real offer or a trap by Googling the
subject.
Prevention and Detection: Prevention is usually more effective than response when it comes
to cybersecurity. Rather of reacting to threats as they occur, a SOC monitors the network 24
hours a day, 7 days a week. As a result, the SOC team can identify malicious activity and stop
it before it does any harm. When a SOC analyst notices anything suspicious, they collect as
much information as possible in order to conduct a more thorough investigation.
Investigation: The SOC analyst examines suspicious behavior throughout the investigation
stage to establish the nature of the threat and the degree to which it has entered the
infrastructure. The security analyst examines the network and activities of the company from
the viewpoint of an attacker, searching for important signs and areas of vulnerability before
they are exploited. By knowing how assaults occur and how to successfully react before they
get out of hand, the analyst is able to identify and triage different sorts of security events. To
execute a successful triage, the SOC analyst integrates information about the organization's
network with the most recent global threat data, which includes details on attacker tools,
strategies, and trends.
Sample Questions:
1. What is cryptography? How Asymmetric Cryptography is different from Symmetric
Cryptography?
2. What is social engineering? How can you protect yourself from the social engineering
attack?
3. Briefly discuss about the physical and logical security measures in an e-bank.
4. Write short note on: Certificate Authority, SOC, VPN.
In order to have a strong handle on data security issues that may potentially impact your
business, it is imperative to understand the relationships of three components: Threat,
Vulnerability and Risk. The word “threat” is often confused with (or used interchangeably
with) the words “risk” and “vulnerability.” But it is important to differentiate among threat,
vulnerability, and risk. Though these technical terms are used interchangeably, they are distinct
terms with different meanings and implications.
Natural Threats: Natural disasters (threats) such as fire, cyclone and floods also present risks
to IT systems, data and infrastructure. Damage to buildings and computer hardware can result
in loss or corruption of customer records/transactions.
8.1.2 Vulnerability
A vulnerability refers to a known weakness of an asset (hardware, software, network, data,
etc.) that can be exploited by one or more attackers. In other words, it is a known issue that
allows an attack to succeed. For example, when a team member resigns and you forget to
disable their access to external accounts, change logins, or remove their names from company
credit cards, this leaves your business open to both intentional and unintentional threats.
However, most vulnerabilities are exploited by automated attackers and not a human typing on
8.1.3 IT Risk
If your business relies on information technology (IT) systems such as computers and networks
for key business activities you need to be aware of the range and nature of risks to those
systems. Risk is defined as the potential for loss or damage when a threat exploits a
vulnerability. Examples of risk include:
• Financial losses
• Loss of privacy
• Damage to reputation
• Legal implications
• Even loss of life
IT Risk Assessment: An effective IT risk assessment identifies serious risks, based on the
probability that the risk will occur, and the costs of business impacts and recovery. To complete
your IT risk assessment, identify risks to your business and perform a business impact analysis.
Still, certain measures help you assess threats regularly, so you can be better prepared when a
situation does happen. Here are some ways to do so:
• Ensure your team members are staying informed of current trends in cybersecurity so
they can quickly identify new threats. They should subscribe to blogs (like Wired) and
podcasts (like Techgenix Extreme IT) that cover these issues, and join professional
associations so they can benefit from breaking news feeds, conferences, and webinars.
IT Risk Mitigation
Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.
Risk mitigation takes steps to reduce the negative effects of threats and disasters. Threats that
might put a business at risk include cyberattacks, weather events and other causes of physical
or virtual damage. Risk mitigation is one element of risk management and its implementation
will differ by organization. There are several types of risk mitigation strategies. Often, these
strategies are used in combination with each other, and one may be preferable over another,
depending on the company's risk landscape. They are all part of the broader practice of risk
management.
• IT Risk Acceptance and Sharing: Risk acceptance is accepting a risk for a given
period of time to prioritize mitigation effort on other risks. This technique
involves accepting the risk and collaborating with others in order to share responsibility
for risky activities. Partnering with others to share the risk associated with a part of the
job is advantageous. If a risk event occurs, the partners absorbs all or part of the
negative impact of the event.
• IT Risk Avoidance: Risk avoidance is used when the consequences are deemed too
high to justify the cost of mitigating the problem. For example, an organization can
choose not to undertake certain business activities or practices to avoid any exposure to
the threat they might pose. Risk avoidance is a common business strategy and can range
from something as simple as limiting investments to something as severe as not building
offices in potential war zones.
