December 15, 2019

IT in Financial Services (DAIBB)


Contents

Ransomware
Spyware
Phishing
Malware
VIRUS
Spamming
LAN, MAN and WAN
Difference between Internet and Intranet
Database vs Flat File
Ascii Codes
E-governance
OCR
OMR
Comparison Chart Primary Vs Secondary Memory
Computer memory and types
SWIFT for Electronic Funds Transfers
Unicode
CHIPS
Functions of Operating System
DBMS
Application and Uses of Database Management System (DBMS)
What does Disaster Recovery Site (DR Site) mean?
What does Data Center mean?
Data Warehouse
Cache Memory
Enterprise resource planning (ERP)
Smart Card
Digital Signature
What Is Business Continuity Planning (BCP)?
Stand Alone ATMs
Microcomputer System
Firewall
CIB
Network operating system
Difference between System Software and Application Software
Cyber Crime and Internet Security
Digital Bangladesh
Vision 2021
Audit Trail
Classification Of Computers By Size And Capacity
Computer Number Systems and its types
Comprehensive Security System for banks


Ransomware

Ransomware is a type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion, in which it encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them.[1][2][3][4] In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem – and difficult to trace digital currencies such as Ukash or Bitcoin and other cryptocurrency are used for the ransoms, making tracing and prosecuting the perpetrators difficult.

Ransomware attacks are typically carried out using a Trojan that is disguised as a legitimate file that the user is tricked into downloading or opening when it arrives as an email attachment. However, one high-profile example, the "WannaCry worm", travelled automatically between computers without user interaction.[5]

Spyware

Spyware is a software that aims to gather information about a person or organization, sometimes without their knowledge, and send such information to another entity without the consumer's consent. Furthermore, spyware asserts control over a device without the consumer's knowledge, sending confidential information to another entity with the consumer's consent, through cookies.[1]

Spyware is mostly classified into four types: adware, system monitors, tracking cookies, and trojans;[2] examples of other notorious types include digital rights management capabilities that "phone home", keyloggers, rootkits, and web beacons.

Spyware is mostly used for the stealing information and storing Internet users' movements on the Web and serving up pop-up ads to Internet users. Whenever spyware is used for malicious purposes, its presence is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users.

While the term spyware suggests software that monitors a user's computing, the functions of spyware can extend beyond simple monitoring. Spyware can collect almost any type of data, including personal information like internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with a user's control of a computer by installing additional software or redirecting web browsers. Some spyware can change computer settings, which can result in slow Internet connection speeds, un-authorized changes in browser settings, or changes to software settings.

Phishing

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.[1][2] Typically carried out by email spoofing[3] or instant messaging,[4] it often directs users to enter personal information at a fake website which matches the look and feel of the legitimate site.[5]

Phishing is an example of social engineering techniques being used to deceive users. Users are often lured by communications purporting to be from trusted parties such as social web sites, auction sites, banks, online payment processors or IT administrators.[6]

Attempts to deal with phishing incidents include legislation, user training, public awareness, and technical security measures (the latter being due to phishing attacks frequently exploiting weaknesses in current web security).[7]

Malware

Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server, client, or computer network[1][2] (by contrast, software that causes unintentional harm due to some deficiency is typically described as a software bug). A wide variety of types of malware exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, and scareware.

Programs are also considered malware if they secretly act against the interests of the computer user. For example, at one point Sony music Compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying, but which also reported on users' listening habits, and unintentionally created extra security vulnerabilities.[3]

A range of antivirus software, firewalls and other strategies are used to help protect against the introduction of malware, to help detect it if it is already present, and to recover from malware-associated malicious activity and attacks.[4]

VIRUS

A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.[1] When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.[2][3]

Virus writers use social engineering deceptions and exploit detailed knowledge of security vulnerabilities to initially infect systems and to spread the virus. The vast majority of viruses target systems running Microsoft Windows,[4][5][6] employing a variety of mechanisms to infect new hosts,[7] and often using complex anti-detection/stealth strategies to evade antivirus software.[8][9][10][11] Motives for creating viruses can include seeking profit (e.g., with ransomware), desire to send a political message, personal amusement, to demonstrate that a vulnerability exists in software, for sabotage and denial of service, or simply because they wish to explore cybersecurity issues, artificial life and evolutionary algorithms.[12]

Computer viruses currently cause billions of dollars' worth of economic damage each year,[13] due to causing system failure, wasting computer resources, corrupting data, increasing maintenance costs, stealing personal information etc. In response, free, open-source antivirus tools have been developed, and an industry of antivirus software has cropped up, selling or freely distributing virus protection to users of various operating systems.[14] As of 2005, even though no currently existing antivirus software was able to uncover all computer viruses (especially new ones), computer security researchers are actively searching for new ways to enable antivirus solutions to more effectively detect emerging viruses, before they have already become widely distributed.[15]

Spamming

Spamming is the use of messaging systems to send an unsolicited message (spam), especially advertising, as well as sending messages repeatedly on the same website. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social spam, spam mobile apps,[1] television advertising and file sharing spam. It is named after Spam, a luncheon meat, by way of a Monty Python sketch about a restaurant that has Spam in every dish and where patrons annoyingly chant "Spam" over and over again.[2][3]

Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, servers, infrastructures, IP ranges, and domain names, and it is difficult to hold senders accountable for their mass mailings. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have been forced to add extra capacity to cope with the volume. Spamming has been the subject of legislation in many jurisdictions.[4]. A person who creates spam is called a spammer.[5]

LAN, MAN and WAN

The Network allows computers to connect and communicate with different computers via any medium. LAN, MAN and WAN are the three major types of the network designed to operate over the area they cover. There are some similarities and dissimilarities between them. One of the major differences is the geographical area they cover, i.e. LAN covers the smallest area; MAN covers an area larger than LAN and WAN comprises the largest of all.


Local Area Network (LAN) –
LAN or Local Area Network connects network devices in such a way that personal computer and workstations can share data, tools and programs. The group of computers and devices are connected together by a switch, or stack of switches, using a private addressing scheme as defined by the TCP/IP protocol. Private addresses are unique in relation to other computers on the local network. Routers are found at the boundary of a LAN, connecting them to the larger WAN.

Data transmits at a very fast rate as the number of computers linked are limited. By definition, the connections must be high speed and relatively inexpensive hardware (Such as hubs, network adapters and Ethernet cables). LANs cover smaller geographical area (Size is limited to a few kilometers) and are privately owned. One can use it for an office building, home, hospital, schools, etc. LAN is easy to design and maintain. A Communication medium used for LAN has twisted pair cables and coaxial cables. It covers a short distance, and so the error and noise are minimized.

Early LAN’s had data rates in the 4 to 16 Mbps range. Today, speeds are normally 100 or 1000 Mbps. Propagation delay is very short in a LAN. The smallest LAN may only use two computers, while larger LANs can accommodate thousands of computers. A LAN typically relies mostly on wired connections for increased speed and security, but wireless connections can also be part of a LAN. The fault tolerance of a LAN is more and there is less congestion in this network. For example : A bunch of students playing Counter Strike in the same room (without internet).

Metropolitan Area Network (MAN) –
MAN or Metropolitan area Network covers a larger area than that of a LAN and smaller area as compared to WAN. It connects two or more computers that are apart but resides in the same or different cities. It covers a large geographical area and may serve as an ISP (Internet Service Provider). MAN is designed for customers who need a high-speed connectivity. Speeds of MAN ranges in terms of Mbps. It’s hard to design and maintain a Metropolitan Area Network.

