You are on page 1of 23

What is the Digital India?

The Digital India is the scheme launched by the government with the goal of
transforming India into a digitally enabled society and knowledge economy. On
July 3, 2015, the Digital India program (1.13 lakh crore cost) was started with the
goal of digitally empowering every citizen of the country and was launched by
Prime Minister of India, Shri Narender Modi. Its goal is to ensure that citizens
may access government services electronically by eliminating paperwork.
It also includes a plan to build high-speed internet networks in rural areas. It is
overseen by Deity (Department of Electronics and Information Technology) and
implemented by the government.

Vision of Digital India Scheme


The goal of the Digital India scheme is to make India a digitally empowered
society with a knowledge economy.
The vision is divided into 3 parts.
1. The digital infrastructure as a utility to every citizen
2. Governance and services on demand
3. Digital empowerment of citizens.

1. Digital Infrastructure

A well-connected country is necessary for a well-served country. When even


the most remote Indian villages are connected to the internet via broadband
and high-speed internet, the delivery of electronic government services to all
citizens, targeted social benefits, and financial inclusion will become a reality.
“Digital infrastructure as a utility to every person” is one of the primary themes
on which the Digital India Scheme is focused.
High-speed internet as a core utility to support online delivery of diverse
services is a major component of this strategy. It is planned to establish
enabling infrastructure for digital identification and financial inclusion, as well as
to ensure that common service centers are easily accessible.
The citizens must be provided with “digital lockers,” which would be shareable
private areas on a public cloud where government departments and agencies
may store documents for quick online access. The scheme is also intended to
make cyberspace a safe and secure environment.

The following are the highlights of this vision:

 High-speed internet access as a basic utility for delivering services to citizens


 Every citizen has a digital identity that is unique, lifelong, online, and
authenticable from birth to death.
 Citizen participation in the digital and financial world is enabled through a
mobile phone and a bank account.
 Access to a Common Service Centre is simple.
 On a public cloud, a private place that citizens can share.
 Cyberspace is a safe and secure environment.
2. Governance and Services on Demand
Various state governments and central ministries have taken numerous
measures throughout the years to usher in an era of e-governance. Efforts
have been made at different levels to improve public service delivery and make
the process of obtaining them easier. In India, e-government has progressed
from the computerization of government departments to programs that
encompass the finer elements of administration, such as citizen centricity,
service orientation, and transparency.
In 2006, the National e-Governance Plan (NeGP) was adopted to take a
comprehensive look at e-government efforts across the country and integrate
them into a single vision. A major nationwide infrastructure, stretching down to
the most remote of communities, is being built around this concept, and large-
scale record digitization is underway to provide easy and dependable access
over the internet.
The ultimate goal was to make all government services available to the
common man in his neighbourhood through common service delivery outlets,
while also ensuring efficiency, transparency, and reliability of such services at
cheap prices in order to meet the basic needs of the common man.” Six factors
are essential for ensuring that all residents and other stakeholders in the
country have access to government and services on demand.
The following are the highlights of this vision:

 Services that are seamlessly linked across agencies or jurisdictions


 Real-time access to services via web and mobile platforms
 All citizen entitlements must be portable and cloud-based.
 Services that have been digitally altered to make doing business easier
 Electronic and cashless financial transactions
 Using Geographical Information Systems (GIS) for decision-making and
development

3. Digital Empowerment of Citizens

Connectivity via the internet is a fantastic leveller. Indians are increasingly


networking and conversing with one another via mobile phones and laptops
connected to digital networks, regardless of their ethnic or socioeconomic
status. By focusing on digital literacy, digital resources, and collaborative digital
platforms, the Digital India Scheme pledges to convert India into a digitally
empowered society. The importance of universal digital literacy and the
availability of digital resources/services in Indian languages is also highlighted.

The following are the highlights of this vision:

 Digital literacy should be universal.


 Digital resources that are available to everyone
 Participatory governance through collaborative digital platforms
 Digital materials and services in Indian languages are available.
 Citizens are not needed to produce government paperwork or certifications in
person.
Nine pillars of Digital India
Digital India was established with a vision of inclusive growth in areas of
electronic services, products, manufacturing, and job opportunities.
Digital India aims to provide the much-needed thrust to the nine pillars of
growth areas. Each of these areas is a complex programme in itself and
cuts across multiple Ministries and Departments. The nine pillars of Digital
India are given below:

 Broadband Highways– This covers three sub components, namely


Broadband for All – Rural, Broadband for All – Urban and National
Information Infrastructure (NII).
 Universal Access to Mobile Connectivity- This initiative focuses on
network penetration and filling the gaps in connectivity in the country.
 Public Internet Access Programme- The two sub components of
Public Internet Access Programme are Common Services Centres
(CSCs) and Post Offices as multi-service centres.
 e-Governance: Reforming Government through
Technology- Government Process Re-engineering using IT to simplify
and make the government processes more efficient is critical for
transformation to make the delivery of government services more
effective across various government domains and therefore needs to
be implemented by all Ministries/ Departments.
 e-Kranti – Electronic Delivery of Services- To improve the delivery of
public services and simplify the process of accessing them. In this
regard, several e-governance initiatives have been undertaken by
various State Governments and Central Ministries to usher in an era of
e-Government. e-Governance in India has steadily evolved from the
computerization of Government Departments to initiatives that
encapsulate the finer points of Governance, such as citizen centricity,
service orientation and transparency.
 Information for All- This pillar aims to ensure transparency and
availability of reliable data generated by the line ministries for use,
reuse and redistribution for the people of India.
 Electronics Manufacturing- This pillar focuses on promoting
electronics manufacturing in the country.
 IT for Jobs- This pillar focuses on providing training to the youth in the
skills required for availing employment opportunities in the IT/ITES
sector.
 Early Harvest Programmes- This pillar consists of a group of
different short-term projects which have immediate effect on the Indian
digital ecosystem like IT platform for mass messaging, crowd Sourcing
of eGreetings, biometric attendance in the government offices, WI-FI
in all universities etc.
Financial Transaction Tools:
Digital payment is referred to as those payments that take place using the various types of electronic
medium. These methods do not require payment to be made in the form of cash or providing cheque.
There are different modes and types of digital payments that are prevalent in India, which are
discussed in detail in the following lines.

