Showing posts with label IIBF Information System banker DISA. Show all posts
Showing posts with label IIBF Information System banker DISA. Show all posts

Wednesday, 3 November 2021

MEMORY RECALLED QUESTIONS FOR INFORMATION SYSTEM BANKER 23.10.2021

 

MEMORY RECALLED QUESTIONS FOR INFORMATION SYSTEM BANKER 23.10.2021 

 

1.more number of questions from preventive ,detective and corrective controls

2.more number of QUESTIONS from types of testing

3.more number of questions from IS AUDIT

4.questions from RTGS - real time

5. Neft - deferred net settlements 

6. Audit charter 

7. Types of input and output devices

8. Redundancy check

9. Commi ,undo comes under TRANSACTION CONTROL LANGUAGE ( TCL )

10.phases of SDLC

     a.feasibility study

      b.system definition or requirement analysis

       c. System design

        d.program construction or coding

       e. Testing

       f . implementation

        g. Maintenance

11. Attenuation

12.simplex , half duplex , full duplex 

    Walkie talkie example of half duplex

13. Bridges in which layer

14. questions from BCP and BIA

15. Examples of critical,vital and non critical systems

16. Hot site ,warm site ,cold site 

17. Questions from disaster recovery planning

18. Gap analysis GA

19. features of electronic E money

20. Issuance of E money

21. INFINET is primarily TCP/ IP network

22. Which not comes under SFMS

23.questions from social engineering, spoofing, unauthorised access

24. One question from GASSP 

25. Three principles of It security - confidentiality, integrity, availability.

26. Types of input controls, batch controls , output controls.

27. Field check , record checks

28. White noise - due to rise in temperature

29. Cross talk - on account of coupling of signal paths 

30.key components of security policy

31. Firewall ,IDS, tuning

32.one question on incident handling

33. Virtual private network

34. Questions from digital signature

    a.who issues - CA certifying authority

   b. Who appoints CCA. - central govt 

   c.public key and private key

35.punishment and fine for hacking, tampering code.

36. One question from cyber apellate tribunal cyat.


Tuesday, 12 January 2021

ISB Re-collected questions recently

 ISB Re-collected questions recently



Questions were like

False negative

Dns

Cyat

Punishment for contravention of cca

Adjudicating officer comes under chapter

Drs should establish in non seismic zone

Hot site warm site reciprocal agreement which one is cheapest


Is audit procedures and plannings 

Dba

Which do not support network change -options were repeaters routers gateway 

Multiplexing

Normalisation 

Tcp works on which layer

Access control

Least privilege

Is audit spreadsheet 

Caat

Spoofing

It act 2000 amendments 

Cca is appointed by

Who issue digital certificate 

What type of risk arise when e banking services disrupted-

Legal and reputation risk 

Fourth generation language -



The last unit contains annexures /appendix/ glossary which are very important people tends to ignore while preparing for the subject.

Thursday, 22 October 2020

Information system for bankers recollected questions on 18 Oct 2020

 

IDS..operators in SQL..steps involved in data warehouse..BCP..smart cards


Defence in depth


Chapter 6 of it act


Caat


Data about data


Section 46 of it act


Responsibility of database administrator


What is intellectual property


IPsec


Certifying authority related questions


Digital signature related questions


Electronic form


These are some of the recalled questions from information system banker

Sunday, 20 September 2020

Information system for bankers recollected questions 20.09.2020

 Information system for bankers recollected questions 20.09.2020

 IS audit 

Anneutation 

Data integrity

Input/output devises 

Gateway 

Router 

Digital certificate license 

CCA appointed by

False negative 

Account lockout 

Firmware

Data didling 

Spoofing 

Intrusion prevention

Chat

Digital signatures- abt CCA

qualification of presiding officer

Cyat

Main components of IS policy


Bhim developed by?


Fully from last appendix chapter that is on IT act

Digital signatures




Hardware input output devices 

These areas u study





Sunday, 22 March 2020

New All IIBF Certifications PDFs in single link 2020-2021

All IIBF Certification PDFs in single link 2020-2021

Read corresponding  IIBF books .. Macmillan / Taxmann.

These all materials are extra information to get knowledge.

