Security Considerations
Security Considerations
Security Considerations
Security
Considerations:
IT Security & IT Audit
For JAIIB Exam
www.Oliveboard.in
Table of Contents
Security Considerations
Customer Demands have sparked intense competition among banks and financial firms to
apply information technology to their operations to provide innovative goods and services at
lower prices. This is especially beneficial for those who are moving to new regions.
• Data and software: Data is a valuable resource that is required to keep a company
running. Inaccurate data can also have major consequences on decision-making. The
growing availability and usage of expert systems and the potential impact of erroneous
data can cause havoc with a company's operations.
• Infrastructure: Banks must make significant investments to adopt technology-based
tools and solutions. Computer and communication system functions require the same
hardware components as software and data.
• Peopleware: It refers to a group of people who are directly or indirectly responsible for
the administration and operation of digital systems.
Types of Threats
Accidental Damages: Computers and communications systems have many uses in banking
and other financial institutions. However, these systems are subject to harm caused by
human error and natural disasters.
- Human Error and Omissions
- Unreliable systems
- Environmental Hazards
Control Mechanism
Computer Audit
Banks can create effective, secure, and reliable computer systems by employing the right
control approaches outlined above. The control measures chosen vary for each bank,
reflecting the dangers that each bank faces and the expenses of connected security and
control processes.
Regular independent audits of security and control processes by auditor’s aid in the detection
of flaws before banking operations are jeopardized. Computer audit is a generic
organizational activity that evaluates asset protection, data integrity, the effectiveness of the
system, and system efficiency in computerized systems.
More than accuracy and compliance to systems and processes, the major focus of a computer
audit is on gathering and evaluating evidence to assure asset safeguarding, data integrity,
fulfilling organizational goals of computerization efficiently, and ensuring optimal resource
utilization.
o Asset security: This function guarantees that the assets, including hardware, software,
data files, and system documents, are fully safeguarded against fire, destruction,
editing, change, and damage, which might be accidental or intentional. Both will be
detrimental to the organization’s goals. Internal control systems should provide a
consistent basis for safeguarding computerized assets.
o Data integrity guarantees that data is accurate, consistent, and complete. This gets
Security Considerations: IT Security & IT Audit JAIIB Free e-book
more challenging when the system is used by several users who all have access to the
same data. This envisions a reliable system that ensures data integrity and
confidentiality.
o System efficiency focuses on whether the system is cost-effective and economical. The
resources used to make this system work, such as the cost of the machine, time,
peripherals, consumables, and so on, provide value to the total function.
o Obtain organizational objectives: This audit role guarantees that the organization's
objectives for implementing computerization or data processing systems are met. This
will aid in determining if operational efficiency and service functionality have improved
as a result of computerization. This is a continuous review of the system, as well as a
comparison of manual operations to computerized processes.
Information systems security (INFOSEC) is a broad topic in information technology (IT) that
focuses on securing computers, networks, and users. Almost all modern businesses and
people are concerned about the dangers of digital technology.
On many levels, banks must fulfil their clients' security requirements, whether with their
savings, using over-the-counter services in a branch office, withdrawing money from teller
machines, making deposits via the cash recycling system, or using online banking.
Security Considerations: IT Security & IT Audit JAIIB Free e-book
- Virus: A computer virus is a program or code that can reproduce and propagate from
one computer system to another. A computer virus can destroy or erase data on your
computer, and it may distribute the virus to other computers through an e-mail
application. It may potentially erase everything on your hard drive in the worst-case
scenario. Trojan viruses are one type of computer virus. Disk Killer, Stone Virus,
Sunday, Cascade, Nuclear, Word Concept, and other stealth viruses, worms, and
malware (malicious software)
- Phishing: It refers to bank clients receiving unsolicited emails seeking their login,
password, and other account information to access their account for whatever reason.
When customers click the links to submit their information, they are routed to a false
imitation of the genuine bank's website, unaware that fraud has happened. Following
that, the fraudster gained access to the customer's online bank account. After that
fraudster has access to the customer’s online bank account.
- Vishing: Vishing is the illegal activity of gaining access to private, personal, and
financial information using social engineering and Voice over IP (VoIP) for monetary
benefit. The name is a hybrid of the word’s "voice" and "phishing." A person pretends
to be a bank official calling to check account details in Vishing, and it's usually used to
steal credit card information.