1. Banking Cards
2. USSD (Unstructured Supplementary Service Data)
3. UPI (United Payment Interface)
4. AEPS (Aadhaar enabled Payment System)
5. Mobile wallets
6. Point of Sale Machines (PoS)
7. Mobile Banking
8. Internet Banking

1. Banking Cards: Banking cards are the most widely used digital payment system in India. It offers
a great set of features that provides convenience as well as security to the users. Cards offer the
flexibility of making other types of digital payments. Customers can store card information in the
mobile application and pay for the services using the stored card information.
Banking cards (debit and credit cards) can be used for a variety of digital transactions like PoS
terminals, online transactions, as a payment medium in mobile apps, which provide any kind of
service like grocery, healthcare, rental cab booking, flight tickets, etc.
The most popular cards are issued by service providers like VISA, MASTERCARD, RuPay, AMEX
etc.
2. USSD (Unstructured Supplementary Service Data): USSD is another popular digital payment
method. It can be used for carrying out cashless transactions using mobile, without the need of
installing any banking app. This number is operational across all Telecom Service Providers (TSPs)
and allows customers to avail of services including interbank account to account fund transfer,
balance inquiry, and availing mini statements.
The good thing about USSD is that it works without the requirement of mobile data. The main aim of
this digital payment service is to include those sections of people of the society who are not included
in the mainstream.
The striking feature of the USSD is that it can be availed in Hindi. The USSD can be used for the
following types of activities:
a. Initiating fund transfers
b. Making balance enquiries
c. Getting the bank statements
3. AEPS (Aadhaar enabled payment system): AEPS can be used for all the following banking
transactions such as balance enquiries, cash withdrawal, cash deposit, aadhaar to aadhaar fund
transfers. All such transactions are carried out through a banking correspondent which is based on
Aadhaar verification.
This service can be availed if the aadhaar is registered with the bank where an individual has a bank
account. AEPS doesn’t require any physical activity like visiting a branch, using debit or credit cards
or making a signature on a document. This bank-led model allows digital payments at PoS (Point of
Sale / Micro ATM) via a Business Correspondent(also known as Bank Mitra) using Aadhaar
authentication.
4. UPI (Unified Payment Interface): UPI is the latest digital payment standard where the user having
a bank account can transfer money to any other bank account using UPI based app. UPI enabled
payments occur throughout the day and all 365 days in a year.
Payment can be done using a Virtual Payment Address (VPA). To use UPI services one must have a
bank account and a mobile number registered with that bank account.
The benefit of using UPI is that it allows you to pay directly from your bank account, without the need
to type in the card or bank details. This method has become one of the most popular digital payment
modes in 2020, with October witnessing over 2 billion transactions.
5. Mobile Wallets: Mobile wallets are another popular payment option. Here the users can add
money to their virtual wallet using debit or credit cards and use the money added in the wallet to
perform digital transactions.
Nowadays, many banks have launched their wallets. Additionally, notable private companies have
also established their presence in the Mobile Wallet space. Some popularly used ones include Paytm,
Freecharge, Mobikwik, mRupee, Vodafone M-Pesa, Airtel Money, Jio Money, SBI Buddy, Vodafone
M-Pesa, Axis Bank Lime, ICICI Pockets, etc.
6. Point of Sale Terminals: PoS terminals are installed in shops or stores where payments for
purchases can be done through debit and credit cards. There are variations of PoS, one which can be
Physical PoS and the other one is mobile PoS. The mobile PoS does away with the need of
maintaining a physical device.

7. Mobile Banking: Mobile banking is a service provided by the banks through their mobile apps in a
smartphone for performing transactions digitally. The scope of mobile banking has expanded
extensively after the introduction of UPI and mobile wallets.
Mobile banking is a term used to describe a variety of services that are availed using
mobile/smartphones.
Mobile banking is known as the future of banking, thanks to its ease, convenience, and speed.
Digital payment methods, such as IMPS, NEFT, RTGS, IMPS, investments, bank statements, bill
payments, etc., are available on a single platform in mobile banking apps. Banks themselves
encourage customers to go digital as it makes processes easier for them too.
8. Internet Banking: Internet banking is the process of performing banking transactions from the
comfort of your home using a mobile phone/laptop/ desktop and an active internet connection. The
major type of transactions can all be done using internet banking.
Internet banking services can be availed round the clock and all 365 days in a year, which makes it a
popular choice for performing digital transactions.
Today, most Indian banks have launched their internet banking services. It has become one
of the most popular means of online transactions. Every payment gateway in India has a virtual
banking option available. NEFT, RTGS, or IMPS are some of the top ways to make transactions via
internet banking.

Benefits of Digital Payments


Following are some of the most important benefits of using digital payments:

1. Transactions performed through digital payments systems are faster, easier and more
convenient than traditional banking transactions performed physically by visiting the branch.
2. DIgital transactions are cheaper than the traditional payment system.
3. Digital payments are more rewarding as individuals can get access to a variety of coupons
and freebies for performing digital transactions.
4. The digital transactions leave behind a definite track of the complete transaction which is
helpful to trace payments.
5. Digital payment systems such as PayTM help in payment of electricity, broadband, gas and
recharges for phone and DTH.
138 Course on Computer Concepts (CCC)

08
Digital Financial Tools
and Applications
OTPs minimize the risk of fraudulent
Objective of the Chapter login attempts and thus the risk of stolen
This chapter includes Digital Financial Tools, Card data.
(Credit/Debit), eWallet, PoS, Internet Banking, Online OTP works through randomness algorithms
Bill Payment etc.
that generate a new and random password
each time they are used.

Introduction How to get a One Time Password?


A new era of financial system in India was When an unauthenticated user attempts to
started after independence. In this era, access a system or perform a transaction on a
efforts were made to improve methodology device, an authentication manager on the
and responsibilities of financial system for network server generates a number or shared
financial tools. Financial tools are term used secret, using one time password algorithms.
to describe organizations that deal with the The same number and algorithm are used by
management of money. the security token on the smart card or
Financial tools are generally not limited to device to match and validate the one time
the field of deposit-taking loan and investment password and user.
services, but also present in the fields of Many companies use Short Message Service
insurance, agency services and all forms of (SMS) to provide a temporary passcode via
financial intermediation including the text for a second authentication factor.
distribution of financial products.
QR (Quick Response) Code
OTP (One Time Password) A QR code is a type of two-dimensional bar
OTP is a string of characters or numbers code that is used to provide easy access to
automatically generated to be used for one information through a smartphone. It refers
single login attempt. OTP can be sent to the to the instant access to the information
user’s phone via SMS or push messaging and hidden in the code. QR codes are gaining
is used to protect web based service, private popularity because the technology is open
credentials and data. source i.e available for everyone.
Digital Financial Tools and Applications 139