All the best


Face book:

https://www.facebook.com/groups/543054539662893/

Certified credit officer/Professionals 2020

https://drive.google.com/file/d/1lUW00Y-qnVzH9R9QB4ZjGqeShYDATS-e/view?usp=sharing

CAIIB ABM 2020

https://drive.google.com/file/d/10AkzgCtLyYexdKulaYY3B1ljHRJPGuLu/view?usp=sharing


MSME 2020

https://drive.google.com/file/d/1m1qF2hh9D0hpVvFTlNCR2rvpYAiEQTD8/view?usp=sharing


KYC AML:2020

https://drive.google.com/file/d/1T__7x42LV1HaG9YBQuMkAIPvS9GAHeL8/view?usp=sharing


BCSBI:2020

https://drive.google.com/file/d/1lSOKtV5OrThXmCwiB4TGVyOjZVVtjThd/view?usp=sharing


CAIIB IT:2020

https://drive.google.com/file/d/1t7Ein_FE5YMruvDQPOG4Z3Z-TE-Xmp_1/view?usp=sharing


Certified Treasury Professionals:2020
https://drive.google.com/file/d/1lVvYYtYC797vn1DKuSAsCxJhkv3E1JxK/view?usp=sharing


Digital banking 2020
https://drive.google.com/file/d/1lckjesn0gs0kiOZID1aBubb4tiHvbzPE/view?usp=sharing


Forex Individual 2020

https://drive.google.com/file/d/1lf3o8SRqy2_aRJulq9qf2q0krHmFlKok/view?usp=sharing


Forex Operations 2020
https://drive.google.com/file/d/1lnPrVdXPVsc3sve8OwsjE87OEgsxsAVb/view?usp=sharing



Cyber Crime and fraud management 2020

https://drive.google.com/file/d/1m2y5bwuUa1vKkBjx5DjwH17dNf8BP-xu/view?usp=sharing


Information System for Bankers 2020
https://drive.google.com/file/d/1lt0r7cRzJHTmBXsmF9xvEYFzaaxHCxTI/view?usp=sharing


International Trade Finance  2020
https://drive.google.com/file/d/1lxS3FGgdzI5Q-rJFPufnVUSA69TpVjT3/view?usp=sharing


IT SECURITY 2020
https://drive.google.com/file/d/1ly9nfxTpucTPKB6kuV-mIod4pTc97ceg/view?usp=sharing


Micro finance 2020

https://drive.google.com/file/d/1lzMSuWctOJUrKnNP_FfRlQL9ngs1U6aS/view?usp=sharing

Risk In financial services 2020
https://drive.google.com/file/d/1m7eITlMDdKTnc1FU1sSIKJtP8IcrZrG1/view?usp=sharing


Certified Audit  Professionals:
https://drive.google.com/file/d/1m8aQcdD4qr7R4QzUEgiN1Paw_rWhKWsm/view?usp=sharing

https://drive.google.com/file/d/1zoloZKNR2-UsBGIf0gw1ErhD0F2Y9mHW/view?usp=sharing



Telegram:

https://t.me/joinchat/KP68xFdZGztM7iDAuS4ueg














Monday, 6 May 2019

Information system for bankers recollected

Information system banker exam.
Some questions.....shared by members

CyAT
CAA
Digital Signature
BCP
Digital forensics
Normalisation
Internal audit
DBA responsibility
Telecommunications system audit
Power off switches
Cyber terbunal judge or magistrate
DS reissuance
Central depository of DS
Audit trail significance
Bottom up methodology
Audit plan
BCP
IDS
Virtual keyboard
IFMS full from
EFT
RBIA
Inherent risk
Insider threat
IS Audit policy
Information security officer role
DBA responsibility
Stress testing
BCNF
Critical applications
Poor architecture system
SDLC
Prototyping model
RTO application
IT Act 2000
Punishment for copyright as per IT Act
Controller of Certifying Authorities operates the National Repository of Digital Signatures (NRDC)
Function of modem, which is not an OOP Lang. C C++ Java C#, questns abt DRP, Trojan horse, sniffing, spoofing, availability, integrity, DBMS, preventive, corrective, detective controls, BCP
DDL DML DCL TCL commands, CA CCA-Digital certificates
Digital signature complete
Cyber apellate tribunal presiding officer
System testing
Compliance testing
Substantive testing
Telecom control
Db forms
Db commands
Risk based audit
It audit
Dba roles n resp
Prototyping model
Sdlc full
Interface testing
Rbeit ltd reg it subsidiary of rbi
Non repudiation
Bot stroke worms
Certified information System Banker