The fault tolerance of a MAN is less and also there is more congestion in the network. It is costly and may or may not be owned by a single organization. The data transfer rate and the propagation delay of MAN is moderate. Devices used for transmission of data through MAN are: Modem and Wire/Cable. Examples of a MAN are the part of the telephone company network that can provide a high-speed DSL line to the customer or the cable TV network in a city.

Wide Area Network (WAN) –
WAN or Wide Area Network is a computer network that extends over a large geographical area, although it might be confined within the bounds of a state or country. A WAN could be a connection of LAN connecting to other LAN’s via telephone lines and radio waves and may be limited to an enterprise (a corporation or an organization) or accessible to the public. The technology is high speed and relatively expensive.

There are two types of WAN: Switched WAN and Point-to-Point WAN. WAN is difficult to design and maintain. Similar to a MAN, the fault tolerance of a WAN is less and there is more congestion in the network. A Communication medium used for WAN is PSTN or Satellite Link. Due to long distance transmission, the noise and error tend to be more in WAN.

WAN’s data rate is slow about a 10th LAN’s speed, since it involves increased distance and increased number of servers and terminals etc. Speeds of WAN ranges from few kilobits per second (Kbps) to megabits per second (Mbps). Propagation delay is one of the biggest problems faced here. Devices used for transmission of data through WAN are: Optic wires, Microwaves and Satellites. Example of a Switched WAN is the asynchronous transfer mode (ATM) network and Point-to-Point WAN is dial-up line that connects a home computer to the Internet.

Conclusion –
There are many advantages of LAN over MAN and WAN, such as LAN’s provide excellent reliability, high data transmission rate, they can easily be managed, and shares peripheral devices too. Local Area Network cannot cover cities or towns and for that Metropolitan Area Network is needed, which can connect city or a group of cities together. Further, for connecting Country or a group of Countries one requires Wide Area Network.

Difference between Internet and Intranet

Generally, most of people confused between internet and intranet. While there is exist lots of differences to differentiate them.

Internet: Internet is used to connect different network of computers simultaneously. It is a public network therefore anyone can access the internet. In internet, there are multiple users and it provides unlimited number of information to the users.

Intranet: Intranet is the type of internet which is used by privately. It is a private network therefore anyone can’t access intranet. In intranet, there are limited number of users and it provides limited number of information to its users.

Now, we shall see the difference between internet and intranet:

S.NO      INTERNET         INTRANET
1.            Internet is used to connect different network of computers simultaneously.--Intranet is owned by private firms.
2.            In internet, there are multiple users.--In intranet, there are limited users.
3.            Internet is unsafe.--Intranet is safe.
4.            In internet, there are more number of visitors.--In intranet, there are less number of visitors.
5.            Internet is a public network.--Intranet is a private network.
6.            Anyone can access Internet.--In this, anyone can’t access the Intranet.
7.            Internet provides unlimited information.--Intranet provides limited information.

Database vs Flat File

Flat File Databases: Flat file databases are typically plain text files that store one record per line, with record fields delimited by whitespace or a delimiting character. Flat file databases can be read directly by a variety of software applications.

Relational Database: In addition to the data tables, relational databases use "indexes" to quickly find records based on search criteria. Relational databases generally require a relational database management system (RDBMS) to manage and access the data.

1.       Databases can handle querying tasks, so you don't have to walk over files manually. Databases can handle very complicated queries.
2.       Databases can handle indexing tasks, so if tasks like get record with id = x can be VERY fast
3.       Databases can handle multiprocess/multithreaded access.
4.       Databases can handle access from network
5.       Databases can watch for data integrity
6.       Databases can update data easily (see 1) )
7.       Databases are reliable
8.       Databases can handle transactions and concurrent access
9.       Databases + ORMs let you manipulate data in very programmer friendly way.

Ascii Codes

Pronounced ask-ee, ASCII is the acronym for the American Standard Code for Information Interchange. It is a code for representing 128 English characters as numbers, with each letter assigned a number from 0 to 127. For example, the ASCII code for uppercase M is 77. Most computers use ASCII codes to represent text, which makes it possible to transfer data from one computer to another.

E-governance

Electronic-governance (e-governance in short) involves the use of Information and Communication Technology (ICT) and its numerous applications by the government for the provision of information and e-services (that is services by electronic means) to the citizens of the country. Broadly speaking, e-governance can be referred to as the uses and applications of ICT in public administration to conduct processes to effectively manage data and information to enhance public service delivery for empowerment of the citizens. Digital developments of recent years like online services, big data, social media, mobile apps, cloud computing etc. now influence people and the government tremendously.

Use of e-governance can make public administration fast and effective, provide better services, and respond to the demands of transparency and accountability. It can help the government to go green by effective management of natural resources aiding sustainability to environment. E-governance stimulates economic growth and promotes social inclusion of disabled and vulnerable sections of society. E-governance can provide benefits in the form of new employment, better health, better education, knowledge sharing, skills developments and capacity building for sustainable development. Quick and fast e-services eliminate middlemen and save both time and money. Without such online services, our cities and towns would have turned into more difficult places to live and the transport services would have been impossible to manage.

This short article highlights difference between e-governance and e-government presents our achievements in ICT and e-governance and examines our status in global perspective and suggests steps to be taken for improvement of global status of Bangladesh in e-governance and e-government.

OCR

Optical character recognition or optical character reader (OCR) is the electronic or mechanical conversion of images of typed, handwritten or printed text into machine-encoded text, whether from a scanned document, a photo of a document, a scene-photo (for example the text on signs and billboards in a landscape photo) or from subtitle text superimposed on an image (for example from a television broadcast).[1]

Widely used as a form of information entry from printed paper data records – whether passport documents, invoices, bank statements, computerized receipts, business cards, mail, printouts of static-data, or any suitable documentation – it is a common method of digitizing printed texts so that they can be electronically edited, searched, stored more compactly, displayed on-line, and used in machine processes such as cognitive computing, machine translation, (extracted) text-to-speech, key data and text mining. OCR is a field of research in pattern recognition, artificial intelligence and computer vision.

Early versions needed to be trained with images of each character, and worked on one font at a time. Advanced systems capable of producing a high degree of recognition accuracy for most fonts are now common, and with support for a variety of digital image file format inputs.[2] Some systems are capable of reproducing formatted output that closely approximates the original page including images, columns, and other non-textual components.

OMR

Optical mark recognition (also called optical mark reading and OMR) is the process of capturing human-marked data from document forms such as surveys and tests. They are used to read questionnaires, multiple choice examination paper in the form of lines or shaded areas.

OMR test form, with registration marks and drop-out colors, designed to be scanned by dedicated OMR device
Many traditional OMR devices work with a dedicated scanner device that shines a beam of light onto the form paper. The contrasting reflectivity at predetermined positions on a page is then used to detect these marked areas because they reflect less light than the blank areas of the paper.

Some OMR devices use forms that are preprinted onto "transoptic" paper and measure the amount of light which passes through the paper; thus a mark on either side of the paper will reduce the amount of light passing through the paper.

In contrast to the dedicated OMR device, desktop OMR software allows a user to create their own forms in a word processor and print them on a laser printer. The OMR software then works with a common desktop image scanner with a document feeder to process the forms once filled out.

OMR is generally distinguished from optical character recognition (OCR) by the fact that a complicated pattern recognition engine is not required. That is, the marks are constructed in such a way that there is little chance of not reading the marks correctly. This does require the image to have high contrast and an easily recognizable or irrelevant shape. A related field to OMR and OCR is the recognition of barcodes, such as the UPC bar code found on product packaging.