QR code consists of black squares arranged in Such is not the case with UPI. Here, you can
a square grid on a white background. It can be simply transfer money anytime anywhere
read by an imaging device such as camera, without adding any beneficiary or bank details.
and processed using Reed-Solomon error
correction until the image can be appropriately How to Register for UPI?
interpreted. Steps to registration for UPI are as follows :
1. Download the BHIM (Bharat Interface for
Money) app/ bank’s app/ third party apps.
2. Create your profile by adding details such
as name, password, UPI Pin etc.
3. Link the bank account with the VPA
(Virtual Payment Address) to complete
the registration process.
Types of QR Code
There are two types of QR code as follows :
How to Generate UPI Pin?
● Static QR Code These codes are most
Steps to generate UPI Pin, are as follows :
common type of QR code which are used 1. Select the bank account in the app from
to disseminate information to the general which you want to carry out transactions.
public. They are often displayed in 2. Once you select the bank account, you
advertising materials in the environment, on will be asked to generate your UPI Pin.
television, in newspapers and magazines. 3. An OTP will be sent to your registered
● Dynamic QR Code These codes are
mobile number with the bank account.
sometimes referred to as unique QR codes that 4. Enter this OTP to generate your UPI Pin.
offer more functionality. The owner can edit
5. Create your 6 or 4 digits UPI Pin which
the code at anytime and can target a specific
will be required for making all
individual for personalized marketing.
transactions.
UPI (Unified Payment Interface) Benefits of UPI
UPI is a digital mode that helps you transfer Benefits of UPI for Customers
funds from one bank to another without using ● Transfer can be made instantly by it.
any account number, bank name, account type ● It is easy to use.
and IFSC code. It facilitates users to access ● It requires single click authentication.
multiple bank accounts with a single mobile
application. It combines merchant payments,
● It highly secured as no account detail is
numerous banking features and seamless fund shared.
routing to be accessed from a single place. Benefits of UPI for Banks
It eliminates the need to enter bank details ● It is safe and secure transaction system.
or other sensitive information each time a ● It requires single click with two factors
customer initiates a transaction. authentication.
UPI has been launched by the National ● Use of the existing infrastructure ensures
Payments Corporation of India also known as no additional cost is incurred by the bank.
NPCI. In conjunction with the Reserve Bank of
India and Indian Banks’ Association, NPCI Benefits of UPI for Merchants
has framed this network. It is similar in ● It provides instant receipt of fund.
mechanisms like the RuPay system through ● For this, there is no need for sharing bank
which debit and credit cards function. details.
If you want to transfer funds using Internet ● It is suitable for E-Commerce platforms.
banking then in most cases, the bank takes some ● CoD (Cash on Delivery) collection is made
time to update the new beneficiary details. easy with UPI payment.
140 Course on Computer Concepts (CCC)

How to Perform a UPI Transaction? Benefits of AEPS


Steps to transfer money using UPI are as The benefits associated with AEPS are :
follows : ● There is no requirement of a signature on

1. Open the UPI based app on your your debit card.


smartphone. ● It is safe and secure payment method.

2. Select the transfer/send money option. ● It is easy to use.

3. Enter the account details/mobile number. ● It increases the reach to rural areas as

4. Enter the amount to be transfer and enter banking executives.


the UPI Pin to confirm the payment. ● With AEPS, the only information required

5. Money will transferred instantly and to initiate a transaction is Aadhaar number


confirmation message is sent to the and biometric information.
user’s mobile number.
How to Use AEPS?
Steps to do bill payment using UPI are as Steps to use AEPS are as follows :
follows :
1. Go to a Micro-ATM or banking
1. Once logged into your UPI based app. correspondent.
2. You will have to add a bill details to 2. Provide Aadhaar number and bank name.
avail the service
3. Choose the type of transaction you want
3. Enter the amount that you have to pay to make.
the bill for.
4. Provide verification through fingerprint/
4. Enter the UPI Pin to make the payment. iris scan.
5. Your payment will be credited to the 5. Collect your receipt.
biller instantly.
USSD (Unstructured Supplementary
AEPS (Aadhaar Enabled Payment Service Data)
System) It is a communication protocol available on
AEPS is a type of payment system that is every GSM enabled mobile device. It is a
based on the Unique Identification Number session based text communication without
and allows Aadhaar Card holders to store and forward mechanism (unlike SMS)
seamlessly make financial transactions that is practical for interactive communication,
through Aadhaar based authentication. such as banking or education.
It helps all individuals carry out financial
USSD messages can have upto 182
transactions on a Micro-ATM. It helps in
alphanumeric characters and the time it
empowering all sections of the society by
takes from a request to a response is 2
making financial and banking services
seconds while it takes 6 seconds for an SMS
available through Aadhaar.
to reach a mobile phone.
This is simple, secure and user-friendly
USSD is characterised by short and combined
platform for financial transactions. This is
alphanumeric (#, 1-9 and *) codes that are
another initiative taken by the National
used by the mobile network. Its good example
Payments Corporation of India (NPCI) to
is to check your mobile prepaid balance or to
encourage cashless transactions in India.
initiate a mobile top-up using a USSD
Services offered by AEPS voucher code.
● Cash deposit and withdrawal To use USSD mobile banking, users will have
● Payment transaction ● Balance enquiry to simply dial * 99 # and use the interactive
● Fund transfer menu. There are many banks in India that
● Obtain a mini statement are currently providing the * 99 # service.
Digital Financial Tools and Applications 141

How to Send Money Using USSD *99#? Types of Credit Card


Follow the below steps to send money using There are four main types of credit card as
USSD *99 # are as follows : follows :
1. Dial *99# using registered mobile Reward Credit Card
number with bank account.
This type of credit card earns rewards on
2. The interface will appear and you can purchases. Some cards will pay out at a flat
type 3 letters of your bank short name rate of 1%–2%, while others will give an
or first 4 letters of bank, IFSC or 2 extra bonus in predetermined spending
digits bank numeric code and proceed to categories.
click Send.
3. Now, choose number ‘3’ to send money Low Interest Credit Card
and proceed key in payee/beneficiary These cards are best if you carry some credit
mobile number. card debt month to month. Depending on
your financial situation, you can choose a
4. Proceed to key in the beneficiary/payee card with a reliably low ongoing interest rate
MMID, transaction amount. or one that has no interest for an
5. Key in MPIN and last 4 digits of your introductory period.
bank account number.
Balance Transfer Credit Card
Information/Details Required These cards are meant for those who already
for USSD Fund Transfer have a lot of credit card debt. They allow you
● MMID ● MPIN
to shift your debt from your current card to a
new one and give you a period of 6-21 months
● Registered mobile number
to pay it off interest free. There is usually a
Features of USSD *99# Service one time balance transfer fee, though, of,
upto 5%.
● It is easy to use.
● It is works on all GSM handsets. Secured Credit Card
● It is highly secure interface. This type of card may be a good credit
building option for those with no credit
● It is works without data connection on a
history or poor credit.
basic phone.
Under this secured arrangement, the
Services offered by USSD cardholder agrees to deposit a certain amount
● Change MPIN ● Generate OTP onto the card before they start using it and
● Know MMID ● Funds transfer they can’t charge beyond that amount.
Because this reduces risk for the card issuing
● Balance enquiry ● Mini statement
bank as they can collect an up-front deposit
in case the cardholder can’t repay, secured
Credit Card cards are the easiest to be approved for.
It is a thin rectangular slab of plastic issued
by a financial company, that lets cardholders Debit Card
borrow funds with which to pay for goods and
It is a payment card that deducts money
services. Credit cards impose the condition
directly from a consumer’s account to pay for
that cardholders pay back the borrowed
a purchase. Debit cards eliminate the need to
money plus interest as well as any additional
carry cash to make purchases. In addition,
agreed upon charges.
debit cards, also called check cards, offer the
A credit card owner can borrow money from convenience of credit cards and many of the
the issuer of the credit card and will not have same consumer protections when issued by
to pay interest if the borrowed amount is major payment processors like Visa or
repaid within 30 days. Master Card.
142 Course on Computer Concepts (CCC)

