Security Considerations

Security Considerations (Jaiib/DBF Paper 1, Module C, Unit 5)

Dear bankers,

As we all know that  is Security Considerations for JAIIB Exam. JAIIB exam conducted twice in a year. So, here we are providing the Security Considerations (Unit-5), BANKING TECHNOLOGY (Module C), Principle & Practice of Banking JAIIB Paper-1.

♦Risk Concern Areas

  • The Customer Demands have triggered a fierce competition among banks and financial companies for the application of information technology in their operations to help them offer innovative products and services at reduced costs. This also helps those entering new geographical areas.
  • Data and software: Data is critical resource, necessary for an organisation’s continuing operations. Incorrect data can have serious implications in decision making, as well. The increasing availability and use of expert system and the potential impact erroneous data can result in playing havoc with an organisation’s business.
  • Infrastructure: Banks have to invest heavily for implementing technology- based tools and solutions. In addition to software and data, same hardware components are required for operations of the computer and communication systems.
  • Peopleware: Peopleware refers to the group of persons directly or indirectly involved in managing and running the computerized systems.

♦Different types of Threats

The threats to computerized system manifests in the form of business interruptions as under:

  • Errors and omissions in data and software
  • Unauthorised disclosure of confidential information
  • Computer abuse and mis-utilisation of banks assets
  • Computer/cyber frauds

Accidental Damages: Computers and communications systems have found their applications to be quite extensive in banking and other financial organisations. However, at the same time, these systems are vulnerable to damages caused accidentally, both due human failures and natural calamities.

  • Environmental Hazards
  • Human Error and Omissions
  • Unreliable systems

Malicious Damages: Risk of malicious damages to computerized systems can be from disgruntled employees who wish to disrupt the services or from individuals with malafide intentions, using the technology for perpetrating fraud for financial gains.

  • Interruptions in Services
  • Frauds

♦Control Mechanism

Implementation of effective control mechanism is required management of risks associated with the use of IT tools.

  • Physical Control
  • Internal Control
  1. Accounting Control
  2. Administrative Control
  • Operational Control
  1. Audit Trails (i)Accounting Audit Trail (ii) Operations Audit Trail
  2. Checksum
  3. Data Encryption

♦Computer Audit

  • Banks can achieve effective, secure and reliable computer systems only through the use of appropriate control techniques discussed above. The control techniques selected, varies from bank to bank, reflecting the particular risks within each bank and the costs of related security and control procedures.
  • A regular programme of independent tests of security and control procedures by auditors help in in identifying lapses before the banking operations land into serious risk. The generic organizational function aimed at evaluation of the asset safeguarding, data integrity, system effectiveness, and system efficiency in computerized systems is termed as “Computer Audit”.

♦Information System Audit (IS Audit)

  • An information system (IS) audit or information technology(IT) audit is an examination of the controls within an entity’s Information technology infrastructure. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement. It is the process of collecting and evaluating evidence of an organization’s information systems, practices, and operations. Obtained evidence evaluation can ensure whether the organization’s information systems safeguard assets, maintains data integrity, and are operating effectively and efficiently to achieve the organization’s goals or objectives.

Information Systems Audit Methodology

  • PHASE 1: Audit Planning
  • PHASE 2 – Risk Assessment and Business Process Analysis
  • PHASE 3 – Performance of Audit Work
  • PHASE 4: Reporting

Benefit of IS Audit

  • It would identify the risks of exposure to an existing computerized environment. On Identification of the risks, remedial measure can be taken to protect the interests of an organisation.
  • It would deter people/employees/ users from indulging in corruption/ manipulation of data, frauds etc. An undesired activity will be detected through implementation of IS audit.

♦Information System Security (IS Security)

  • Information systems security, also known as INFOSEC, is a broad subject within the field of information technology (IT) that focuses on protecting computers, networks, and their users. Almost all modern companies, as well as many families and individuals, have justified concerns about digital risks to their well-being.

Need for IS Security

  • To Comply with law of the land and regulator’s guidelines.
  • To comply with business policy.
  • To comply with business partner’s requirements.

 IS Security in Banking

  • Banks must meet their customers requirement for security aspects in special way on many levels, whether it is with their saving, taking advantage of over-the counter services at a branch office, withdrawing money from the teller machines, making deposits via the cash recycling system, online banking etc.

Threats to IS Security

  • E-mail Viruses
  • Phishing Attacks
  • Hackers Attack
  • Vishing
  • Smishing

♦Evaluation Requirements

The IT resources continuously undergo changes in the form of development of new applications, acquisition of new hardware, turnover of trained employees etc.

  • Computer Hardware
  • Computer Software
  • Data
  • Communication channels
  • Disaster Recovery Management
  • System Development Process

♦Legal Framework For Electronic Transactions

  • At present, many legal provisions recognize the paper-based records and documents that should bear signature. Since, electronic commerce eliminates the need for paper-based transactions. Therefore to facilitate e-commerce, there was a need for enactment/amendment of necessary Law.
  • Indian Parliament enacted a comprehensive information Technology Bill, which received the Present’s assent on 9 June 2000.

Consequent upon the recognition given to the electronic records, electronic documents and electronic signatures, incidental amendments have also been made in the following Acts:

  • The Indian Penal Code, 1860
  • The Indian Evidence Act, 1872
  • The Banker’s Bank Evidence Act, 1891
  • The Reserve Bank of India Act, 1934

The Act purports to include the work “electronic record” along with the word “record”/”document” appearing generally in various sections of these act.

The amendment to Indian Penal Code, 1860, also states that for the purpose of the Section 466 (dealing with forgery of records) a “register” shall include any list, data or record of any entires maintained in the electronic form as defined in the IT Act 2000.

Bankers Books Evidence Act, 1891 redefines banker’s books as ledgers, daybooks, cash books and account Books used in the ordinary business of the Bank.

The RBI act, 1934 has been amended by the IT act, 2000, empowering the central board to make regulations for fund transfers through electronic means between the banks or between the banks and other financial institutions.

Click Here -Read One time Gopalakrishana Committee Report

Telegram Group:- Click Here

Buy Online Mock Tests for Jaiib/DBF & Caiib Exams

Jaiib Study Material PDF

Read More Jaiib/DBF Study Material (Unit wise)

Attempt Jaiib/DBF Quiz test (Unit- Wise)


Leave a Reply