• IT Risk Transfer (Insurance): Risk transfer refers to a risk management technique in
which risk is transferred to a third party. In other words, risk transfer involves one party
assuming the liabilities of another party. Purchasing insurance is a common example of
transferring risk from an individual or entity to an insurance company. It is impossible
for a business to prevent or avoid all IT risks and threats. This makes business insurance
an essential part of IT risk management and recovery planning. You should regularly
review and update your insurance, especially in light of new or emerging IT risks, such
as the increasing use of personal mobile devices for workplace activities.
Induction and IT Training for Staff: Training new and existing staff in your IT policies,
procedures and codes of conduct is an important component of IT risk management strategies.
Training can cover key business processes and policies, such as:
• safe handling of infected email
• protecting the privacy of customer details
• priority actions in the event of an online security breach.
Providing support and training for new employees is a critical aspect of staff training.
Design a Business Continuity Planning: Having identified risks and likely business impacts,
the development of a business continuity plan can help your business survive and recover from
an IT crisis. A business continuity plan identifies critical business activities, risks, response
plans and recovery procedures.
Develop IT Risk Management Policies and Guidelines: IT policies and guidelines explain
to staff, contractors and customers the importance of managing IT risks and may form part of
your risk management and business continuity plans. Security policies and guidelines can assist
your staff training on issues such as:
• safe email use
• setting out processes for common tasks
• managing changes to IT systems
• responses to IT incidents.
Develop an IT Risk Management Plan: Reduce your potential for risk by creating and
implementing a risk management plan. Here are the key aspects to consider when developing
your risk management strategy:
• Assess risk and determine needs
• Include a total stakeholder perspective
• Designate a central group of employees
• Implement appropriate policies and related controls
• Monitor and evaluate policy and control effectiveness
8.2 IT Audit
Now-a-days, computers are being widely used for performing routine jobs and as aids for
decision-making and other managerial purposes. In fact, computers have revolutionized the
technique of data processing. They have made integrated information systems possible in the
fields of banking, accounting and financial management for operation, management, planning,
controlling and decision-making.
Study of current banking industry reveals the fact that most of the banks in Bangladesh are
performing their banking business and operations using banking software through centralized
banking software. While using such banking software banks have become highly dependent on
information technology and systems. Hence security of Information System of financial
institutions/bank has therefore gained much greater importance, and it is vital to ensure such
risks are properly identified and managed. Moreover, information and information systems are
essential assets of the banks and as well as for their customers and stakeholders. Information
assets are critical to the service provided by the banks to their customers. Protection and
maintenance of these assets are critical to the organizations’ sustainability. Bank must take the
responsibility of protecting the information from unauthorized access, modification, disclosure
and destruction to protect customer’s interest. In order to ensure security and protection of such
Information Assets, Information Systems audit has become essential for our banks. For
performing IS audit, understanding of the Information Technology Infrastructure becomes
necessary for the auditors in formulating the general approach and specific techniques to audit
the banking information and information systems prepared under computerized system.
Information technology audits identify whether IT controls protect corporate assets, ensure data
integrity, and align with the business’s overall goals. IT auditors examine physical security
controls and general business and financial controls that involve information technology
systems. Operations at modern companies are increasingly computerized, IT audits are used
to certify information-related rules and processes are working correctly. Following are the
points which are necessary for an IT audit:
• Organization risks are reduced
• Fraud detection and prevention
• Improves the security of data
• Enhances IT governance
Executing an IT audit
Having defined the controls expected to be in place, the IT auditor gathers the evidence to
determine whether the stated rules are designed and operating effectively. It may require
subjective judgment on the auditor’s part and is where the IT auditor’s experience can bring
real value to the exercise. Therefore, it is crucial for a financial organization to detect the
system’s disparity. However, an internal/external audit can help banks to take steps to rapidly
recognize technology security risks so that banks can manage them as quickly, precisely, and
completely.
Importance of ITG
The importance of IT governance is that it achieves desired outcomes and behavior. The
relationship between IT governance and effective value creation of IT investments has long
been recognized and is cited as the reason for achieving excellence in the management of IT.
It provides a focus on cost and allows effective communication between the customers and
providers by establishing joint accountability for IT investments. Enforcing the governance
processes is articulated by IT portfolio management and is used by IT leaders to manage their
banks’ IT investments, projects and resources in an effort to review opportunities, reduce
redundancy across the IT environment, and drive cost savings. Governance offers a formula
for success and allows leaders within agencies to be active in the strategic management of IT.
The purpose of this Act is to guarantee the legal security of documentary communications
between persons, partnerships and the State, irrespective of the medium used; the consistency
of legal rules and their application to documentary communications using information
technology-based media, whether electronic, magnetic, optical, wireless or otherwise, or based
on technology combinations. The ICT Act promotes the Public Key Technology Trust Chain.