Comparison Chart Primary Vs Secondary Memory

BASIS FOR COMPARISON
PRIMARY MEMORY
SECONDARY MEMORY
Basic
Primary memory is directly accessible by Processor/CPU.
Secondary memory is not directly accessible by CPU.
Altered Name
Main memory.
Auxiliary memory.
Data
Instructions or data to be currently executed are copied to main memory.
Data to be permanently stored is kept in secondary memory.
Volatility
Primary memory is usually volatile.
Secondary memory is non-volatile.
Formation
Primary memories are made of semiconductors.
Secondary memories are made of magnetic and optical material.
Access Speed
Accessing data from primary memory is faster.
Accessing data from secondary memory is slower.
Access
Primary memory is accessed by the data bus.
Secondary memory is accessed by input-output channels.
Size
The computer has a small primary memory.
The computer has a larger secondary memory.
Expense
Primary memory is costlier than secondary memory.
Secondary memory is cheaper than primary memory
Memory
Primary memory is an internal memory.
Secondary memory is an external memory.


Computer memory and types

Definition of Primary Memory
Primary memory is the main memory of computer system. The instructions that have to be currently executed is copied to the primary memory because CPU can directly access the data from primary memory. Accessing data from primary memory is faster as it is an internal memory and processor accesses data from primary memory using data bus.



Primary Memory
The primary memory is usually volatile in nature which means data in primary memory does not exist if not saved, in case the power failure occurs. The primary memory is semiconductor memory and is more expensive than secondary memory. The primary memory capacity is limited in computer and is always smaller than secondary memory.

Primary memory can be divided into two types of memory that are RAM (Random Access Memory) and ROM (Read Only Memory).

RAM is a both read and write memory. The data which has to be currently processed is kept in RAM which can be quickly accessed by the CPU. RAM is volatile and loses data if the power is switched off. RAM can be static or dynamic.

ROM is a read only memory; its content can not be altered. It has the instructions that are used when the system is booted up. ROM is a non-volatile memory i.e. it retains its content even if the power is switched off. The types of ROM are PROM, EPROM and EEPROM.

Definition of Secondary Memory
Secondary memory is an auxiliary memory of the computer. The data that has to be permanently stored is kept in secondary memory. The CPU can not directly access the data in secondary memory. The data has to be initially copied to primary memory then only it can be processed by CPU. Hence, accessing data from secondary memory is slower. The secondary memory can be accessed using the input-output channel.Secondary MemoryThe secondary memory is nonvolatile in nature, which means that the content of the secondary memory exist even if the power is switched off. The secondary memory is magnetic memory or optical memory and it available at cheaper rates as compared to the primary memory.

Secondary memory is available in bulk and always larger than primary memory. A computer can even work without secondary memory as it an external memory. The examples of secondary memory are the hard disk, floppy disk, CD, DVD, etc.

SWIFT for Electronic Funds Transfers

Need to transfer money overseas? Today, it is easy to walk into a bank and transfer money anywhere around the globe, but how does this happen? Behind most international money and security transfers is the Society for Worldwide Interbank Financial Telecommunications (SWIFT) system. SWIFT is a vast messaging network used by banks and other financial institutions to quickly, accurately, and securely send and receive information, such as money transfer instructions.

Every day, nearly 10,000 SWIFT member institutions send approximately 24 million messages on the network. In this article, we will explore what SWIFT does, how it works, and how it makes money.

Inside a SWIFT Transaction
SWIFT is a messaging network that financial institutions use to securely transmit information and instructions through a standardized system of codes.

SWIFT assigns each financial organization a unique code that has either eight characters or 11 characters. The code is interchangeably called the bank identifier code (BIC), SWIFT code, SWIFT ID, or ISO 9362 code. To understand how the code is assigned, let’s look at Italian bank UniCredit Banca, headquartered in Milan. It has the 8-character SWIFT code UNCRITMM.

First four characters: the institute code (UNCR for UniCredit Banca)
Next two characters: the country code (IT for the country Italy)
Next two characters: the location/city code (MM for Milan)
 Last three characters: optional, but organizations use it to assign codes to individual branches. (The UniCredit Banca branch in Venice may use the code UNCRITMMZZZ.)
Assume a customer of a Bank of America branch in New York wants to send money to his friend who banks at the UniCredit Banca branch in Venice. The New York customer can walk into his Bank of America branch with his friend’s account number and UnicaCredit Banca’s unique SWIFT code for its Venice branch. Bank of America will send a payment transfer SWIFT message to the UniCredit Banca branch over the secure SWIFT network. Once Unicredit Banca receives the SWIFT message about the incoming payment, it will clear and credit the money to the Italian friend’s account.

As powerful as SWIFT is, keep in mind that it is only a messaging system – SWIFT does not hold any funds or securities, nor does it manage client accounts.

The World Before SWIFT
Prior to SWIFT, Telex was the only available means of message confirmation for international funds transfer. Telex was hampered by low speed, security concerns, and a free message format--in other words, Telex did not have a unified system of codes like SWIFT to name banks and describe transactions. Telex senders had to describe every transaction in sentences which were then interpreted and executed by the receiver. This led to many human errors.

To circumvent these problems, the SWIFT system was formed in 1974. Seven major international banks formed a cooperative society to operate a global network that would transfer financial messages in a secure and timely manner.

Unicode

Unicode is a computing industry standard for the consistent encoding, representation, and handling of text expressed in most of the world's writing systems. The standard is maintained by the Unicode Consortium, and as of May 2019 the most recent version, Unicode 12.1, contains a repertoire of 137,994 characters (consisting of 137,766 graphic characters, 163 format characters and 65 control characters) covering 150 modern and historic scripts, as well as multiple symbol sets and emoji. The character repertoire of the Unicode Standard is synchronized with ISO/IEC 10646, and both are code-for-code identical.

The Unicode Standard consists of a set of code charts for visual reference, an encoding method and set of standard character encodings, a set of reference data files, and a number of related items, such as character properties, rules for normalization, decomposition, collation, rendering, and bidirectional display order (for the correct display of text containing both right-to-left scripts, such as Arabic and Hebrew, and left-to-right scripts).[1][2]

Unicode's success at unifying character sets has led to its widespread and predominant use in the internationalization and localization of computer software. The standard has been implemented in many recent technologies, including modern operating systems, XML, Java (and other programming languages), and the .NET Framework.

CHIPS

The Clearing House Interbank Payments System (CHIPS) is a United States private clearing house for large-value transactions. By 2015 it was settling well over US$1.5 trillion a day in around 250,000 interbank payments in cross border and domestic transactions. Together with the Fedwire Funds Service (which is operated by the Federal Reserve Banks), CHIPS forms the primary U.S. network for large-value domestic and international USD payments where it has a market share of around 96%. CHIPS transfers are governed by Article 4A of Uniform Commercial Code.

Unlike the Fedwire system which is part of a regulatory body, CHIPS is owned by the financial institutions that use it. For payments that are less time-sensitive in nature, banks typically prefer to use CHIPS instead of Fedwire, as CHIPS is less expensive (both by charges and by funds required). One of the reasons is that Fedwire is a real-time gross settlement system, while CHIPS allows payments to be netted.

Functions of Operating System

Prerequisite – Introduction of Operating System – Set 1
An Operating System acts as a communication bridge (interface) between the user and computer hardware. The purpose of an operating system is to provide a platform on which a user can execute programs in a convenient and efficient manner.

An operating system is a piece of software that manages the allocation of computer hardware. The coordination of the hardware must be appropriate to ensure the correct working of the computer system and to prevent user programs from interfering with the proper working of the system.

What is Operating System?
An operating system is a program on which application programs are executed and acts as an communication bridge (interface) between the user and the computer hardware.