Types of Debit Card Benefits of eWallet


There are following types of debit card as follows : ● It helps to reduce fraud. Mobile Wallets use
Online Debit Card random payment codes that cannot be used
again.
Online debit cards need electronic
authorization, every time a transaction is ● Pay quickly by eWallet. It can save time.
reflected in the user’s account. The ● It can trim wallet contents.
transaction of an online debit card is further ● Cash back or rewards facilities available
secured with a personal identification under eWallet.
number (PIN) verification system for added
safety. The PIN has to be validated during How Mobile Wallets Work?
each and every transaction. Steps showing how work mobile wallet app in
your mobile phone are :
Offline Debit Card
1. Download the Mobile Wallet app (or it may
This generally includes the logos of major
be already built into your mobile device).
cards such as Visa or Master Card. This type
of card requires the cardholder’s signature for 2. Add your credit card or debit card
validation during each and every transaction. information to the Mobile Wallet.
Offline debit cards usually have a daily limit 3. When you check out a participating
restricted to the value of transactions. merchants, access the Mobile Wallet
and choose your card.
Prepaid Debit Card
4. If you’re making an in-store purchase, just
These cards are also referred to as reloadable
hold your mobile device at the terminal.
debit cards. To use this type of debit card, the
user has to pay the entire amount in advance Mobile Wallet Security
and later use the money according to his/her
Before using a Mobile Wallet service, security
discretion.
measures provided by the wallet provides to
help protect card information should be
eWallet checked.
eWallet (Mobile Wallet) is a type of prepaid
account in which a user can store his/her With some mobile wallets your full card
money for any future online transaction. An number is not visible to merchants when you
eWallet is protected with a password. With make a purchase. Some Mobile Wallets also
the help of an eWallet, one can make have a way to disable the service if your card
payments for groceries, online purchases and or mobile device is lost or stolen.
flight tickets among others. An eWallet needs Types of eWallet
to be linked with the individual’s bank
There are various types of eWallet as follows :
account to make payments. The main
objective of eWallet is to make paperless Paytm Wallet
money transaction easier. Paytm is India’s largest mobile commerce
platform launched in 2010. Paytm Wallet,
eWallet Transaction Process because of its amazing marketing and
eWallet do not all have the same transactions operation strategies, has been able to capture
process. The process that each wallet uses, maximum market share of this industry.
depends on the software that makes its function.
The wallet can be used to sent money directly
With some eWallets, you have to insert your to bank accounts as well.
password to confirm a transaction.
Paytm is the first company in India to receive
While other eWallets, may give the user a a license from the Reserve Bank of India
unique identification code for each transaction. (RBI) to start a payment bank.
Digital Financial Tools and Applications 143

Freecharge Wallet SBI Buddy


This service was launched in September, SBI had launched the Mobile Wallet Buddy
2015 and has ever since introduced many in August 2015, in 13 different languages in
attractive features. This will enable all collaboration with Master Card. It is a digital
customers to send and receive funds through platform by which customers can simply send
the UPI system. Freecharge UPI will allow or ask money from any of their contacts even
users to initiate fund transfers instantly on a if they do not have an SBI account.
24/7 basis on all 365 days in a year, including
PayZapp
bank holidays.
PayZapp offered by HDFC bank is an ideal
Mobikwik mobile payment wallet. With PayZapp, you
It is a digital wallet that can be used for a can shop on your mobile at partner apps, bus
number of online payments including and movie tickets, groceries, book flight
transferring money, accepting payments, tickets and hotels, pay bills and recharge
mobile recharge, payment of utility bills, such your mobile.
as electricity, DTH, online shopping etc. With the HDFC PayZapp eWallet app,
Mobikwik has received an approval from the customers do not need to depend on card
Reserve Bank of India (RBI) and has tied up based transactions and can enjoy secure and
with a number of retails and online convenient payments.
merchants in the country.
PhonePe Wallet
Oxigen Mobile Wallet It provides an online payment system based
It is a digital wallet service through which an Unified Payments Interface (UPI), which
users can avail all the services offered by is a new process in electronic funds transfer
Oxigen. It is an application based service that launched by National Payments Corporation
can be used on all types of smartphones such of India (NPCI).
as Android, Windows and IOs. Oxigen wallet Using PhonePe, users can send and receive
is a semi-closed wallet as per RBI guidelines. money, recharge mobile, data cards, buy gold
You can transfer funds from your wallet to and shop online and offline.
your bank account.
Airtel Money PoS (Point of Sale)
Airtel money is the Mobile Wallet from the The Point of Sale (PoS) or Point of Purchase
successful and popular telecom company (PoP) is the time and place where a retail
Airtel. It allows you to use your smartphone transaction is completed.
as an electronic wallet to make and receive At the Point of Sale, the merchant would
payments. Originally launched in 2012, this calculate the amount owed by the customers
app offers customers with an efficient and indicate the amount. He may prepare an
alternative to cash transactions. invoice for the customer (which may be a
cash register printout), and indicate the
Citrus Wallet options for the customer to make payment.
It is an app that lets you send money to and PoS is also the point at which a customer
receive from anyone who has a phone number makes a payment to the merchant in
or E-mail. It lets your transfer money to exchange for goods or after provision of a
friends, colleagues and family members service.
within seconds.
The PoS transaction is completed by online
You can split canteen, movie, travel and payment gateways. The online payments are
party bills with ease. You can even see all enabled through own payment gateways or
your past transactions and keep a track of third party service providers called
your spending patterns. intermediaries.
144 Course on Computer Concepts (CCC)

PoS System Requirements Internet Banking Access


● PC or Laptop with standard human In this banking, customers access his/her
interface devices account from a browser that runs internet
— Keyboard banking programs resident on the bank’s
— Mouse World Wide Web (WWW) server.
— Monitor It provides an array of services including
● Browser: Current version functional budgeting and forecasting tools,
financial planning capabilities, investment
● USB port (for barcode scanner) analysis tools, loan calculators and equity
● LPT or USB port (for printer) trading platforms.
Types of PoS System Online accounts are easy to arrange and
They are generally classified into three require lesser information than a traditional
types as : bank account. Internet provides a variety of
attractive possibilities for remote account
Mobile PoS access, including
It is also known as mPoS that uses an ● World wide connectivity.