The law allows digital certificate infrastructure to be developed and managed by the Controller
of Certifying Authorities (CCA), including audits to be carried out.
The ICT law was formulated to promote the development of Bangladesh’s information and
communication technologies. The aim is to facilitate the use of information and communication
technologies to build the information society. Where the information contained in a document
is considered confidential by statute, confidentiality must be covered by appropriate means,
including on a communication network. Some Cyber Crimes which are to be dealt through this
act are follows:
• Hacking or unauthorized entry into information systems
• Introduction of viruses
• Publishing or distributing obscene content in electronic form
• Tampering with electronic documents required by law
• Fraud using electronic documents
• Violation of privacy rights such as STALKING
• Violation of copyright, trademark or trademark rights
The basic distinction between “data” and “information” is that data is unprocessed, i.e. raw
facts, texts, figures, symbols or characters. Data, once refined or processed, transforms into
information, and becomes useful to users. The ICT Act, 2006 of Bangladesh was intended to
provide the legal framework and recognition to digital signature, electronic records and
controller of certifying authorities. It was not intended to deal with data privacy or data
protection, nor does it intend to do so now. However, the government of Bangladesh has
enacted the Digital Security Act, 2018, and the same was published through a gazette
notification on October 8, 2018. Digital Security Act, 2018, which is commonly known as the
Cyber Security Act in other jurisdictions, aims to promote confidentiality, integrity, and
availability of public and private information systems and networks with the goal to protect
individuals’ rights and privacy, economic interests and security in the cyberspace. Therefore,
the inherent purposes of the ICT Act, 2006 and the Digital Security Act, 2018 are therefore
distinct.
With the enactment of the Digital Security Act, 2018, Bangladesh has stepped into the data or
information protection regime. Section 26 of the Digital Security Act, 2018 defines personal
data as “identity information”. Section 26 requires that an individual’s explicit consent or
authorization be obtained for collecting, selling, storing/preserving, supplying or using his or
her identity information.
Section 26 defines any external, biological or physical information or any other information
which identifies a person or system singly or jointly as “identity information”. This includes
name, picture, address, date of birth, mother’s name, father’s name, signature, national identity
card, birth and death registration number, fingerprint, passport number, bank account number,
driving license, e-TIN number, electronic or digital signature, username, credit or debit card
number, voice print, retina image, iris image, DNA profile, security question, etc. Collecting,
selling, preserving, supplying, or using such “identity information” without the individual’s
explicit consent or authorization is a crime, which is punishable for a maximum term of five
years’ imprisonment, or for a penalty of Tk 5 lakh maximum, or both.
Intermediate Level IT Manual for NCC Bank Limited Page | 115
Consent/authorization unequivocally is the decisive factor, as far as Section 26 is concerned,
and unless consent/authorization is expressly given by the information/data subject, processing
identity information is prohibited. Section 26 appears to interpret consent “strictly”, which
means without consent, or once the consent is withdrawn, information cannot be used or
processed. However, Digital Security Act, 2018 does not appear to contain further provisions
to administer regulation of consent or processing identity information by an individual. Digital
Security Act, 2018 in its preamble defines an “individual” as an organization or public or
private entity or a body created by law.
Section 26 can have an immense impact in Bangladesh’s digital economy, especially the
telecommunication, e-commerce, banking and fintech industries. Companies in these industries
handle a huge amount of customer data in electronic or digital form every day. Besides, there
are entities that collect customer information/data. This information/data is mostly customer
names, their cell phone numbers and email addresses that are regularly shared with various
entities for sending bulk SMSs, phone calls and emails for marketing purposes. Post-enactment
of the Digital Security Act, 2018, telecommunication, e-commerce, and fintech companies,
banks, third parties and other entities now must obtain authorization or consent, from the
individuals (principal) whose identity information/data they are handling, or are required to
revalidate their respective privacy terms and conditions in order to comply with Section 26.
Breach or non-compliance of Section 26 could trigger potential criminal liabilities against such
entities. Breach could result from absence of consent or for breach of any conditions of such
consent too. Any pre-executed privacy policies or privacy terms and conditions must now be
construed in accordance to Section 26(1), to ensure that an individual’s identity information is
used lawfully, and for the purpose it was collected for.
Sample Questions:
1. What are the common threats and risks of an online bank?
2. What is IT risk? How can we manage and reduce IT risks in banks?
3. What is the role of IT Audit in banks? Can it reduce IT Risk?
4. What is IT Governance (ITG)? What is the importance of ITG in banks?
5. Though we have “Information and Communication Technology Act (ICT) – 2006”,
why do we also need “Digital Security Act, 2018” to protect our banks and customers?