The main task an operating system carries out is the allocation of resources and services, such as allocation of: memory, devices, processors and information. The operating system also includes programs to manage these resources, such as a traffic controller, a scheduler, memory management module, I/O programs, and a file system.

Important functions of an operating System:

Security –The operating system uses password protection to protect user data and similar other techniques. it also prevents unauthorized access to programs and user data.

Control over system performance – Monitors overall system health to help improve performance. records the response time between service requests and system response to have a complete view of the system health. This can help improve performance by providing important information needed to troubleshoot problems.

Job accounting – Operating system Keeps track of time and resources used by various tasks and users, this information can be used to track resource usage for a particular user or group of user.

Error detecting aids – Operating system constantly monitors the system to detect errors and avoid the malfunctioning of computer system.

Coordination between other software and users –Operating systems also coordinate and assign interpreters, compilers, assemblers and other software to the various users of the computer systems.

Memory Management –The operating system manages the Primary Memory or Main Memory. Main memory is made up of a large array of bytes or words where each byte or word is assigned a certain address. Main memory is a fast storage and it can be accessed directly by the CPU. For a program to be executed, it should be first loaded in the main memory. An Operating System performs the following activities for memory management:
It keeps tracks of primary memory, i.e., which bytes of memory are used by which user program. The memory addresses that have already been allocated and the memory addresses of the memory that has not yet been used. In multi programming, the OS decides the order in which process are granted access to memory, and for how long. It Allocates the memory to a process when the process requests it and deallocates the memory when the process has terminated or is performing an I/O operation.

Processor Management –In a multi programming environment, the OS decides the order in which processes have access to the processor, and how much processing time each process has. This function of OS is called process scheduling. An Operating System performs the following activities for processor management.
Keeps tracks of the status of processes. The program which perform this task is known as traffic controller. Allocates the CPU that is processor to a process. De-allocates processor when a process is no more required.

Device Management –An OS manages device communication via their respective drivers. It performs the following activities for device management. Keeps tracks of all devices connected to system. designates a program responsible for every device known as the Input/Output controller. Decides which process gets access to a certain device and for how long. Allocates devices in an effective and efficient way. Deallocates devices when they are no longer required.

File Management –A file system is organized into directories for efficient or easy navigation and usage. These directories may contain other directories and other files. An Operating System carries out the following file management activities. It keeps track of where information is stored, user access settings and status of every file and more… These facilities are collectively known as the file system.

DBMS

A database is an organized collection of data, generally stored and accessed electronically from a computer system. Where databases are more complex they are often developed using formal design and modeling techniques.

The database management system (DBMS) is the software that interacts with end users, applications, and the database itself to capture and analyze the data. The DBMS software additionally encompasses the core facilities provided to administer the database. The sum total of the database, the DBMS and the associated applications can be referred to as a "database system". Often the term "database" is also used to loosely refer to any of the DBMS, the database system or an application associated with the database.

Computer scientists may classify database-management systems according to the database models that they support. Relational databases became dominant in the 1980s. These model data as rows and columns in a series of tables, and the vast majority use SQL for writing and querying data. In the 2000s, non-relational databases became popular, referred to as NoSQL because they use different query languages.

Application and Uses of Database Management System (DBMS)

Railway Reservation System: Database is required to keep record of ticket booking, train’s departure and arrival status. Also if trains get late then people get to know it through database update.

Library Management System: There are thousands of books in the library so it is very difficult to keep record of all the books in a copy or register. So DBMS used to maintain all the information relate to book issue dates, name of the book, author and availability of the book.

Banking: We make thousands of transactions through banks daily and we can do this without going to the bank. So how banking has become so easy that by sitting at home we can send or get money through banks. That is all possible just because of DBMS that manages all the bank transactions.

Universities and colleges: Examinations are done online today and universities and colleges maintain all these records through DBMS. Student’s registrations details, results, courses and grades all the information are stored in database.

Credit card transactions: For purchase of credit cards and all the other transactions are made possible only by DBMS. A credit card holder knows the importance of their information that all are secured through DBMS.

Social Media Sites: We all are on social media websites to share our views and connect with our friends. Daily millions of users signed up for these social media accounts like facebook, twitter, pinterest and Google plus. But how all the information of users are stored and how we become able to connect to other people, yes this all because DBMS.

Telecommunications: Any telecommunication company cannot even think about their business without DBMS. DBMS is must for these companies to store the call details and monthly post paid bills.

Finance: Those days have gone far when information related to money was stored in registers and files. Today the time has totally changed because there are lots f thing to do with finance like storing sales, holding information and finance statement management etc.

Military: Military keeps records of millions of soldiers and it has millions of files that should be keep secured and safe. As DBMS provides a big security assurance to the military information so it is widely used in militaries. One can easily search for all the information about anyone within seconds with the help of DBMS.

Online Shopping: Online shopping has become a big trend of these days. No one wants to go to shops and waste his time. Everyone wants to shop from home. So all these products are added and sold only with the help of DBMS. Purchase information, invoice bills and payment, all of these are done with the help of DBMS.

Human Resource Management: Big firms have many workers working under them. Human resource management department keeps records of each employee’s salary, tax and work through DBMS.

Manufacturing: Manufacturing companies make products and sales them on the daily basis. To keep records of all the details about the products like quantity, bills, purchase, supply chain management, DBMS is used.

Airline Reservation system: Same as railway reservation system, airline also needs DBMS to keep records of flights arrival, departure and delay status.

What does Disaster Recovery Site (DR Site) mean?

A disaster recovery site (DR site) is an alternative backup facility, usually IT in nature, that is used when a primary location becomes unusable due to failure or disaster. It contains equipment and infrastructure that can be temporarily used to manage business processes until the main site's functionality is fully restored.

What does Data Center mean?

A data center is a repository that houses computing facilities like servers, routers, switches and firewalls, as well as supporting components like backup equipment, fire suppression facilities and air conditioning. A data center may be complex (dedicated building) or simple (an area or room that houses only a few servers). Additionally, a data center may be private or shared.

Data Warehouse

In computing, a data warehouse (DW or DWH), also known as an enterprise data warehouse (EDW), is a system used for reporting and data analysis, and is considered a core component of business intelligence.[1] DWs are central repositories of integrated data from one or more disparate sources. They store current and historical data in one single place[2] that are used for creating analytical reports for workers throughout the enterprise.[3]

The data stored in the warehouse is uploaded from the operational systems (such as marketing or sales). The data may pass through an operational data store and may require data cleansing[2] for additional operations to ensure data quality before it is used in the DW for reporting.

Extract, transform, load (ETL) and Extract, load, transform (E-LT) are the two main approaches used to build a data warehouse system.

Cache Memory

Cache Memory is a special very high-speed memory. It is used to speed up and synchronizing with high-speed CPU. Cache memory is costlier than main memory or disk memory but economical than CPU registers. Cache memory is an extremely fast memory type that acts as a buffer between RAM and the CPU. It holds frequently requested data and instructions so that they are immediately available to the CPU when needed.

Cache memory is used to reduce the average time to access data from the Main memory. The cache is a smaller and faster memory which stores copies of the data from frequently used main memory locations. There are various different independent caches in a CPU, which store instructions and data.

Levels of memory:
Level 1 or Register –
It is a type of memory in which data is stored and accepted that are immediately stored in CPU. Most commonly used register is accumulator, Program counter, address register etc.
Level 2 or Cache memory –
It is the fastest memory which has faster access time where data is temporarily stored for faster access.
Level 3 or Main Memory –
It is memory on which computer works currently. It is small in size and once power is off data no longer stays in this memory.
Level 4 or Secondary Memory –
It is external memory which is not as fast as main memory but data stays permanently in this memory.