electronic device such as smartphone, tablet ● Availability of enquiry and transaction


or another mobile device as a terminal at service around the clock.
which you can attach a credit card reader.
● Easy access to transaction data, both recent
mPoS systems are used to process payments
and historical.
and may have other capabilities such as
● Direct customer control of international
inventory management.
movement of fund without intermediation
Terminal PoS of financial institution.
It is a software/hardware based system that
carries add-on peripherals such as barcode
scanners, credit card readers, receipt printers Password Security
and cash drawers.
Password security is must for Internet
Cloud PoS banking. After receiving password, do
It is an online or web based PoS which can change it and memorise it otherwise
be easily used with your existing hardware account may be misused by someone.
such as a computer, tablet and printer.
A cloud PoS system is installed in data
centers that are maintained by the PoS NEFT
vendor. (National Electronic Funds Transfer)
It is a nation wide system that facilitates
Internet Banking individuals, firms and corporates to
Internet banking allows the user to conduct electronically transfer funds from any bank
financial transactions via the internet. It is branch to any individual, firm or corporate
also known as online banking or web banking. having an account with any other bank
An Internet bank will offer customers just branch in the country.
about every service that is traditionally This retail funds transfer system started in
available through a local branch. November, 2005.
Through Internet banking, basic banking Such individuals who do not have a bank
transactions such as paying bills and account (walk-in customers) can also deposit
transferring funds between accounts can cash at the NEFT enabled branches with
easily be performed by the consumers. instructions to transfer funds using NEFT.
Digital Financial Tools and Applications 145

Pre-requisites for Originating to 6 PM for customer transactions and 7 AM


a NEFT Transaction to 7:45 PM for interbank transactions.
Following are the pre-requisites for putting IMPS (Immediate Payment Service)
through a fund transfer transaction using
IMPS is an instant interbank electronic fund
NEFT :
transfer service through mobile phones. The
● Originating and destination bank branches
major feature of IMPS is that it is available
must be part of the NEFT network. at all times for usage. It transfer funds
● Beneficiary name, account number, account
instantly and is a great banking platform in
type, name and IFSC of the beneficiary case of emergencies. Its service is available
bank branch, all the details of the 24×7, throughout the year including sundays
beneficiary, should be available with and any bank holidays.
remitter.
National Payments Corporation of India
● Some banks provide the facility to
(NPCI) is responsible for managing the IMPS
automatically pop-up the IFSC details for fund transfer mechanism.
net banking customers with destination
bank and branch. This mechanism is regulated by Reserve
Bank of India. One can define IMPS as an
Limits of the Fund Transfer by NEFT immediate, interbank real time fund transfer
There is no maximum limit of fund transfer mechanism enabled through electronic
through the NEFT. There is no minimum means.
limit of fund transfer also through the
NEFT. You can transfer any amount. The
Limits of the Fund Transfer by IMPS
timing of NEFT is from 8 AM to 7 PM Transaction charges of this platform are also
(Working days). very nominal and the transfer limit is also
considerable, approximately ` 2 lakhs per
RTGS (Real Time Gross Settlement) day.
RTGS system is a fund transfer mechanism
that transfer of money from one bank to Online Bill Payment
another on a ‘real time’ and on ‘gross basis’. Online bill payment system is an internet
Settlement in ‘real time’ means payment based method of processing economic
transaction is not subject to any waiting transactions. It allows a vendor to accept
period. The transactions are settled as soon payments over the web or over other internet
as they are processed. ‘Gross settlement’ connections such as direct database
means the transaction is settled on one to one connections between retail stores and their
basis without bunching with any other suppliers.
transactions. Online payment systems typically are run by
The RTGS system is primarily meant for third party corporations, such as PayPal,
large value transactions. This is the fastest Google, Click2Pay, etc.
possible money transfer system through the Online bill pay helps you organize bills and
banking channel. keep track of due dates. You can easily see
where your money is going, so you can make
Limits of the Fund Transfer by RTGS sure you have enough funds available to
There is a minimum limit of ` 2 lakhs for cover each payment. You receive and pay
RTGS transactions and there is no maximum your bills all through your bank-one list, in
limit as such. Timing of RTGS is from 7 AM one place.
09
Overview of FutureSkills
and Cyber Security
journey by choosing job role and skills that
Objective of the Chapter interest you.
This chapter includes Internet of Things, Big Data Learner can either take a course and get
Analytics, Cloud Computing, Virtual Reality, Artificial certified through the hundreds of course
Intelligence, Social & Mobile, Blockchain available or follow some learning pathway
Technology, 3D Printing, Robotics Process created by the subject matter experts. The
Automation, Cyber Security, etc.
learning goals can be edited anytime you
want to ensure that the skills you have
Introduction to FutureSkills chosen, always interest you.
FutureSkills is meant for IT professionals The platform has the optional ability to
which will help them to upgrade their skills. award skill coins, which can be used for
With the increase use of technologies, there is course available on FutureSkills market
a need to realign the approaches of the place. FutureSkills is a simple yet powerful
industry. platform which can go a long way in future
proofing your career.
This platform will ensure that all the needs
are fulfilled. As the work of engineers already
involves the use of technology to a large Introduction to Internet
extent, the tech industry in particular, will of Things (IoT)
need to strategically implement FutureSkills IoT is a network in which all physical objects
which will help to adapt these changes.
are connected to the Internet through
How FutureSkills Work? network devices and exchange data. IoT
allows objects to be controlled remotely across
Journey of a person in the field of
existing network infrastructure. The goal of
FutureSkills begins as a learner by exploring
IoT is to extend to Internet connectivity from
the platform where he can search for
technologies, job roles yourself. He can follow standard devices like computer, mobile, tablet
technology to get daily learning insights. to relatively dumb devices like a toaster.
The contents are arranged to show a Advancements in medicine, power, gene
description of that job role through a job role therapies, agriculture, smart cities and smart
card and the skills required for the job role. homes are few examples where IoT is
There is an option to personalise learning strongly established.
150 Course on Computer Concepts (CCC)