13.01.2019 3 PM Batch
Moderate Difficulty
Passing Mark 60
Each question carries 1 mark ( 100 questions )

Scored 55 marks

Recollected questions
DR centre location
Data warehouse
Audit charter/policy
Is audit 5 -10 questions
RAM and cache memory
Static RAM
Metadata
Which DB model used in CBS
Characteristics of a table
Many to Many relationship in DB
Simple ,self,outer join
Adaptive maintenance
Multiplexing
Packet switching
Full Duplex method
Bridge,router,switch,gateway
Diff between router and switch
Function of osi model layers 5 questions
Which protocol used in banking http,smtp,tcp/ip
Real time processing
Emergency response
Mirror site and reciprocal agreement
Trojan horse
E money
INFINET
CFMS
SFMS
Spoofing, piggybagging
Pervasive principle in GASSP
Classification of control
Boundary sub system
Audit trail
Attenuation
Types of noise (cross talk)
False positive and negative
Firewall
Intrusion detection systems and tuning
In what circumstances user ID and password will be given to user(emergency access)
Remote Access
OS tasks
Travelling virus procedure
Public and private key encryption

Sunday, 28 April 2019

All IIBF Certifications PDFs in single link Updated on April 2019

All IIBF Certifications PDFs in single link

Read corresponding  IIBF book 1st Macmillan / Taxmann.

These all materials are extra information to get knowledge.

All the best

Certified credit officer/Professionals
https://drive.google.com/file/d/1UuxDdXjdmPYiMa05SPgXQe1ZjuQ4e8bh/view?usp=sharing

MSME
https://drive.google.com/file/d/10zBkmliUC7170ZzgceaslAHeGXQd1-vF/view?usp=sharing

KYC AML:
https://drive.google.com/file/d/10mB6kpvV3CZ7UhUvXKnbFs2z_KUJu2IT/view?usp=sharing

BCSBI
https://drive.google.com/file/d/1Bdlk9P7in93ua_xusXgtwj0-USU3ALRV/view?usp=sharing

CAIIB ABM
https://drive.google.com/file/d/1NXM9K5pNJps-euhZR0TbV6Zz87zFK8gA/view?usp=sharing

CAIIB IT
https://drive.google.com/file/d/1Pj5vev_yk78BvAM6PTr-2wiRRXUDeiXH/view?usp=sharing

Certified Treasury Professionals:
https://drive.google.com/file/d/1Ojzmwijq9oqLoWWba0uWhzMzZwYdlYws/view?usp=sharing

Digital banking
https://drive.google.com/file/d/1EYj0XBI3-7_P9zq24WgPSFNkU6uJsEDz/view?usp=sharing

Forex Individual
https://drive.google.com/file/d/1jiyi1IiOI1W0r9u1aIFw0RH1U3jAOxNE/view?usp=sharing

Forex Operations
https://drive.google.com/file/d/1-ToWV33bJ4mKv20nNkQoLNw7z8bHwpuU/view?usp=sharing

Cyber Crime and fraud management
https://drive.google.com/file/d/16pwzqhxEBDYGq1SgUlXExhYXmWzCujmm/view?usp=sharing

Information System for Bankers
https://drive.google.com/file/d/1Xs8ywGhueRM4RToIRehfB5Od3YC0m7yM/view?usp=sharing

International Trade Finance
https://drive.google.com/file/d/11yfB3mpE51VPViNvOGcbDVIA3_i8r4wq/view?usp=sharing

IT SECURITY
https://drive.google.com/file/d/1plGml38MO1MBebPdTpC5pGEvh7rdqDfe/view?usp=sharing

Microfinace
https://drive.google.com/file/d/1mo-Pz-zoylEUKG21eKhRFJMcrbwv3RNb/view?usp=sharing

Risk In financial services
https://drive.google.com/file/d/1TdRYKQ34PGLtcnmnF83brpVHp2kEHUT9/view?usp=sharing

Certified Audit  Professionals:

https://drive.google.com/file/d/1gzaqFOz97-yNdL-COsYUkka0MTTaB9xF/view?usp=sharing








Sunday, 12 August 2018

All IIBF Certifications PDFs in single link

All IIBF Certifications PDFs in single link

Read corresponding  IIBF book 1st Macmillan / Taxmann.

These all materials are extra information to get knowledge.