Enterprise resource planning (ERP)

Enterprise resource planning (ERP) is the integrated management of main business processes, often in real-time and mediated by software and technology.

ERP is usually referred to as a category of business management software — typically a suite of integrated applications—that an organization can use to collect, store, manage, and interpret data from many business activities.

ERP provides an integrated and continuously updated view of core business processes using common databases maintained by a database management system. ERP systems track business resources—cash, raw materials, production capacity—and the status of business commitments: orders, purchase orders, and payroll. The applications that make up the system share data across various departments (manufacturing, purchasing, sales, accounting, etc.) that provide the data.[1] ERP facilitates information flow between all business functions and manages connections to outside stakeholders.[2]

Enterprise system software is a multibillion-dollar industry that produces components supporting a variety of business functions. IT investments have become the largest category of capital expenditure in United States-based businesses over the past[which?] decade. Though early ERP systems focused on large enterprises, smaller enterprises increasingly use ERP systems.[3]

The ERP system integrates varied organizational systems and facilitates error-free transactions and production, thereby enhancing the organization's efficiency. However, developing an ERP system differs from traditional system development.[4] ERP systems run on a variety of computer hardware and network configurations, typically using a database as an information repository.[5]

Smart Card

A smart card, chip card, or integrated circuit card (ICC) is a physical electronic authorization device, used to control access to a resource. It is typically a plastic credit card-sized card with an embedded integrated circuit (IC) chip.[1] Many smart cards include a pattern of metal contacts to electrically connect to the internal chip. Others are contactless, and some are both. Smart cards can provide personal identification, authentication, data storage, and application processing.[2] Applications include identification, financial, mobile phones (SIM), public transit, computer security, schools, and healthcare. Smart cards may provide strong security authentication for single sign-on (SSO) within organizations. Numerous nations have deployed smart cards throughout their populations.

The universal integrated circuit card, or SIM card, is also a type of smart card. As of 2015, 10.5 billion smart card IC chips are manufactured annually, including 5.44 billion SIM card IC chips.[3]

Digital Signature

A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature, where the prerequisites are satisfied, gives a recipient very strong reason to believe that the message was created by a known sender (authentication), and that the message was not altered in transit (integrity).[1]

Digital signatures are a standard element of most cryptographic protocol suites, and are commonly used for software distribution, financial transactions, contract management software, and in other cases where it is important to detect forgery or tampering.

Digital signatures are often used to implement electronic signatures, which includes any electronic data that carries the intent of a signature,[2] but not all electronic signatures use digital signatures.[3][4] In some countries, including South Africa,[5] the United States, Algeria,[6] Turkey, India,[7] Brazil, Indonesia, Mexico, Saudi Arabia,[8] Uruguay,[9] Switzerland and the countries of the European Union,[10][11] electronic signatures have legal significance.

Digital signatures employ asymmetric cryptography. In many instances they provide a layer of validation and security to messages sent through a non-secure channel: Properly implemented, a digital signature gives the receiver reason to believe the message was sent by the claimed sender. Digital seals and signatures are equivalent to handwritten signatures and stamped seals.[12] Digital signatures are equivalent to traditional handwritten signatures in many respects, but properly implemented digital signatures are more difficult to forge than the handwritten type. Digital signature schemes, in the sense used here, are cryptographically based, and must be implemented properly to be effective. Digital signatures can also provide non-repudiation, meaning that the signer cannot successfully claim they did not sign a message, while also claiming their private key remains secret. Further, some non-repudiation schemes offer a time stamp for the digital signature, so that even if the private key is exposed, the signature is valid.[citation needed] Digitally signed messages may be anything representable as a bitstring: examples include electronic mail, contracts, or a message sent via some other cryptographic protocol.

What Is Business Continuity Planning (BCP)?

Business continuity planning (BCP) is the process involved in creating a system of prevention and recovery from potential threats to a company. The plan ensures that personnel and assets are protected and are able to function quickly in the event of a disaster. The BCP is generally conceived in advance and involves input from key stakeholders and personnel.

BCP involves defining any and all risks that can affect the company's operations, making it an important part of the organization's risk management strategy. Risks may include natural disasters—fire, flood, or weather-related events—and cyber attacks. Once the risks are identified, the plan should also include:
1.       Determining how those risks will affect operations
2.       Implementing safeguards and procedures to mitigate the risks
3.       Testing procedures to ensure they work
4.       Reviewing the process to make sure that it is up to date

BCPs are an important part of any business. Threats and disruptions mean a loss of revenue and higher costs, which leads to a drop in profitability. And businesses can't rely on insurance alone because it doesn't cover all the costs and the customers who move to the competition.

Understanding Business Continuity Planning (BCP)
Businesses are prone to a host of disasters that vary in degree from minor to catastrophic. Business continuity planning is typically meant to help a company continue operating in the event of major disasters such as fires. BCPs are different from a disaster recovery plan, which focuses on the recovery of a company's IT system after a crisis.

Consider a finance company based in a major city. It may put a BCP in place by taking steps including backing up its computer and client files offsite. If something were to happen to the company's corporate office, its satellite offices would still have access to important information.An important point to note is that BCP may not be as effective if a large portion of the population is affected, as in the case of a disease outbreak.

Developing a Business Continuity Plan
There are several steps many companies must follow to develop a solid BCP. They include:

Business Impact Analysis: Here, the business will identify functions and related resources that are time-sensitive. (More on this below.)
Recovery: In this portion, the business must identify and implement steps to recover critical business functions.
Organization: A continuity team must be created. This team will devise a plan to manage the disruption.
Training: The continuity team must be trained and tested. Members of the team should also complete exercises that go over the plan and strategies.

Stand Alone ATMs

Stand Alone ATMs are not connected with any ATM network- hence their transactions are restricted to the ATM’s branch and link branches only or you may take this another way as, the ATM which allows transaction of particular bank only. Just like post office ATM which allows transaction only through ATM Card of post office, ATM Cards issued by other banks are not working with post office ATM.

The opposite of Stand alone ATMs are Networked ATMs, which are connected on the ATM Network. Just like ATM of Nationalized bank.

Microcomputer System


Firewall

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.[1] A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet.[2]

Firewalls are often categorized as either network firewalls or host-based firewalls. Network firewalls filter traffic between two or more networks and run on network hardware. Host-based firewalls run on host computers and control network traffic in and out of those machines.

CIB

The Credit Information Bureau (CIB) of Bangladesh Bank is responsible among others for collection, processing
and maintaining an updated database of credit related information supplied by participants, institutions which extend credit i.e. banks (Act.14, 1991), Financial Institutions (Act.27, 1993), HBFC (Presidential Order 7, 1973), ICB (ICB Order 40, 1976). The CIB was set up on 18 August 1992 in the Bangladesh Bank. One of the objectives behind setting up of the CIB was to minimise the extent of default loans by providing the participants with timely reports on credit information based on the enquiry/request about the loan applicants so as to facilitate credit risk analysis by the banks/FIs and decide promptly on the loan applications.

Credit Information Bureau (CIB) was set up in Bangladesh Bank (BB) in the year 1992 with the objective of minimizing the extent of default credit1. CIB of BB collects credit related information of borrowers from banks and financial institutions (FIs) and maintain the information in its database. The banks and FIs can access online database of CIB and collect credit information of its customer, when needed. They use the information to analyze repayment behavior of customer and avoid financing to any defaulter.