Components of IoT 3. Improved Customer Engagement IoT


allows you to improve customer
There are four fundamental components of
experience by detecting problems and
IoT system as follows :
improving the process.
1. Sensors/Devices Sensors or devices are
4. Improved Data Collection Traditional
key components that help you to collect
data collection has its limitations and
live data from the surrounding
its design for passive use.
environment. All this data may have
various levels of complexities. It could
be a simple temperature monitoring
Disadvantages of IoT
sensor or it may be in the form of the There are following disadvantages of IoT as
video feed. follows :
2. Connectivity All the collected data is 1. Security As the IoT systems are
sent to a cloud infrastructure. The interconnected and communicate over
sensors should be connected to the cloud networks, the system offers little control
using various media of communication. despite any security measures. It can
These communication media include lead the various kinds of network
Mobile or Satellite networks, Bluetooth, attacks.
Wi-Fi, WAN, etc. 2. Privacy Even without the active
3. Data Processing Once the data is participation of the user, IoT system
collected and it gets to the cloud, the provides substantial personal data in
software performs processing on the maximum detail.
gathered data. This process can be just 3. Complexity The designing, developing,
checking the temperature, reading on maintaining and enabling the large
devices like AC or heaters. However, it technology to IoT system is quite
can sometimes also be very complex like complicated.
identifying objects using computer
vision on video. Big Data Analytics
4. User Interface The information made It is the process of collecting, organizing and
available to the end user in some ways. analysing large sets of data to discover
This can achieve by triggering alarms patterns and other useful information.
on their phones or notifying through Big data analytics can help organizations to
text or E-mails. Also, a user sometimes better understand the information contained
might also have an interface through within the data and will also help identify
which they can actively check in on the data that is most important to the
their IoT system. business and future business decisions.
Advantages of IoT Characteristics of Big Data
There are following advantages of IoT as Characteristics of big data are as follows :
follows :
1. Variety Variety of big data refers to
1. Technical Optimization IoT structured, unstructured and
technology helps a lot in improving semi-structured data, i.e. gathered from
technologies and making them better. multiple sources. While in the past,
2. Reduce Waste IoT offers real time data could only be collected from
information leading to effective spreadsheets and databases, today data
decision-making and management of comes in an array of forms such as
resources. E-mails, PDFs, Photos, etc.
Overview of FutureSkills and Cyber Security 151

2. Velocity It essentially refers to the


speed at which data is being created in
Servers
real-time.
In a broader prospect, it comprises the Applications
rate of change and linking of incoming Laptops Desktop

data sets at varying speeds.


Monitoring Carbonation
3. Volume Big data indicates huge Content Communication Finance
volumes of data that is being Platform
generated on a daily basis from various
Identity
sources like social media platforms, Object Runtime
Queue
Database
business processes, machines, storage
Infrastructure
networks, etc.
Compute Network
Applications of Big Data Phones
Block
Storage Tablet

Many applications of big data are as Cloud Computing


follows :
It entrusts services with a user’s data,
1. Government When government
software and computation over a network. It
agencies are harnessing and applying
has considerable overlap with Software as a
analytics to their big data, they have Service (SaaS).
improvised a lot in terms of managing
utilities, running agencies, dealing Essential Characteristics
with traffic congestion or preventing
the crimes.
of Cloud Computing
Some essential characteristics of cloud
2. Healthcare Big data had already
computing are as follows :
started to create a huge difference in
the healthcare sector. With the help of 1. On Demand Self Services Computer
predictive analytics, medical services such as E-mail, applications,
professionals can now able to provide network or server service can be
provided without requiring human
personalized healthcare services to
interaction with each service provider.
individual patient.
2. Broad Network Access Cloud
3. Banking The banking sector relies on
capabilities are available over the
big data for fraud detection. Big data network and accessed through standard
tools can efficiently detect fraudulent mechanisms that promote use by
acts in real time such as misuse of heterogeneous thin or thick client
credit/debit cards etc. platforms such as mobile phones,
4. Manufacturing Using big data laptops, PDAs, etc.
manufacturing industry can improve 3. Resource Pooling The provider’s
product quality and output while computing resources are pooled together
minimizing waste. to serve multiple consumers using
multiple-tenant model with different
Cloud Computing physical and virtual resources
It provides computing and storage capacity dynamically assigned and reassigned
according to consumer demand.
services to heterogeneous community of end
recipients. 4. Rapid Elasticity Cloud services can be
rapidly and elastically provisioned, in
The name comes from the use of clouds as some cases automatically, to quickly
an abstraction for the complex infrastructure scale IN/OUT and rapidly released to
it contains in system diagrams. quickly scale In.
152 Course on Computer Concepts (CCC)

5. Measured Service Cloud computing 2. Software as a Service (SaaS) It is a


resource usage can be measured, method for delivering software
controlled and reported providing applications over the Internet as per the
transparency for both the provider and demand and on a subscription basis.
consumer of the utilised service. Most common examples of SaaS are
6. Multi Tenacity It refers to the need MicrosoftOffice 360, Oracle CRM,
for policy-driven enforcement, Marketo, etc.
segmentation, isolation, governance, 3. Platform as a Service (PaaS) It refers
service levels and chargeback/billing to the supply an on-demand
models for different consumer environment for developing, testing,
constituencies. delivering and managing software
applications. Some key players offering
Types of Cloud Deployments PaaS are Bluemix, CloudBees,
There are three types of cloud deployments Salesforce.com, etc.
categorized based on an organization’s ability
to manage and secure assets as follows : Applications of Cloud Computing
1. Public Cloud These are managed by The applications of cloud computing are
third party which provides cloud limitless. With the right middleware,
services over the Internet to public. a cloud computing system could execute
They offer solutions for minimizing IT all the programs a normal computer
infrastructure costs and act as a good could run.
option for handling peak loads on the Potentially, everything from generic word
local infrastructure. A public cloud is processing software to customized computer
meant to serve multiple users, not a programs designed for a specific company
single customer. could work on a cloud computing system.
2. Private Cloud These are distributed There are some applications of cloud
systems that work on a private computing as follows :
infrastructure and providing the users 1. Clients would be able to access their
with dynamic provisioning of computing applications and data from anywhere at
resources. any time.
3. Hybrid Cloud It is a heterogeneous 2. It could bring hardware costs down. You
distributed system resulted by would not need a large hard drive
combining facilities of public cloud and because you’d store all your information
private cloud. For this reason, they are on a remote computer.
also called heterogeneous clouds. 3. Corporations that rely on computers
have to make sure they have the right
Cloud Computing Services software in place to achieve goals. Cloud
The most common and widely used cloud computing systems give these
computing services are : organisations company-wide access to
1. Infrastructure as a Service (IaaS) It is computer applications.
a cloud computing model where
The companies do not have to buy a set
virtualized infrastructure is offered to
of software or software licenses for
and managed for business by external
every employee.
cloud providers. Some examples of the
wide usage of IaaS are automated, Instead, the company could pay a
policy-driven operations such as backup, metered fee to a cloud computing
recovery, etc. company.
Overview of FutureSkills and Cyber Security 153

