Professional Documents
Culture Documents
• Immune to counterfeit
• Cryptocurrency • Don’t require a central authority
• Protected by strong encryption algorithm
Examples
• Bitcoin (BTC) (XBT) ...
• Ethereum (ETH) ...
• Ethereum Classic (ETC) ...
• Litecoin (LTC) ...
• Stellar (XLM) ...
• Zcash (ZEC
Bases of Blockchain
A B C Public Distributed Network
• This problem can be solved using Robotic Process Automation and Optical Character Recognition (OCR) solutions.
• The vendor details from the digital copy physical form can be read by OCR and provided to the RPA system. RPA will
compare the data to what is in the system and then process the payment. It can alert the executive to any errors so
that they can be resolved.
• Processing of Credit Cards: Validating consumer information and approving credit cards used to take weeks in
traditional credit card application procedures. Customers were dissatisfied with the extended wait time, and banks
were incurring costs as a result. On the other hand, banks may now complete the application in hours, thanks to RPA.
RPA can communicate with several systems simultaneously to validate data such as required documents, background
checks, and credit checks, and then make a decision based on rules to approve or reject the application.
Robotic Process Automation in Banking contd.
• Detection of Fraud: One of the critical concerns of banks with the adoption of digital
technology is fraud. It is challenging for banks to keep track of all transactions to detect
probable fraud. RPA, on the other hand, can track transactions in real-time and raise the
red flag for possible fraud transaction patterns, reducing response time. RPA can help
prevent fraud by restricting accounts and halting transactions in some circumstances.
• Process of Account Closure: With such a large customer base, it is expected to receive
account closure requests every month. Account closures can occur for various reasons,
one of which is when a client fails to deliver required papers. It’s simple to keep track of
such accounts, send automated reminders, and schedule calls for mandatory document
submissions with Robotic Process Automation. RPA can also assist banks in closing
accounts in unusual circumstances, such as when customers fail to present KYC
documentation.
Prescriptive Security
• Prescriptive security is, at its heart, a fusion of technologies and processes designed to
reduce the time and effort needed to detect and respond effectively to cyber security threats
and incidents. A critical aspect of prescriptive security is its use of automation and artificial
intelligence technologies.
• Cyber security Computers, networks, programs and data
• Perimeter defence
• Reactive measures
• Predictive measures
• Prescriptive Security
• = Artificial Intelligence + Machine Learning + Data analytics
• NOT based on the intuition of the analyst
• Well developed plan that is implemented repeatedly to protect the system.
Cyber Security and Prescriptive Security
• Cyber security or information technology security are the techniques of protecting
computers, networks, programs and data from unauthorized access or attacks that are aimed
for exploitation.
• Most cybersecurity approaches were based on the following measures which are called as
“Perimeter defense”
• Reactive measures: Focuses on reacting to a thread that has already occurred.
• Predictive measures: Predicts what can go wrong and implements various protective
measures.
• But the modern world needs modern solutions. An increased risk of cyber attacks forces to
react, especially when having huge volumes of data to protect.
• This resulted in the need for new type of cybersecurity – Prescriptive security.
Prescriptive security for Banking Institutions
• Prescriptive security is a fusion of technologies and processes designed to reduce the time and
effort needed to detect and respond effectively to cyber security threats and incidents. A critical
aspect of prescriptive security is its use of automation and artificial intelligence technologies.
• It’s a type of threat intelligence security that aims to establish security measures and protocols
depending on the inputs of risks.
• The idea of the approach is to keep up with potential risks to implement necessary controls that
won’t allow damage to the protected system.
• Instead of using the method of analysts’ intuition to implement security measures, prescriptive
security uses a different strategy. It’s based on a well-developed plan that can be enforced
repeatedly to protect the system.
• This type of approach operates by using a combination of various means that were formerly
associated with security tools. For example, the new strategy makes use of artificial intelligence,
machine learning, and data analytics features to spot threats as quickly as possible.
Prescriptive security – Key players
• Key players operating in the global prescriptive security in BFSI
industry include Cisco, Systems Inc, Nice Systems Ltd, SAS Institute
Inc, ESRI , Hexagon, IBM , NEC Corporation, SAP ERP, and Splunk.
These companies have adopted several strategies such as product
launches, partnerships, collaborations, mergers & acquisitions,
and joint ventures to strengthen their foothold in the global
prescriptive security in BFSI market.
Application Programming Interfaces (API)
• Application Programming Interfaces (APIs) are a collection of protocols and subroutines that enable
applications to talk to each other and exchange information.
• APIs have become the standard way of connecting applications, data and devices, providing
services directly to stakeholders and creating new models for doing business.
• Three main types of APIs are being deployed by banks at present:
• Private API: This API is accessible only within the financial institution and is therefore used to
improve internal processes, such as boosting operational efficiency.
• Partner API: A more open API that can be accessed by the bank’s preferred third-party partners.
As such, partner APIs can facilitate greater expansion through new channels than a private API.
Such partners could include clearinghouses, brokerages and custodian banks, and they can
provide services to their customers using the bank’s platform.
• Open/public APIs: Not as commonly used at this stage, this API involves making business data
available to third parties. Banks can deploy such APIs to generate additional business and grow
their customer bases. For example, the bank could enable an API for a loan-comparison app,
which would allow it potentially to acquire new business from customers shopping for new loans.
Application Programming Interfaces (API)
• One example of a bank that uses API technology is BBVA, which offers API
services to clients in Spain, Mexico, and the U.S. These are open APIs, meaning
any company can use them — and BBVA offers you the ability to gather
customer information, collect financial statements, view your company’s
financial position, and much more. BBVA makes it easy for organizations to
access essential information without hassle or delay.
• Another example of a bank that uses open banking platforms is HSBC
Group. HSBC Group supports open banking APIs and private open banking
APIs, that can provide valuable information on business and personal
accounts, ATM locations, branch locations, loans and commercial credit cards.
Their private APIs ensure the secure exchange of information between
businesses and other parties, so that they can protect sensitive customer
information.
End of the Module