Benefit/Uses/Necessity of CIB Report
1.       CIB report has substantial impact on decision making regarding sanctioning, renewal, rescheduling and adjustment of a credit facility by bank and FIs. It assists in knowing loan status and repayment behavior of a customer even he/she does not have any default investment/loan. It also facilitates in reducing loan-processing time, costs and probability of being default to a considerable extent.
2.       As per section 27KaKa of Bank Company Act, 1991, no bank or financial institution can extend any credit facility favoring a defaulter. To comply with the above requirement, banks collect information from CIB to ascertain default status of a customer (BRPD Circular 13, 2000). As per BRPD Circular 2 dated 16 January 2014 on single borrower exposure limit (large loan), Banks shall collect the loan information on their borrowers from Credit Information Bureau (CIB) of Bangladesh Bank before sanctioning, renewing or rescheduling loans in order to ensure that credit facilities are not being provided to defaulters.
3.       Information from CIB to be collected before taking effective steps on fresh loan-application of any borrower after receipt of the same or before renewal of regular loan account or rescheduling (CIB Circular 02, 1992 and CIB Circular 7, 1995).
4.       CIB Report is required even before allowing non-funded facilities like LC, bank guarantee (BRPD Circular 13, 2000).
5.       CIB Report should be collected though the customer provides 100% or more cash security against a facility. In fact, credit facility cannot be provided to a defaulter even if 100% or more cash margin is provided. As such, to avoid financing to a defaulter, CIB report should be obtained in such cases also.

Network operating system

A network operating system is a specialized operating system for a network device such as a router, switch or firewall. Historically operating systems with networking capabilities were described as network operating system, because they allowed personal computers (PCs) to participate in computer networks and shared file and printer access within a local area network (LAN). This description of operating systems is now largely historical, as common operating systems include a network stack to support a client–server model.

Difference between System Software and Application Software

S.No.
System Software
Application Software
1.
System software is used for operating computer hardware.
Application software is used by user to perform specific task.
2.
System softwares are installed on the computer when operating system is installed.
Application softwares are installed according to user’s requirements.
3.
In general, the user does not interact with system software because it works in the background.
In general, the user interacts with application sofwares.
4.
System software can run independently. It provides platform for running application softwares.
Application software can’t run independently. They can’t run without the presence of system software.
5.
Some examples of system softwares are compiler, assembler, debugger, driver, etc.
Some examples of application softwares are word processor, web browser, media player, etc.

Cyber Crime and Internet Security

Hacking:  It is an illegal practice by which a hacker breaches the computer’s security system of someone for personal interest.

Unwarranted mass-surveillance: Mass surveillance means surveillance of a substantial fraction of a group of people by the authority especially for the security purpose, but if someone does it for personal interest, it is considered as cybercrime.

Child pornography: It is one of the most heinous crimes that is brazenly practiced across the world. Children are sexually abused and videos are being made and uploaded on the Internet.

Child grooming: It is the practice of establishing an emotional connection with a child especially for the purpose of child-trafficking and child prostitution.

Copyright infringement: If someone infringes someone’s protected copyright without permission and publishes that with his own name, is known as copyright infringement.

Money laundering: Illegal possession of money by an individual or an organization is known as money laundering. It typically involves transfers of money through foreign banks and/or legitimate business. In other words, it is the practice of transforming illegitimately earned money into the legitimate financial system.

Cyber-extortion: When a hacker hacks someone’s email server, or computer system and demands money to reinstate the system, it is known as cyber-extortion.

Cyber-terrorism: Normally, when someone hacks government’s security system or intimidates government or such a big organization to advance his political or social objectives by invading the security system through computer networks, it is known as cyber-terrorism.

Cyber Security: Cyber security is a potential activity by which information and other communication systems are protected from and/or defended against the unauthorized use or modification or exploitation or even theft.
Likewise, cyber security is a well-designed technique to protect computers, networks, different programs, personal data, etc., from unauthorized access.

Cyber Security: All sorts of data whether it is government, corporate, or personal need high security; however, some of the data, which belongs to the government defense system, banks, defense research and development organization, etc. are highly confidential and even small amount of negligence to these data may cause great damage to the whole nation. Therefore, such data need security at a very high level.

How to Secure Data? Let us now discuss how to secure data. In order to make your security system strong, you need to pay attention to the following −
1.       Security Architecture
2.       Network Diagram
3.       Security Assessment Procedure
4.       Security Policies
5.       Risk Management Policy
6.       Backup and Restore Procedures
7.       Disaster Recovery Plan
8.       Risk Assessment Procedures

Digital Bangladesh

Digital Bangladesh implies the broad use of computers, and embodies the modern philosophy of effective and useful use of technology in terms of implementing the promises in education, health, job placement and poverty reduction. The party underscored a changing attitude, positive thinking and innovative ideas for the successes of “Digital Bangladesh”.[4][5]

The philosophy of “Digital Bangladesh” comprises ensuring people's democracy and human rights, transparency, accountability, establishing justice and ensuring delivery of government services to the citizens of Bangladesh through maximum use of technology, with the ultimate goal being the overall improvement of the daily lifestyle of general people. This includes all classes of people and does not discriminate people in terms of technology.

The government further emphasized on the four elements of “Digital Bangladesh Vision” which are human resource development, people involvement, civil services and use of information technology in business.

Vision 2021

Vision 2021 was the political manifesto of the Bangladesh Awami League party before winning the National Elections of 2008. It stands as a political vision of Bangladesh for the year 2021, the golden jubilee of the nation. The policy has been criticized as a policy emblematic of technological optimism in the context of Bangladesh and the state repression of media, low internet penetration, inadequate electricity generation.[1] The Vision 2021 is an articulation of where this nation needs to be in 2021 – the year which marks the 50th anniversary of Bangladesh's independence.

Goals
The main goal is for Bangladesh to become a middle income country where poverty will be completely eradicated.

1. Democracy and effective parliaments
2. Political framework, decentralization of power & people's participation
3. Good governance through establishing rule of law and avoiding political partisanship
4. Transformation of political culture
5. A society free from corruption
6. Empowerment and equal rights for women
7. Economic development & initiative
a. Meeting basic needs
b. Population and labour force
c. Alleviation of poverty
d. Food & nutrition
e. Health care center
f. Education
g. Industry
h. Energy security
i. Infrastructural development
j. Housing
k. Environment
l. Water resources
8. Bangladesh in the global arena
a. Achievements of liberation
b. Culture
c. Foreign policy
d. Good Religion

Audit Trail

A record showing who has accessed a computer system and what operations he or she has performed during a given period of time. Audit trails are useful both for maintaining security and for recovering lost transactions. Most accounting systems and database management systems include an audit trail component. In addition, there are separate audit trail software products that enable network administrators to monitor use of network resources.

Classification Of Computers By Size And Capacity

Computer by capacity
Today computers come in a wide variety of sizes, capabilities, designs and what have you, that it makes it difficult for one to easily classify them. We have types of computers today ranging from:

Tiny computers embedded in consumer devices and appliances,
Pocket-sized computers and mobile phones that perform limited computing functionalities,
The powerful and versatile desktop and portable computers used in homes and businesses,
To the super powerful computers used for high demanding computing capabilities like controlling a country’s defense systems.
Generally, computers are classified into many categories based on their size, capacity, purpose and type. In this post we talk about classification of computers based on the size and capacity.

Classification Of Computers By Size And Capacity
When classified according to size and capacity, the following types of computers can be identified: supercomputers, mainframe computers, minicomputers, microcomputers and embedded computers.