4. Servers and digital storage devices take virtual models to prepare them for
up space. Some companies rent physical working on a real body. Virtual reality
space to store servers and databases can also be used as a treatment for
because they do not have it available on mental health issues.
site. Cloud computing gives these 3. In Education Virtual reality has been
companies the option for storing data on adopted in education too. It improves
someone else’s hardware, removing the teaching and learning. With virtual
need for physical space on the front end. reality, a large group of students can
5. Corporations might save money on IT interact with one another within a
support. Streamlined hardware would, three-dimensional environment.
in theory, have fewer problems than a 4. In Engineering and Architecture
network of heterogeneous machines and Virtual reality plays a major role in
operating systems. simulating three-dimensional models of
infrastructures, designs which can
Virtual Reality provide a real-life experience of the
Virtual Reality is a computer interface which physical designs or infrastructures
tries to mimic real world beyond the flat before hand. This helps in reducing
monitor to give an immersive 3D visual considerable costs and expenses which
experiences. It is an artificial environment can be incurred in a prototype.
that is created with software and presented 5. In Entertainment Virtual reality is
to the user in such a way that the user being used in the entertainment
suspends belief and accepts it as a real industry to boost experiences with 360
environment. On a computer, virtural reality films and increase emotional connection
is primarily experienced through two of the with them and/or the characters.
five senses i.e., sight and sound. 6. In Business Virtual reality has also been
Virtual Reality (VR) technology is applied to adopted in business. It is now being used
advance fields of medicine, engineering, for virtual tours of a business
education, design, training and environment, training of new employees
entertainment. and this also gives new employees a 360
degree view of every product.
Applications of Virtual Reality
Virtual reality is one of the offshoots of Artificial Intelligence
mobile technology and it has impacted on Artificial Intelligence (AI) is an area of
human lives in many ways. There are several computer science that emphasizes the
applications of virtual reality technology in creation of intelligent machines that work
human lives some of them are discussed and react like humans.
below : The term may also be applied to any machine
1. In Gaming Virtual technology’s devices that exhibits traits associated with a human
are used for virtual gaming experiences. mind such as learning and problem-solving.
Along with this, devices such as Wi-Fi
Knowledge engineering is a core part of AI
Remote, PlayStation Move/Eye, Kinect
research. Machines can often act and react
are based on virtual reality which
like humans only if they have abundant
track and send input of the players
information relating to the world. Artificial
to the game.
intelligence must have access to objects,
2. In Healthcare Healthcare is one of the categories, properties and relations between
applications where virtual reality could all of them to implement knowledge
have the most significant impact. engineering.
Healthcare professionals can now use
154 Course on Computer Concepts (CCC)

Types of Artificial Intelligence 5. In Autonomous Vehicles Just like


humans, self driving cars need to
Artificial intelligence can be categorized into
have sensors to understand the world
two parts, which as follows :
around them and a brain to collect,
1. Weak AI It embodies a system designed processes and choose specific actions
to carry out one particular job. Weak AI based on information gathered.
systems include video games such as Autonomous vehicles are with advanced
the chess and personal assistants such tool to gather information, including
as Amazon’s Alexa. long range radar, cameras and LIDAR
2. Strong AI These systems are systems (Light Detection and Ranging).
that carry on the tasks considered to be 6. In Social Media In social media
human like. These tend to be more platforms like facebook, AI is used for
complex and complicated systems. face verification wherein machine
These kinds of systems can be found in learning and deep learning concepts are
applications like self-driving cars or in used to detect facial features and tag
hospital operating rooms. your friends.
Applications of Artificial
Intelligence Social Media
Social media is computer based technology
There are some applications of artificial
that facilitates the sharing of ideas,
intelligence as follows :
thoughts and information through the
1. In Business Robotic process automation building of virtual networks and
is being applied to highly repetitive communities. By design, social media is
tasks normally performed by humans. internet based and gives users quick
Machine learning algorithms are being electronic communication of content.
integrated into analytics and CRM
(Customer Relationship Management) Social media originated as a way to interact
platforms to uncover information on with friends and family but was later adopted
how to better serve customers. by businesses which wanted to take
advantages of a popular new communication
2. In Gaming Over the past few years,
method to reach out to customers. There are
AI has become an integral part of the
some popular social media tools and
gaming industry. In fact, one of the
platforms as follows :
biggest accomplishment of AI is in the
● Facebook It is a popular free social
gaming industry.
3. In Healthcare Companies are applying networking website that allows users to
create their profiles, upload photos and
machine learning to make better and
videos, send messages, etc.
faster diagnoses than humans. One of the
● Twitter It is a free microblogging service
best known technologies is IBM’s Watson.
It understands natural language and can that allows registered members to
respond to questions asked it. broadcast short posts called tweets.
● Pinterest It is a social curation website for
4. In Banking A lot of banks have
already adopted AI-based systems sharing and categorizing images found
to provide customer support, detect online.
anomalies and credit card frauds. Pinterest requires brief descriptions but the
AI solutions can be used to enhance main focus of the site is visual. Clicking on
security across a number of business an image will take you to the original
sector, including retail and finance. source.
Overview of FutureSkills and Cyber Security 155

● LinkedIn It is a social media designed Advantages of Blockchain


specifically for the business community.
The goal of the site is to allow registered Technology
members to establish and document There are some advantages of blockchain
networks of people they know and trust technology as follows :
professionally. 1. It allows smart devices to speak to each
other better and faster.
Blockchain Technology 2. It allows the removal of intermediaries
The blockchain is an encrypted, distributed that are involved in record keeping and
database that records data. It is a digital transfer of assets.
ledger of any transactions, contracts that 3. It provides durability, reliability and
need to be independently recorded. In longevity with decentralized network.
financial sector, with blockchain technology 4. The data that are entered in blockchain
the participants can interact directly and can based systems are immutable which
make transactions across the Internet without prevents against fraud through
the interference of a third party. manipulating transactions and the
With all the fraud resistant features, the history of data.
blockchain technology holds the potential to 5. It brings everyone to the highest degree
revolutionize various business sectors and of accountability.
make processes smarter, secure, transparent,
and more efficient compared to the traditional Challenges of Blockchain
business processes. Technology
How Blockchains Work? 1. To verify all the transactions huge
power, i.e. electricity is required.
When a new transaction or an edit to an
existing transaction comes into a blockchain, 2. Blocks in a chain must be verified by
generally a majority of the nodes within a the distributed network and it can take
blockchain implementation must execute time. So, transaction speed can be an
algorithms to evaluate and verify the history issue.
of the individual blockchain block that is
proposed. 3D Printing/Additive
If a majority of the nodes come to a consensus Manufacturing
that the history and signature is valid, the 3D printing is a manufacturing process
new block of transactions is accepted into the where a 3D printer creates three-dimensional
ledger and a new block is added to the chain objects by depositing materials layer by layer
of transactions. If a majority does not concede in accordance to the object’s 3D digital
to the addition or modification of the ledger model.
entry, it is denied and not added to the chain.
It uses data Computer Aided Design (CAD)
This distributed consensus model is what software or 3D object scanners to direct
allows blockchain to run as a distributed hardware to deposit material, layer upon
ledger without the need for some central, layer, in precise geometric shapes. As its
unifying authority saying that transactions name implies, additive manufacturing adds
are valid and which ones are not. material to create an object.
156 Course on Computer Concepts (CCC)