All the best

Certified credit officer/Professionals
https://drive.google.com/file/d/1FplMEaDGqO901bQESuIMfmS0spej2p5B/view?usp=sharing

KYC AML
https://drive.google.com/file/d/1NhyU5b-q7SomdRD_kuyxwhO0lSVvlp8v/view?usp=sharing

MSME
https://drive.google.com/file/d/1pozMYe4F0moF-5dyAzhB_0BcaPIsqZYr/view?usp=sharing

BCSBI
https://drive.google.com/file/d/1vk4exeJW2PQM93gwDNsnvNGWj2uh7JMC/view?usp=sharing

Digital Banking
https://drive.google.com/file/d/1M5jr0a84pgqilJgJsBiZZe6FJBwDsuqi/view?usp=sharing

Foreign exchange Individual
https://drive.google.com/file/d/1jDQsTKSl54UrXC0gvBhiGv5V1tduk5Zj/view?usp=sharing

International Trade Finance
https://drive.google.com/file/d/1vYgdwbTVazkjv_2U7ppfAL2yfmsG295l/view?usp=sharing

Information system banker
https://drive.google.com/file/d/1yySCTA2aFwdeNDgTny9XlIB0x7IIG3SD/view?usp=sharing

IT security
https://drive.google.com/file/d/1XNLaHz4QNLCvHIH_MMuYjNqo7Cw7q2EY/view?usp=sharing

Prevention of cyber crime & fraud exam
https://drive.google.com/file/d/1GArx9JZAWOHH-fK8WvuEZSgqxjZgl_jG/view?usp=sharing

Certified Treasury Professionals
https://drive.google.com/file/d/1ZzUVI4CttHW_yNRO1DG4KSf9IAhZiCIm/view?usp=sharing

RISK in financial services
https://drive.google.com/file/d/134OS-POYOZaBLeEjFWLlAbhbFGKPWoPM/view?usp=sharing

Microfiance
https://drive.google.com/file/d/1bm27bcMA_NFUgdxbIJCJOlHLFinNA_rF/view?usp=sharing

CAIIB ABM 300 Case studies

https://drive.google.com/file/d/12voUk6-ubSI2PH0hKX6_trTf6T7wwdh2/view?usp=sharing

CAIIB  Elective IT pdf
https://drive.google.com/file/d/1x4RoW7L2Ub2VOFiAMVjjW7wV0aEtz6Gj/view?usp=sharing

FOREX OPERATIONS PDF

https://drive.google.com/file/d/19Qi4HjcLbca1X3P9ad_x3wESF1OOiqi7/view?usp=sharing

Certified Accounts and Audit pdf

https://drive.google.com/file/d/15hLGNIICS4p8IKUEsjAEPfmZJ-cm9lvO/view?usp=sharing

https://drive.google.com/file/d/1zoloZKNR2-UsBGIf0gw1ErhD0F2Y9mHW/view?usp=sharing





Tuesday, 31 July 2018

Import acts Information Technology (Amendment) Act, 2008

Import acts Information Technology (Amendment) Act, 2008
 Tampering with computer source Documents Sec.65
 Hacking with computer systems , Data Alteration Sec.66
 Sending offensive messages through communication service, etc Sec.66A
 Dishonestly receiving stolen computer resource or communication device Sec.66B
 Identity theft Sec.66C
 Cheating by personation by using computer resource Sec.66D
 Violation of privacy Sec.66E
 Cyber terrorism Sec.66F
 Publishing or transmitting obscene material in electronic form Sec .67
 Hackers scans the computer pre attack to identify - Vulnerability in the systemPunishment for
publishing or transmitting of material depicting children in sexually explicit act, etc.
 in electronic form Sec.67B
 Preservation and Retention of information by intermediaries Sec.67C
 Powers to issue directions for interception or monitoring or decryption of any information through
 any computer resource Sec.69
 Power to issue directions for blocking for public access of any information through any computer
 resource Sec.69A
 Power to authorize to monitor and collect traffic data or information through any computer resource
 for Cyber Security Sec.69B
 Un-authorized access to protected system Sec.70
 Penalty for misrepresentation Sec.71
 Breach of confidentiality and privacy Sec.72
 Publishing False digital signature certificates Sec.73
 Publication for fraudulent purpose Sec.74

Tuesday, 10 July 2018

Basic Principles of Information Security:

Basic Principles of Information Security:

For over twenty years, information security has held confidentiality, integrity and availability (known as the CIA triad) to be the core principles. There is continuous debate about extending this classic trio. Other principles such as Authenticity, Non-repudiation and accountability are also now becoming key considerations for practical security installations.