Supercomputers
Supercomputers are the most powerful and physically the largest by size. These are systems designed to process huge amounts of data and the fastest supercomputers can perform over one trillion calculations in a second. Supercomputers

Supercomputers like the Cray T90 system has thousands of processors. Supercomputers cost very high and are therefore only used by large corporations, government agencies and universities that can afford them. Because of their extraordinary speed, accuracy and processing power, supercomputers are well suited for solving highly complex problems and performing tasks that demand huge amounts of calculations. The following functions are some of those performed by supercomputers: space exploration and sending of astronauts into space; controlling missile guidance systems and satellites for national defense; oil exploration; hosting extremely complex web sites and decision support systems for organizations; etc.

Mainframe Computers
Mainframe computers are very large often filling an entire room and can process thousands of millions of instructions per second. They are used in large Mainframe Computers private and government organizations like insurance companies and banks where many people need frequent access to information. In a mainframe environment, users connect to the mainframe through the many terminals wired to the mainframe. Mainframes are capable of supporting hundreds to thousands of users simultaneously. Some of the functions performed by a mainframe include: flight scheduling, reservations and ticketing for an airline; government agencies such as the Internal Revenue Service, Electoral Commission and the Census Bureau use mainframes to track information about large populations, vote computations, individual tax records, payroll, etc.; many large grocery and retail companies use mainframes to register sales, update stock and manage inventory levels.

Minicomputers
Minicomputers are Minicomputer such smaller than mainframes and are also less expensive. Sometimes referred to as Midrange Server or Midrange Computer, they are typically larger, more powerful and more expensive than desktop computers. Midrange computers are usually used by small and medium-sized businesses as their servers. Users connect to the server through a network by using desktop computers, notebooks, thin clients or dumb terminals. They are also used by hospitals as well as in school computer laboratories.

Microcomputers
Microcomputers are the most frequently used type of computer. Also, known as Personal Computer (PC), a microcomputer is a small computer system designed to be used by one person at a time. The size of microcomputers range from those that can fit on a desktop, inside a briefcase, or even into a shirt pocket. The various sizes of microcomputers can be grouped into desktop computers and portable computers.

Desktop computers are the conventional ones which fit on a desk Microcomputers and usually consists of a system unit, monitor, keyboard, and a mouse. These computers have desktop cases designed to be placed horizontally on a desk’s surface, usually with the monitor sitting on top of the system unit. Today the most common type of desktop computer uses a system unit called the Tower which is designed to sit vertically on the floor or the table.
Portable computers are microcomputers designed to be carried easily around in the hand, bag, Portable Computers briefcase or pocket depending on their sizes. They run on rechargeable batteries and also use an adapter which allows them to be plugged into a power outlet to be recharged. Portable computers are essential for many workers like salespeople, agents and managers who may be off-sites and in remote locations but need computing and communications resources as they travel. Many students are also increasingly purchasing portable computers as their primary home computers. The types of portable computers that are about the size of a standard paper notebook are called Laptop or Notebook Portable Computers. They are fully functioning computers that open to reveal a screen and a keyboard. Another type of portable computer is the Tablet PC or simply Tablet which is contained in a touchscreen panel. Most Tablets are a little smaller and weigh less than the average laptop. Earlier Tablets required stylus but modern ones are operated by fingers and a stylus is an option.  Handheld computers are also portable. They are about the size of a pocket calculator and have built-in keyboard or thumb pad. Some also accept input through digital pen or touch. Examples are the Personal Digital Assistant (PDA) and the Smart phone or Mobile phone.

Embedded Computers
Embedded computers are fixed into products designed to perform specific functions. Such products are mostly household appliances and cars. Embedded computers are put into household appliances and electronic devices like dishwashers, microwaves, washing machines and coffee makers in order to perform designated tasks. Electronic devices around the home like watches, answering machines, sewing machines, DVD players, television sets, pen, necklace and watch recorders and so forth, also make use of embedded computers. Cars also use embedded computers to assist with diagnosing faults, notifying the user of important conditions like under inflated tires, an oil filter that need changing, and controlling the use of airbag and other safety devices.

Computer Number Systems and its types

What are the number systems in Computer?
Number systems are the technique to represent numbers in the computer system architecture, every value that you are saving or getting into/from computer memory has a defined number system.

Computer architecture supports following number systems.
1.       Binary number system
2.       Octal number system
3.       Decimal number system
4.       Hexadecimal (hex) number system
1) Binary Number System
A Binary number system has only two digits that are 0 and 1. Every number (value) represents with 0 and 1 in this number system. The base of binary number system is 2, because it has only two digits.

2) Octal number system
Octal number system has only eight (8) digits from 0 to 7. Every number (value) represents with 0,1,2,3,4,5,6 and 7 in this number system. The base of octal number system is 8, because it has only 8 digits.

3) Decimal number system
Decimal number system has only ten (10) digits from 0 to 9. Every number (value) represents with 0,1,2,3,4,5,6, 7,8 and 9 in this number system. The base of decimal number system is 10, because it has only 10 digits.

4) Hexadecimal number system
A Hexadecimal number system has sixteen (16) alphanumeric values from 0 to 9 and A to F. Every number (value) represents with 0,1,2,3,4,5,6,,7,8,9,A,B,C,D,E and F in this number system. The base of hexadecimal number system is 16, because it has 16 alphanumeric values. Here A is 10, B is 11, C is 12, D is 13, E is 14 and F is 15.

Table of the Numbers Systems with Base, Used Digits, Representation, C language representation:

Number system
Base
Used digits
Example
C Language assignment
Binary
2
0,1
(11110000)2
int val=0b11110000;
Octal
8
0,1,2,3,4,5,6,7
(360)8
int val=0360;
Decimal
10
0,1,2,3,4,5,6,7,8,9
(240)10
int val=240;
Hexadecimal
16
0,1,2,3,4,5,6,7,8,9,
A,B,C,D,E,F
(F0)16
int val=0xF0;

Comprehensive Security System for banks

Banks and financial institutions are generally heavily-protected facilities, with basic physical security measures such as armed guards, the bank vault, and panic buttons in case of emergency. But banks are also making use of the latest in security technology to ensure safety for bank staff, customers, and their assets. From high-end, around-the-clock video surveillance with analytics, to advanced access control systems providing easy, secure access to high-value areas of the bank, there’s a host of options to bolster security systems for banks.

1. Video Surveillance & Monitoring
CCTV security camera systems are the backbone of a financial institution’s security system. Comprehensive video surveillance, covering all parts of the bank building, serves as both a layer of both deterrence and as a virtual record of everything that happens within the bank.

Prominently placed cameras – covering doors, exits, teller windows and all-important rooms in the bank – can remind potential thieves or burglars they are being watched, and that their face is being recorded on camera.
While it’s helpful to place cameras prominently, if tampering is a concern, it may be wiser to leave some concealed, making them hard to disable. Visible cameras should also be placed high enough to deter and avoid tampering or disabling by dedicated burglars, who may seek to disable them before an attempted robbery.

Live video monitoring of video feeds is also vital. Many financial institutions already have in-house security and monitoring personnel watching the video feed for suspicious behavior and incidents, and ready to respond in real-time. Smaller banks might, however, use an external monitoring company that can surveil video feeds from a distance and dispatch authorities within minutes, giving them the manpower and security of a full-team, without the size.

To get the most out of their CCTV surveillance system, most banks will likely want to install 4k security cameras. 4k UHD will give the resolution and clarity needed to make out details such as faces, as opposed to grainy, unusable footage.
Video analytics could also play a role in security when budget and logistics allow. As with retail, where they help track and identify suspicious behavior and high-risk individuals, video analytics and software can help security officers notice suspicious behaviors and incidents, getting an early jump on the situation.

2. Video Surveillance Storage Needs
Financial institutions generally have detailed comprehensive logs of video surveillance recording in case of emergencies. While no laws or regulations determining the amount of time a bank must keep their surveillance footage exist, most institutions keep it on site for the customary 90 days, which is long enough to cover most incidents that arise. Some banks will opt for longer archives – 180 days or more – for added peace-of-mind.