How does 3D Printing Work? Robotic process automation does not involve
any form of physical robots. Software robots
Here are the steps taken in creating a 3D object :
mimic human activities by interacting with
1. Produce a 3D model using CAD or applications in the same way that a person
equivalent 3D design software. does. Robotic process automation enables
2. Convert the drawing to the STL business professionals to easily configure
(Standard Tessellation Language) file software robots to automate repetitive,
format, which is a format developed for routine work between multiple systems,
3D printers. filling in automation gaps to improve
3. Transfer the STL file to the computer business processes.
that controls the 3D printer. From
there, you can specify the size and Business Benefits of RPA
orientation for printing. Some business benefits of RPA are as follows :
4. Prepare for a new print job based on the 1. Increased Accuracy Robots are
requirements of the 3D printer you are extremely accurate and consistent, they
using. This may include refilling are much less prone to make mistakes
whichever additive you are using to or typo than a human worker.
make your object. 2. No Interruption of Work Operations
5. Begin the building process. Since, each can be performed 24/7 as software
layer is usually about 0.1 mm thick, robots can work tirelessly and
this can take anywhere from hours to autonomously without requiring staff to
days to complete depending on the manually trigger bots to initiate
object’s size. business processes.
6. Remove the object from the printer and 3. Low Technical Barriers Programming
avoid any contact with toxins or hot skills are not necessary to configure a
surfaces. software robot. As a primarily code-free
7. Perform any post-processing needed, technology, any non-technical staff can
which may involve brushing off residue use a drag and drop process designer to
or washing the object. set up a robot.
8. Use your new printed object. 4. Increased Productivity Process cycle
times are more efficient and can be
Examples of 3D Printing completed at a faster speed compared to
● Architectural scale model and maquettes manual processes.
● Eyewear 5. Meet Regulatory Compliance
● Dental products Standards Robots only follow the
● Design (lamps, furniture, etc) instructions they have been configured
● Reconstructing bones and body parts in to follow and provide an audit trail
forensic pathology. history for each step.
● Reconstructing heavily damaged evidence
retrieved from a crime scene.
Applications of RPA
Some applications of RPA are as follows :
Robotics Process Automation 1. Customer Service RPA can help
companies offer better customer service
(RPA) by automating contact center tasks,
RPA is the use of specialized computer including verifying E-signatures,
programs, known as software robots, to uploading scanned documents and
automate and standardize repeatable verifying information for automatic
business processes. approvals or rejections.
Overview of FutureSkills and Cyber Security 157

2. Healthcare Medical organizations can These objectives are as follows :


use RPA for handling patient records,
claims, customer support, account Confidentiality
management, billing, reporting and It refers to protecting information from being
analytics. accessed by unauthorized parties. In other
3. Supply Chain Management RPA can words, only the people who are authorized to
be used for procurement, automating do so can gain access to sensitive data.
order processing and payments, A failure to maintain confidentiality means
monitoring inventory levels and that someone who should not have access has
tracking shipments. managed to get it, through intentional
4. Human Resources RPA can automate behavior or by accident.
HR tasks, including onboarding and off Integrity
boarding, updating employee
information and timesheet submission It refers to ensuring the authenticity of
processes. information that is not altered and source of
the information is genuine.
5. Financial Services Companies in the
financial services industry can use RPA Sensitive data should not be altered in
for foreign exchange payments, transit and security measures such as file
automating account opening and permissions and user access controls, should
closing, managing audit requests and be taken to make sure that it cannot be
processing insurance claims. modified by unauthorized users.
6. Accounting Organizations can use RPA Availability
for general accounting, operational It is the guarantee of reliable and constant
accounting, transactional reporting and access to your sensitive data by authorized
budgeting. people.
It is best guaranteed by properly maintaining
Cyber Security all hardware and software necessary to
Cyber security involves protecting ensure the availability of sensitive data. It is
information and systems from major cyber also important to keep up with system
threats, such as cyber terrorism, cyber upgrades.
warfare and cyber espionage.
Ensuring cyber security requires coordinated Securing PC
efforts throughout the information system. There are numerous ways to protect and
The cyber security specialization covers the remove malware from our computers. These
fundamental concepts underlying the are as follows :
construction of secure systems, from the 1. Install Firewall A firewall enacts the
hardware to software to the human computer role of a security guard. There are two
interface, with the use of cryptography to types of firewall: Software firewall and
secure interactions. hardware firewall. Each serves similar,
but different purposes. A firewall is the
Need of Cyber Security first step to provide security to the
The classic model for information security computer. It creates a barrier between
defines three objectives of security : the computer and any unauthorized
maintaining confidentiality, integrity and program trying to come in through the
availability. Internet.
158 Course on Computer Concepts (CCC)

2. Keep Your Windows Operating 1. Put a Strong Passcode This is the first
System Upto Date Probably the most step to keep your phone secure. Every
important step to do is checking for the phone lets you set a passcode lock for
latest security updates and patches security and most of them now come
available for your windows operating with a fingerprint scan for added
system. After checking for available security. For passcode, make sure you
updates for your windows operating choose a pattern or combination which
system, keep the automatic update is not easy to guess or find out such as
turned ON in order to download and your birth year, car number, home
install the important updates that can number, etc.
help to protect your PC against new
2. Install Security Apps Your
viruses or next generation malware.
smartphone is a susceptible to data
3. Install Antivirus Software Antivirus theft as your computer.
is one other means to protect the
Therefore, just like you have security
computer. It is software that helps to
apps installed on your computer, you
protect the computer from any
must also get one for your smartphone.
unauthorized code or software that
There are security apps available from
creates a threat to the system.
all known companies such as Avast,
Unauthorized software includes viruses,
McAfee, Norton, Kaspersky, etc.
keyloggers, trojans, etc.
3. Internet Browsing Be careful when
This might slow down the processing
accessing a web browser on your
speed of your computer, delete important
smartphone as it can be easy to accept
files and access personal information.
messages that pop-up.
Antivirus software plays a major role in
real time protection, its added advantage If any security warning pop-up when
of detecting threats helps computer and looking at a website, take note of it and
the information in it to be safe. leave the website if needed. You always
look at the URL and make sure the
4. Check on Security Settings of the
Browser Browsers have various security
‘http’ has an s at the end. This ensures
and privacy settings that you should that the URL you are using, is secure.
review and set to the level you desire. 4. Turn Off Geotagging Many
Recent browsers give you ability to tell smartphone social networking apps
websites to not track your movements, automatically upload photos to the
increasing your privacy and security. Internet. The problem with this is that
5. Use Complex and Secure Passwords many phones embed location tags called
Complex passwords are difficult for the geotags, right into the photo files
hackers to find. Use a password that is themselves.
at least 8 characters in length and 5. Update Phone and Apps Regularly
include a combination of numbers, App developers regularly add features
letters that are both upper and lower and security updates to their apps on
case and a special character. Hackers the play store.
use certain tools to break easy They even give details on what the new
passwords in few minutes. update adds to the app for users before
installing the update.
Securing Smartphone
We recommend that you regularly check
It is really important that your smartphone is
secure for many reasons. You may keep data the play store for updates and make
on it and if your phone was lost or stolen, sure that you have the latest version of
this would be lost. the app installed on your device.

You might also like