 Confidentiality: Confidentiality is the term used to prevent the disclosure of information to unauthorized individuals or systems. For example, a credit card transaction on the Internet requires the credit card number to be transmitted from the buyer to the merchant and from the merchant to a transaction processing network. The system attempts to enforce confidentiality by encrypting the card number during transmission, by limiting the places where it might appear (in databases, log files, backups, printed receipts, and so on), and by restricting access to the places where it is stored. If an unauthorized party obtains the card number in any way, a breach of confidentiality has occurred. Breaches of confidentiality take many forms like Hacking, Phishing, Vishing, Email-spoofing, SMS spoofing, and sending malicious code through email or Bot Networks, as discussed earlier.

 Integrity: In information security, integrity means that data cannot be modified without authorization. This is not the same thing as referential integrity in databases.
Integrity is violated when an employee accidentally or with malicious intent deletes important data files, when he/she is able to modify his own salary in a payroll database, when an employee uses programmes and deducts small amounts of money from all customer accounts and adds it to his/her own account (also called salami technique), when an unauthorized user vandalizes a web site, and so on.

On a larger scale, if an automated process is not written and tested correctly, bulk updates to a database could alter data in an incorrect way, leaving the integrity of the data compromised. Information security professionals are tasked with finding ways to implement controls that prevent errors of integrity.

 Availability: For any information system to serve its purpose, the information must be available when it is needed. This means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly. High availability systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades. Ensuring availability also involves preventing denial-of-service (DoS) and distributed denial-of service (DDoS) attacks.

 Authenticity: In computing, e-business and information security it is necessary to ensure that the data, transactions, communications or documents (electronic or physical) are genuine. It is also important for authenticity to validate that both parties involved are who they claim they are.

 Non-repudiation: In law, non-repudiation implies one's intention to fulfill one’s obligations under a contract / transaction. It also implies that a party to a transaction cannot deny having received or having sent an electronic record. Electronic commerce uses technology such as digital signatures and encryption to establish authenticity and non-repudiation.

In addition to the above, there are other security-related concepts and principles when designing a security policy and deploying a security solution. They include identification, authorization, accountability, and auditing.

 Identification: Identification is the process by which a subject professes an identity and accountability is initiated. A subject must provide an identity to a system to start the process of authentication, authorization and accountability. Providing an identity can be typing in a username, swiping a smart card, waving a proximity device, speaking a phrase, or positioning face, hand, or finger for a camera or scanning device. Proving a process ID number also represents the identification process. Without an identity, a system has no way to correlate an authentication factor with the subject.

 Authorization: Once a subject is authenticated, access must be authorized. The process of authorization ensures that the requested activity or access to an object is possible given the rights and privileges assigned to the authenticated identity. In most cases, the system evaluates an access control matrix that compares the subject, the object, and the intended activity. If the specific action is allowed, the subject is authorized. Else, the subject is not authorized.

 Accountability and auditability: An organization’s security policy can be properly enforced only if accountability is maintained, i.e., security can be maintained only if subjects are held accountable for their actions. Effective accountability relies upon the capability to prove a subject’s identity and track their activities. Accountability is established by linking a human to the activities of an online identity through the

security services and mechanisms of auditing, authorization, authentication, and identification. Thus, human accountability is ultimately dependent on the strength of the authentication process. Without a reasonably strong authentication process, there is doubt that the correct human associated with a specific user account was the actual entity controlling that user account when an undesired action took place.

IS AUDIT ...IT SECURITY


Introduction:

In the past decade, with the increased technology adoption by Banks, the complexities within the IT environment have given rise to considerable technology related risks requiring effective management.

This led the Banks to implement an Internal Control framework, based on various standards and its own control requirements and the current RBI guidelines. As a result, Bank’s management and RBI, need an assurance on the effectiveness of internal controls implemented and expect the IS Audit to provide an independent and objective view of the extent to which the risks are managed.

As a consequence, the nature of the Internal Audit department has undergone a major transformation and IS audits are gaining importance as key processes are automated, or enabled by technology. Hence, there is a need for banks to re-assess the IS Audit processes and ensure that IS Audit objectives are effectively met.