After 90 or 180 days, video footage is often archived on external storage server, where it can be accessed for as far as several years down the road. This is, however, dependent on the particular bank’s preferences, needs and budget.

Depending on if the bank records in Full 1080p HD, if they’ve made the switch to 4k resolution cameras, how many cameras they utilize, and of course what bitrate and frame rate the system records in, the bank could be looking at between a few dozen terabytes of footage and several hundred for long term storage– which could require an entire server-based system.

3. Burglar Alarms & Monitoring
Security doesn’t stop when banking hours end. The safety of customers’ and bank assets depends on vigilant, around-the-clock prevention efforts. In addition to on-site rounds and monitoring from security guards, it’s also vital for banks to have proper alarm systems and monitoring. Video surveillance will continue to record throughout the night, covering the perimeter of the building, doors, windows, back entrances, the vault, as well as all hallways and the main lobby. The CCTV system should be connected to both any internal security suite with on-duty personnel and to an external monitoring service that will be able to contact the police in case of a break in.

In addition, to prevent break-ins, banks will have airtight and comprehensive burglar alarms, incorporating door and window contacts, as well as glass break detectors, to cover every potential point-of-entry. Additionally, smoke and fire detectors should be installed to protect against physical damage and disasters.

4. Access Control Systems
Modern access control systems are one area where banks are beginning to make upgrades and improvements, in addition to physical locks, keys and bolts. Role-based access control systems allowing and disallowing employees access to certain parts of the building – behind the teller counter, vault areas, offices –provide a more advanced form of protection from burglars and thieves trying to break in to high-value areas. Proximity swipe cards give employees an easy and convenient way to get in and out, while biometric credentials provide beefed up security for areas needing extra protection.

Access control parameters can be set to block employee access after the close of business hours, preventing inside jobs and late-night security breaches.

5. Other Security Measures
Additional security measures for banks include placing bulletproof glass in front of teller windows, and if budget allows, on building windows. There should, of course, be panic buttons and alarm triggers placed throughout staff areas and under teller windows, as are already found in most banks. It’s also important that each bank evaluate whether it’s better to have an audible or silent alarm, as an audible alarm could aggravate burglars further.

On a more virtual note, banks are integrating – and already make use of –

None of these systems, of course, replace the traditional feet-on-the-ground presence of security guards, who provide constant, vigilant overwatch of happenings on the bank floor and be the first to respond to incidents.

CBS

Core banking is a banking service provided by a group of networked bank branches where customers may access their bank account and perform basic transactions from any of the member branch offices.

Core banking is often associated with retail banking and many banks treat the retail customers as their core banking customers. Businesses are usually managed via the corporate banking division of the institution. Core banking covers basic depositing and lending of money.

Core banking functions will include transaction accounts, loans, mortgages and payments. Banks make these services available across multiple channels like automated teller machines, Internet banking, mobile banking and branches.[1]Banking software and network technology allows a bank to centralise its record keeping and allow access from any location.

Data Backup benefits

Banks and other financial institutions are organizations that interact with a significant number of consumers on a daily basis. Whether a person visits the physical bank location to deposit a check or tracks accounts through a mobile app, banks are a staple that govern a lot of what individuals are able to do. Financial institutions can benefit from backups for a few reasons, and they will need to seriously consider these systems if they wish to continue thriving.

Big target for data thieves
The financial sector is an area that's being hit particularly hard by data breaches. Everything from ransomware to phishing emails have been thrown at these organizations in the hopes of achieving a big payday, and some of the attacks have been successful. In early 2016, the U.S. Federal Financial Institutions Examination Council warned the industry about the flood of new threats stemming from ransomware. Infosecurity Magazine noted that most ransomware masquerades as an official-looking government sanction, and hackers gain $400,000 a month on average from using these techniques.

Personal financial data is a big target for hackers.Personal financial data is a big target for hackers.
Many organizations end up paying the fine to gain back data access because they see no other alternative. However, backups are the best answer to these threats. Since ransomware encrypts everything on a particular device, banks can simply wipe the hardware and restore it to working order using their backups. This thwarts the attacker and prevents the business from having to pay anything to access its information.

Disaster can strike at any time, "Regulations regarding data storage, maintenance and security have been put in place."

Emergencies can come in many forms, and it will be important for financial institutions to be ready for anything. In 2002, the Federal Reserve made a point to establish regulations in this sector in order for these organizations to recover quickly from a Sept. 11-type event. Network World reported that this initiative stemmed from a widespread halt of Wall Street processes that came as a result of the Sept. 11 fallout. Wall Street was unable to get back online due to inadequate backup plans, which affected all of its interconnected systems. To make it worse, many other financial institutions that had been impacted had not tested their backup systems, leaving them in the dark as well.

Regulations regarding data storage, maintenance and security have been put in place since then to ensure that financial institutions protect their information and are able to get systems up faster in an emergency. Not only did the Federal Reserve suggest adding rules about testing backups industry-wide, it also recommended a required two-hour recovery time. These rules alone serve as the basis for many other standards across sectors and have changed how banks handle their files. However, organizations cannot allow themselves to become lax in their efforts, and must maintain vigilance with their backup solutions as more threats emerge.

Banks are an essential part of everyday life, but if data is compromised, it can affect a significant number of people. In order to protect this information, financial institutions should look into backup solutions. These systems not only can help companies bounce back from attacks, they can also minimize the effect of disasters and support business continuity.

Electronic Document Storage and Retrieval System

A lot of people are often confused about the meaning and usefulness of an electronic document storage and retrieval system. This is quite simple; it is a means of storing your documents in a place different from your disk or hard drive at your home or office. With this, you will have the duplicate of your vital documents saved on an entirely different server that can be accessed via the internet.

There are many benefits attached to using this type of storage. On the general note, the major reason why people opt for this is to safeguard their very important documents against damage or theft. There are a number of ways this can happen. Your computer can develop physical or memory fault which may lead to loss of data and of course, unrecoverable. Also, such a loss can come in form of theft, house fire or flood. In this event, properties, including hard disks where vital documents might have been saved, can be lost.

One other reason why people opt for the electronic document storage and retrieval system is the convenience involved. The fact that your documents are accessible via the internet makes it possible for individuals to access these documents wherever they are provided that there is an internet connection. This is extremely useful for people who travel a lot or those who need to access documents while on a tour, vacation or visit.

Nevertheless, another major reason businesses and organizations do favor electronic document storage and retrieval system is the issue of compliance. On several occasions, companies are internally regulated in such a way that in order for them to satisfy some set of standards, there are a number of files that must be electronically available via the electronic system.

Similarly, the issue of the paper is another major reason why many offices and business opt for the electronic document storage and retrieval system. On some occasions, the sheer amount of paperwork in an office is overwhelming. Especially some businesses that operate in a leased apartment, there is a major problem of space confinement and it wouldn’t be economical to use the majority of the available spaces for storing papers. The usage of electronic storage system is the best way in this context to save as much as possible documents.

Not limited to this, the retrieval of documents from the electronic document storage and retrieval system is very much easier and faster when compared to searching through boxes and catalogs. In fact, a lot of offices are striving towards a paperless method of running the business.

Regardless of the above-mentioned benefits, the electronic document storage and retrieval system is a very good option to consider. By using this method, a lot of time, resources, and energy will be conserved. Thereafter, you will be sure of moving your business towards the maximum productivity. As you have seen above, there are lots of benefits attached to using the e-storage system.

No comments:

Post a Comment