Professional Documents
Culture Documents
in
CA Inter
EIS
NUGGETS
CHAPTER 5 CA Chandan Patni
CORE BANKING SYSTEMS
To buy our awesome e-lectures
www.edulounge.in
Subscribe to our YouTube Get access to notes, charts Follow CA Chandan Patni on
channel for revision lectures and other amazing content Instagram.
& regular updates. on our Telegram channel.
i) Custody of large volumes of monetary items
i) Acceptance of Deposits
iv) Remittances
v) Clearing
i) Finacle
ii) FinnOne
iii) Flexcube
Examples
iv) BaNCS
v) BankMate
vi) Implementation
vii) Maintenance
viii) Support
ix) Updation
Internal + external
x) Audit
v) Internet Banking
Powerful + Robust
No unauthorised changes
Maintenance
Technology Behind CBS details of ATM account holders (but not PIN)
iii) ATM Channel Server
Process
i) Current & Savings Accounts (CASA)
Risks & Controls
Process
ii) Credit Cards
Risks & Controls
Process
iii) Loans & Trade Finance
Risks & Controls
3) Back Office
vi) Treasury Process
Process
Data Ownership
Multiple Interfaces
Authorization Procedures
Response Time
Change Management
Incident Handling
Back up
SLA
User Training
User Security
Application Security
Network Security
Physical Security
Risks & Controls in certain Areas
ii) Information Security Policies must be established with
management approval
Lack of Management Direction
Environmental Controls
Environmental Threats
i) Configuration
ii) Masters
Gateways of Application Software
iii) Transactions
iv) Reports
3) RBI Act, 1934 Key Functions of RBI ii) Regulator & Supervisor of the financial system
v) Facilitates e-governance
as per UN's Manual on Prevention & Control iii) Deliberate Damage (virus or bombs)
Classification
of computer related crimes
iv) Unauthorised Access (Hacking)
Cyber Crimes
v) Unauthorised Reproduction (Piracy)
iv) Phishing
Common Scenarios
v) Online sale of illegal articles
CASA Process
RM requests Credit Team verifies
for KYC documents, assess credit
documents worthiness & updates
facilities in customers account
Risk 4 Control 4
If transaction is
Customer will swipe Acquirer sends validated, the acquirer
the card on POS request to Issuer authrorises and POS
machine to authorise will process it
Sale Authorization
POS will send Approval/denial is Receipt is
authentication sent through generated & sale
to Acquirer Bank Intermediary is completed
Issuer substracts
Merchant stores all day's Interchange fees,
authorised sales in a transfers balance to
batch and sends it to Acquirer through Card
Acquirer Network Card Holder is billed
Risk Control
Credit Line in CBS is not as per sanctioned Access rights to authorise credit limits must
2
limit be restricted.
Risk Control
Credit Line in CBS is not as per sanctioned Access rights to authorise credit limits must
2
limit be restricted.
Thank you so much sir for our Dear Sir, Hello sir!
constant support and guidance. I want to say thank you to you Auditing classes were too good
Loved the way you taught and for helping me clear my CA Inter with a lot of practical
encouraged in the class. I was Group 2. I got 62 marks in ITSM. examples...the notes that you
always weak in theory but the I was not able to clear the group made us to write would help a
way you made us understand only because of this paper and lot during exam times...we
the concepts and also how to in my Nov 17 attempt I got 32 in gained a good understanding of
read theory subjects was just ITSM. You helped me a lot in the subject..Thanks a lot Sir 😊
super amazing. Now my fear of clearing the group. Thank you
theory subjects has gone down once again sir.
considerably. Thank you so
much sir.