Get premium membership and access questions with answers, video lessons as well as revision papers.
Security measures taken by business;
- Secure customer identification and authentication. Access to the e-banking service is
controlled through the use of a customer number and password. The e-banking serve
uses the combination of these two codes to uniquely identify each customer.
- Guarantee of maximum secrecy in the transmission of data. e-banking is
hosted on, and supported by, a system which uses the most powerful encryption
technology that is commercially available. The use of encryption guarantees that the
information exchanged between your system and the e-banking system remain
confidential and cannot be intercepted. Both the online submission of applications
for subscribing to internet banking services and the electronic transactions conducted
are protected using the highest encryption levels applied worldwide for this purpose.
- Digital certificates –the use of digital certificates which are issued by trusted third parties, allow
users to verify the identity of a system.
- Automatic log-out the e-banking service has been designed so as to log you out
ofthe system automatically, if the system has not been used for more than 5 minutes.
This precaution aims to provide you with relative security in case you forget to
disconnect, by preventing third parties from using the service in your place.
- Use of special purpose security software and mechanisms –maximum care
hasbeen taken to ensure the security of the network as well as of the systems that
support the service. In addition to encryption, the e-banking service is protected by
multiple, state-of-the-art, special purpose security software systems such as firewalls
and intrusion detection systems (IDs). At the same time, special emphasis has been
placed on physical security, and for this purpose access to the e-banking systems
allowed only to authorize employees of the bank.
- High availability with the aim to offer a continuous, uninterrupted service to
itscustomers, the banks have invested in technologies that ensure high availability levels
for the e-banking service.
- Continuous security audits and checks against electronic fraud –
forguaranteeing the best possible service to you, the bank conducts daily audits of the
e-banking infrastructure and application, checking for attempts or traces of security
threats or electronic fraud. In parallel, and in co-operation with companies
specializing in security, the banks conduct regular additional audits to confirm and
enhance the security of this particular infrastructure.
- Protection of personal data. Acquisition and processing of your personal data and account details
is performed by the banks with the utmost care and only to the extent required for the services provided. The banks continuously sees to it that your
personal data are secure, in compliance with Laws 2472/1997 and 2774/1999, and
with all additional ordinances, circulars and directives issued by the Hellenic Data
Protection Authority and by any other national or European Community authority.
- Security measures taken by individuals protect your e-banking service
password. Try to memorize your password, and destroy any document on which itis
printed. Customers are held liable for all the transactions conducted using the
customer numbers and passwords regardless of whether the natural persons who
conducted such transactions were the customers themselves or not. Therefore,
protecting your password is very important.
- Never disclose in any way whatsoever (e.g. orally, in writing, via e-mail) your password to third
parties.
- Password that you originally receive is valid only for the first time you log into the
system. After you enter your customer number and password for the first time, the
system will prompt you to change your password. Select a password that is difficult
to figure out; this should be composed of 6 to 8 digits, of which at least one should
be a letter of the alphabet. Avoid using your name, your date of birth or information
that is characteristic of you or of those close to you.
- If you believe that a third party may have found out your password, contact immediately the
Direct Banking Customer support centre.
- Check the digital certificate in order to be sure that you are connected to the e-
banking system. You should check the identity of the system by checking its digital
certificate.
- Check your account if you observe in your monthly account statement any activities
which do not remember to have made, contact immediately the Direct Banking
Customer Support.
- Follow the log-in and log-out procedure you should always follow the log-in and log-
out procedure for connecting to, and disconnecting from the e-banking system, especially
if you are using a computer that is also available to other users.
- Protect your PC against viruses –you should protect your PC against
computer viruses, which are mainly spreading through email messages, by installing an
anti-virus application on your PC. You should also remember to regularly update this
application in accordance with the instructions of its manufacturers.
- Configure your PC for Enhanced Security – this will assist to keep off hacker and any other
unauthorized user to the system.
gregorymasila answered the question on November 27, 2017 at 13:36
- During output design, the designer‘s ideas are put to test. Some ideas are essential while others are dictated by circumstances. Required:(i) State the general principles applied...(Solved)
During output design, the designer's ideas are put to test. Some ideas are essential while others are dictated by circumstances.
Required:
(i) State the general principles applied in output design.
(ii) Outline the ?Steps taken in designing an output.
Date posted: November 27, 2017. Answers (1)
- Describe the options available for the analyst to use when implementing an output(Solved)
Describe the options available for the analyst to use when implementing an output.
Date posted: November 27, 2017. Answers (1)
- Systems development projects are usually triggered by:(i) Problems(ii) Directives. Explain the meaning of these terms in the context of systems development.(Solved)
Systems development projects are usually triggered by:
(i) Problems
(ii) Directives
Explain the meaning of these terms in the context of systems development.
Date posted: November 27, 2017. Answers (1)
- State and explain the four major components of the information technology architecture component(Solved)
State and explain the four major components of the information technology architecture component.
Date posted: November 27, 2017. Answers (1)
- The e-business application development and deployment process involve some activities that should be properly managed for the e-business planning process to be completed successfully. List and...(Solved)
The e-business application development and deployment process involve some activities that should be properly managed for the e-business planning process to be completed successfully.
List and briefly explain these activities.
Date posted: November 27, 2017. Answers (1)
- The basic objective of user interface is to minimize the human error during data entry. Required (i) Explain the error control measures that should be incorporated into...(Solved)
The basic objective of user interface is to minimize the human error during data entry.
Required
(i) Explain the error control measures that should be incorporated into a user interface.
(ii) What are the implications of the error control measures in (i) above?