The scope of IS Audit includes:

 Determining effectiveness of planning and oversight of IT activities

 Evaluating adequacy of operating processes and internal controls

 Determining adequacy of enterprise-wide compliance efforts, related to IT policies and internal control procedures
 Identifying areas with deficient internal controls, recommend corrective action to address deficiencies and follow-up, to ensure that the management effectively implements the required actions

Following areas have been covered under this chapter:

 IS Audit: The organisation's structure, roles and responsibilities. The chapter identifies the IS Audit stakeholders, defines their roles, responsibilities and competencies required to adequately support the IS Audit function

 Audit Charter or Policy (to be included in the IS Audit): This point addresses the need to include IS Audit as a part of the Audit Charter or Policy

 Planning an IS Audit: This point addresses planning for an IS Audit, using Risk Based Audit Approach. It begins with an understanding of IT risk assessment concepts, methodology and defines the IS Audit Universe, scoping and planning an audit execution

 Executing an IS Audit: This describes steps for executing the audit, covering activities such as understanding the business process and IT environment, refining the scope and identifying internal controls, testing for control design and control objectives, appropriate audit evidence, documentation of work papers and conclusions of tests performed

 Reporting and Follow-up: Describes the audit summary and memorandum, the requirements for discussing findings with the management, finalising and submitting reports, carrying out follow-up procedures, archiving documents and ensuring continuous auditing

 Quality Review: This addresses the quality aspects which ensures supervision and exercising due care.

Information and network security very important


Introduction:

Information and the knowledge based on it have increasingly become recognized as ‘information assets’, which are vital enablers of business operations. Hence, they require organizations to provide adequate levels of protection. For banks, as purveyors of money in physical form or in bits and bytes, reliable information is even more critical and hence information security is a vital area of concern.

Robust information is at the heart of risk management processes in a bank. Inadequate data quality is likely to induce errors in decision making. Data quality requires building processes, procedures and disciplines for managing information and ensuring its integrity, accuracy, completeness and timeliness. The fundamental attributes supporting data quality should include accuracy, integrity, consistency, completeness, validity, timeliness, accessibility, usability and auditability. The data quality provided by various applications depends on the quality and integrity of the data upon which that information is built. Entities that treat information as a critical organizational asset are in a better position to manage it proactively.

Information security not only deals with information in various channels like spoken, written, printed, electronic or any other medium but also information handling in terms of creation, viewing, transportation, storage or destruction .This is in contrast to IT security which is mainly concerned with security of information within the boundaries of the network infrastructure technology domain. From an information security perspective, the nature and type of compromise is not as material as the fact that security has been breached.

To achieve effective information security governance, bank management must establish and maintain a framework to guide the development and maintenance of a comprehensive information security programme.


Basic Principles of Information Security:

For over twenty years, information security has held confidentiality, integrity and availability (known as the CIA triad) to be the core principles. There is continuous debate about extending this classic trio. Other principles such as Authenticity, Non-repudiation and accountability are also now becoming key considerations for practical security installations.

 Confidentiality: Confidentiality is the term used to prevent the disclosure of information to unauthorized individuals or systems. For example, a credit card transaction on the Internet requires the credit card number to be transmitted from the buyer to the merchant and from the merchant to a transaction processing network. The system attempts to enforce confidentiality by encrypting the card number during transmission, by limiting the places where it might appear (in databases, log files, backups, printed receipts, and so on), and by restricting access to the places where it is stored. If an unauthorized party obtains the card number in any way, a breach of confidentiality has occurred. Breaches of confidentiality take many forms like Hacking, Phishing, Vishing, Email-spoofing, SMS spoofing, and sending malicious code through email or Bot Networks, as discussed earlier.

 Integrity: In information security, integrity means that data cannot be modified without authorization. This is not the same thing as referential integrity in databases.
Integrity is violated when an employee accidentally or with malicious intent deletes important data files, when he/she is able to modify his own salary in a payroll database, when an employee uses programmes and deducts small amounts of money from all customer accounts and adds it to his/her own account (also called salami technique), when an unauthorized user vandalizes a web site, and so on.

On a larger scale, if an automated process is not written and tested correctly, bulk updates to a database could alter data in an incorrect way, leaving the integrity of the data compromised. Information security professionals are tasked with finding ways to implement controls that prevent errors of integrity.

