Professional Documents
Culture Documents
- Login detail disclosure: This is most basic threat to the financial system. Using a
number of means, criminals acquire login details, such as a customer number, pin,
and use it to access the account and steal money from it. This threat could be
mitigated through promotion of good practice amongst con-sumers to keep their
login details safe.
- Computer spy viruses: These are computer programs which are circulated
through email or other means. Once a customer opens a malicious email a program
is automatically installed in his/her computer. These programs collect login id or
other financial information which is used to conduct a range of criminal activities
such as credit card cloning or unauthorized funds transfer.
- Dummy sites: Here customers is lured to the dummy or look alike website. These
website look very similar to a bank’s website, and when login details are entered,
these are recorded and used for criminal activities.
2. Some measures banks need to take to promote trust in e-banking?
- Being pro-active in combating online crimes and cooperating with other banks
and other regulatory/professional bodies to detect and prevent crimes.
- Taking proper care in protecting consumer’s information and taking particular care
in using it for marketing purposes.
- Providing appropriate guarantees against consumer losses in the event of fraud.
3. Advantages and disadvantages of outsourcing services?
Outsourcing In-house System Development
Advantages - An attractive option for - Development of in-house
replacing legacy systems expertise
- Low risk - Flexibility
- Known costs - Own developers have better
- Expert support from understanding of business
vendors - Less changes may be required in
- Easier upgrades business processes
- Ability to focus on core - Unique processes may lead to
business issues competitive advantage
Disadvantages - Possible inflexibility - High risk strategy
- Hight external - High costs
consultancy costs - High training expenses
- Difficult change - Difficult and costly upgrades
management issues
- High dependency on
vendors