Date posted: November 27, 2017. Answers (1)
- Lack of historical data and prior knowledge of an information system makes it difficult to estimate the cost of an information systems project. Required:Formulate a checklist...(Solved)
Lack of historical data and prior knowledge of an information system makes it difficult to estimate the cost of an information systems project.
Required:
Formulate a checklist that could assist an organization in identifying, quantifying and evaluating information systems costs.
Date posted: November 27, 2017. Answers (1)
- What is meant by prototyping? Briefly comment on its advantages and disadvantages and explain how this approach is used.(Solved)
What is meant by prototyping? Briefly comment on its advantages and disadvantages and explain how this approach is used.
Date posted: November 27, 2017. Answers (1)
- Farmquip Ltd. designs and manufactures irrigation equipment. The irrigation equipment are sold to flower nationality. The company regards customer service, that is the ability to...(Solved)
Farmquip Ltd. designs and manufactures irrigation equipment. The irrigation equipments
are sold to flower nationality. The company regards customer service, that is the ability to
respond effectively and properly to service calls as critical to its success.
Initially, field engineers inspect faulty irrigation equipment. Currently three quarters of the
faulty irrigation equipment are referred to the repair centre, to be mended by the repair
centre.
Engineers, resulting in a turnaround time of up to 10 days. The company has decided to
investigate the possibility of carrying out more field repairs with the aid of a portable expert
system, in order to reduce the turnaround time.
The prototyping approach was used, and an evaluation of the final prototype made it clear
that an expert system used in conjunction with 11.1ptop microcomputer would improve the
situation to the extent that only 10% of irrigation equipment would need to be returned to
the repair centre, with majority of repairs being carried out at the customers‘ premises by the
field engineers.
Required
(a) Define the term expert system and explain how it could be of use in this context.
Date posted: November 27, 2017. Answers (1)
- Discuss the changes that would take place if the expert system was implemented in terms of position, status; tasks and responsibilities of engineers at the...(Solved)
Discuss the changes that would take place if the expert system was implemented in
terms of position, status; tasks and responsibilities of engineers at the company‘s
repair centre and in the field.
Date posted: November 27, 2017. Answers (1)
- You have been appointed the internal auditor of a bank. The bank has several computerized systems networked in a distributed network system. There is need...(Solved)
You have been appointed the internal auditor of a bank. The bank has several computerized
systems networked in a distributed network system. There is need to review the various
controls existing within the systems.
(a) Outline six main areas that the review should cover.
Date posted: November 27, 2017. Answers (1)
- Explain why you may have some difficulties in auditing distributed systems.(Solved)
Explain why you may have some difficulties in auditing distributed systems.
Date posted: November 27, 2017. Answers (1)
- Describe how you would carry out your audit procedures using the following computer assisted audit techniques (CAATs):(i) Parallel simulation (ii) Embedded Audit Module(Solved)
Describe how you would carry out your audit procedures using the following
computer assisted audit techniques (CAATs):
(i) Parallel simulation
(ii) Embedded Audit Module
Date posted: November 27, 2017. Answers (1)
- The firm you work for is in the process of designing a customer database in order to improve its debts management. Name any eight important customer...(Solved)
The firm you work for is in the process of designing a customer database in order to improve its debts management.
Name any eight important customer details that would constitute this database system.
Date posted: November 27, 2017. Answers (1)
- Locating computer hardware, software and information communication staff in one area realizes a number of benefits to an organization. Required:Explain the nature of the following advantages:(Solved)
Locating computer hardware, software and information communication staff in one area realizes a number of benefits to an organization.
Required:
Explain the nature of the following advantages:
Date posted: November 27, 2017. Answers (1)
- Explain the role of senior management during systems implementation(Solved)
Explain the role of senior management during systems implementation.
Date posted: November 27, 2017. Answers (1)
- The term computer describes a device made up of a combination of electronic and electro-mechanical components. By itself, a computer has no intelligence and is...(Solved)
The term computer describes a device made up of a combination of electronic and electro-mechanical components. By itself, a computer has no intelligence and is referred to as hardware which means simply the physical equipment. Tile hardware cannot be used, until it is connected to other elements,
all of which constitute the six parts-of a computer-based information system.
Required:
Describe the six components of a computer-based information system.
Date posted: November 27, 2017. Answers (1)
- Any communication network, such as a telephone system, can be connected to others. This is an example of connectivity, the ability to connect computers, telephones...(Solved)
Any communication network, such as a telephone system, can be connected to others. This is an example of connectivity, the ability to connect computers, telephones and other devices to other computers, other devices and sources of information. It is this connectivity that is the foundation of Information Age.
Connectivity has also made many activities possible.
Required:
Explain any four activities that have become possible because of connectivity.
Date posted: November 27, 2017. Answers (1)
- In a file set up or development process, the file‘s structure is defined and its contents identified. The four characteristics considered in defining the structure...(Solved)
In a file set up or development process, the file‘s structure is defined and its contents identified. The four characteristics considered in defining the structure and identifying the contents in a file set up or development process are; volatility, activity, size and growth.
Required:
(i) Using the example of a payroll file, explain the terms; volatility, activity, size and growth.
(ii) Explain how each of the characteristics in (i) above may influence decisions to do with a file structure design and in planning whether the mode of access should be sequential, indexed sequential or random.
Date posted: November 27, 2017. Answers (1)
- Organizations use different options of human computer interfaces such as GUI, command driven or special interfaces. Define GUI and state its advantages.(Solved)
Organizations use different options of human computer interfaces such as GUI, command driven or special interfaces. Define GUI and state its advantages.
Date posted: November 27, 2017. Answers (1)