 Availability: For any information system to serve its purpose, the information must be available when it is needed. This means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly. High availability systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades. Ensuring availability also involves preventing denial-of-service (DoS) and distributed denial-of service (DDoS) attacks.

 Authenticity: In computing, e-business and information security it is necessary to ensure that the data, transactions, communications or documents (electronic or physical) are genuine. It is also important for authenticity to validate that both parties involved are who they claim they are.

 Non-repudiation: In law, non-repudiation implies one's intention to fulfill one’s obligations under a contract / transaction. It also implies that a party to a transaction cannot deny having received or having sent an electronic record. Electronic commerce uses technology such as digital signatures and encryption to establish authenticity and non-repudiation.

In addition to the above, there are other security-related concepts and principles when designing a security policy and deploying a security solution. They include identification, authorization, accountability, and auditing.

 Identification: Identification is the process by which a subject professes an identity and accountability is initiated. A subject must provide an identity to a system to start the process of authentication, authorization and accountability. Providing an identity can be typing in a username, swiping a smart card, waving a proximity device, speaking a phrase, or positioning face, hand, or finger for a camera or scanning device. Proving a process ID number also represents the identification process. Without an identity, a system has no way to correlate an authentication factor with the subject.

 Authorization: Once a subject is authenticated, access must be authorized. The process of authorization ensures that the requested activity or access to an object is possible given the rights and privileges assigned to the authenticated identity. In most cases, the system evaluates an access control matrix that compares the subject, the object, and the intended activity. If the specific action is allowed, the subject is authorized. Else, the subject is not authorized.

 Accountability and auditability: An organization’s security policy can be properly enforced only if accountability is maintained, i.e., security can be maintained only if subjects are held accountable for their actions. Effective accountability relies upon the capability to prove a subject’s identity and track their activities. Accountability is established by linking a human to the activities of an online identity through the

security services and mechanisms of auditing, authorization, authentication, and identification. Thus, human accountability is ultimately dependent on the strength of the authentication process. Without a reasonably strong authentication process, there is doubt that the correct human associated with a specific user account was the actual entity controlling that user account when an undesired action took place.


BUSINESS CONTINUITY PLANNING ..IT SECURITY

BUSINESS CONTINUITY PLANNING



Introduction

The pivotal role that banking sector plays in the economic growth and stability, both at national and individual level, requires continuous and reliable services. Increased contribution of 24x7 electronic banking channels has increased the demand to formulate consolidated Business Continuity Planning (BCP) guidelines covering critical aspects of people, process and technology.

BCP forms a part of an organisation's overall Business Continuity Management (BCM) plan, which is the “preparedness of an organisation”, which includes policies, standards and procedures to ensure continuity, resumption and recovery of critical business processes, at an agreed level and limit the impact of the disaster on people, processes and infrastructure (includes IT); or to minimise the operational, financial, legal, reputational and other material consequences arising from such a disaster.

Effective business continuity management typically incorporates business impact analyses, recovery strategies and business continuity plans, as well as a governance programme covering a testing programme, training and awareness programme, communication and crisis management programme.



 Roles, Responsibilities and Organisational structure Board of Directors and Senior Management
A bank’s Board has the ultimate responsibility and oversight over BCP activity of a bank. The Board approves the Business Continuity Policy of a bank. Senior Management is responsible for overseeing the BCP process which includes:

 Determining how the institution will manage and control identified risks

 Allocating knowledgeable personnel and sufficient financial resources to implement the

BCP

 Prioritizing critical business functions

 Designating a BCP committee who will be responsible for the Business Continuity Management

 The top management should annually review the adequacy of the institution's business recovery, contingency plans and the test results and put up the same to the Board.
 The top management should consider evaluating the adequacy of contingency planning and their periodic testing by service providers whenever critical operations are outsourced.

 Ensuring that the BCP is independently reviewed and approved at least annually;

 Ensuring employees are trained and aware of their roles in the implementation of the
BCP

 Ensuring the BCP is regularly tested on an enterprise-wide basis

 Reviewing the BCP testing programme and test results on a regular basis and

 Ensuring the BCP is continually updated to reflect the current operating environment


Monday, 9 July 2018

Information Technology (Amendment) Act, 2008 full details

Information Technology (Amendment) Act, 2008
BRIEF HISTORY
The Indian Information Technology Act 2000 (“Act”) was a based on the Model Law on Electronic Commerce adopted by the United Nations Commission on International Trade Law[1]; the suggestion was that all States intending to enact a law for the impugned purpose, give favourable consideration to the said Model Law when they enact or revise their laws, in view of the need for uniformity of the law applicable to alternatives to paper-based methods of communication and storage of information. Thus the Act was enacted to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "electronic commerce", which involved the use of alternatives to traditional or paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies. Also it was considered necessary to give effect to the said resolution and to promote efficient delivery of Government services by means of reliable electronic records. The Act received the assent of the President on the 9th of June, 2000.

The Act was subsequently and substantially amended in 2006 and again in 2008 citing the following objectives:
• With proliferation of information technology enabled services such as e-governance, ecommerce and e-transactions, protection of personal data and information and implementation of security practices and procedures relating to these applications of electronic communications have assumed greater importance and they require harmonization with the provisions of the Information Technology Act. Further, protection of Critical Information Infrastructure is pivotal to national security, economy, public health and safety, so it has become necessary to declare such infrastructure as a protected system so as to restrict its access.
• A rapid increase in the use of computer and internet has given rise to new forms of crimes like publishing sexually explicit materials in electronic form, video voyeurism and breach of confidentiality and leakage of data by intermediary, e-commerce frauds like personation commonly known as Phishing, identity theft and offensive messages through communication services. So, penal provisions are required to be included in the Information Technology Act, the Indian Penal Code, the Indian Evidence Act and the Code of Criminal Procedure to prevent such crimes.
• The United Nations Commission on International Trade Law (UNCITRAL) in the year 2001 adopted the Model Law on Electronic Signatures. The General Assembly of the United Nations by its resolution No. 56/80, dated 12th December, 2001, recommended that all States accord favorable consideration to the said Model Law on Electronic Signatures. Since the digital signatures are linked to a specific technology under the existing provisions of the Information Technology Act, it has become necessary to provide for alternate technology of electronic signatures for bringing harmonization with the said Model Law.
• The service providers may be authorized by the Central Government or the State Government to set up, maintain and upgrade the computerized facilities and also collect, retain appropriate service charges for providing such services at such scale as may be specified by the Central Government or the State Government.

Wednesday, 4 July 2018

Information Technology (Amendment) Act, 2008 full details

Information Technology (Amendment) Act, 2008
BRIEF HISTORY
The Indian Information Technology Act 2000 (“Act”) was a based on the Model Law on Electronic Commerce adopted by the United Nations Commission on International Trade Law[1]; the suggestion was that all States intending to enact a law for the impugned purpose, give favourable consideration to the said Model Law when they enact or revise their laws, in view of the need for uniformity of the law applicable to alternatives to paper-based methods of communication and storage of information. Thus the Act was enacted to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "electronic commerce", which involved the use of alternatives to traditional or paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies. Also it was considered necessary to give effect to the said resolution and to promote efficient delivery of Government services by means of reliable electronic records. The Act received the assent of the President on the 9th of June, 2000.

Thursday, 28 June 2018

IT Security and ISB

IT Security and ISB::

Backup site: Is a location where an organisation can easily relocate following a disaster,
such as fire, flood, terrorist threat or other disruptive event. This is an integral part of the
disaster recovery plan and wider business continuity planning of an organisation. A backup
site can be another location operated by the organisation, or contracted via a company that
specialises in disaster recovery services. In some cases, an organisation will have an
agreement with a second organisation to operate a joint backup site.
There are three main types of backup sites:
• cold sites
• warm sites
• hot sites
Differences between them are determined by costs and effort required to implement each.
Another term used to describe a backup site is a work area recovery site.
1. Cold Sites: A cold site is the most inexpensive type of backup site for an organisation to
operate. It does not include backed up copies of data and information from the original
location of the organisation, nor does it include hardware already set up. The lack of
hardware contributes to the minimal start up costs of the cold site, but requires additional
time following the disaster to have the operation running at a capacity close to that prior to
the disaster.

Tuesday, 26 June 2018

ISB Recollected Questions and Exam Ti


ISB Recollected Questions and Exam Tips::::



Function of modem, which is not an OOP Lang.

 C C++ Java C#, questns abt DRP,

Trojan horse, sniffing, spoofing, availability, integrity, DBMS, preventive, corrective, detective controls, BCP