- Malware: Malware is software code that has been maliciously designed. This sort of
malicious software is capable of the following:
o Theft of account information: Malware can grab your login credentials by capturing
keystrokes. It may also monitor and record other data required to verify an
individual's identification (like special images or words).
o Fake website substitution: Malware can produce web pages that look authentic but
are not. They replace a bank's website with a page that looks just like it except for
the word 'web address.' An attacker can use it to intercept user data. If a person
provides information, it is delivered without their awareness to both the bank and
the malicious attacker.
o Account hijacking: Malware may take over a browser and transmit money without
the user's awareness. When a person tries to log in to a bank website, the program
opens a covert browser window on the computer, signs in to the bank account,
examines the account balance, and initiates a secret financial transfer to the
intruder's account.
Security Considerations: IT Security & IT Audit JAIIB Free e-book
An information system (IS) audit, often known as an information technology (IT) audit,
reviews a company's IT infrastructure controls. These audits can be combined with a financial
statement audit, internal audit, or another type of attestation activity. It's the process of
gathering and analyzing evidence about a company's information systems, processes, and
operations. The use of obtained evidence may help determine if an organization’s information
systems are protecting assets, maintaining data integrity, and performing effectively and
efficiently to meet the organization’s goals and objectives.
Advantages of IS Audit
▪ It would indicate the dangers of being exposed to a digital world that already exists.
After identifying the risks, remedial action may be performed to safeguard an
organisation's interests.
▪ It would discourage people, workers, and users from engaging in data manipulation,
fraud, and other forms of corruption. The adoption of IS audit will detect an unwanted
action.
Evaluation Requirements
IT resources are always changing due to the creation of new applications, the procurement of
new hardware, the turnover of skilled staff, etc.
- Data
- Computer Software
- Computer Hardware
- System Development Process
- Disaster Recovery Management
- Communication channels
Many legal rules currently recognise the importance of signing paper-based records and
documents. Since then, computerised commerce has rendered paper transactions obsolete.
As a result, enactment/amendment of relevant legislation was required to facilitate e-
commerce.
On June 9, 2000, the Indian Parliament passed a comprehensive information technology bill,
which obtained the President's approval. Incidental adjustments to the following Acts have
been made as a result of the recognition given to electronic records, electronic documents,
and electronic signatures:
❖ The Indian Penal Code, 1860
❖ The Banker’s Bank Evidence Act, 1891
❖ The Indian Evidence Act, 1872
❖ The Reserve Bank of India Act, 1934
Security Considerations: IT Security & IT Audit JAIIB Free e-book
The term "electronic record," as well as the words "record" and "document," which appear in
different sections of the act, are intended to be included.
A "register" must comprise any list, data, or record of any entries kept in electronic form as
specified in the IT Act 2000 for Section 466 (relating to forgery of records), according to the
modification to the Indian Penal Code, 1860.
The Bankers Books Evidence Act of 1891 defines banker's books as ledgers, daybooks, cash
books, and account books used in the bank's regular operations.
The IT Act of 2000 revised the RBI Act of 1934, allowing the central board to issue
regulations for electronic cash transfers between banks or between banks and other financial
organizations.
Security Considerations: IT Security & IT Audit JAIIB Free e-book
JAIIB GLOSSORY
Capital Funds Equity contribution of owners. The basic approach of capital adequacy
framework is that a bank should have sufficient capital to provide a stable
resource to absorb any losses arising from the risks in its business.
Capital is divided into different tiers according to the characteristics /
qualities of each qualifying instrument.
Revaluation Revaluation reserves are a part of Tier-II capital. These reserves arise
reserves from revaluation of assets that are undervalued on the bank's books,
typically bank premises and marketable securities. The extent to which
the revaluation reserves can be relied upon as a cushion for unexpected
losses depends mainly upon the level of certainty that can be placed on
estimates of the market values of the relevant assets and the subsequent
deterioration in values under difficult market conditions or in a forced sale.
Capital reserves That portion of a company's profits not paid out as dividends to
shareholders. They are also known as undistributable reserves and are
ploughed back into the business.
Risk Weighted The notional amount of the asset is multiplied by the risk weight assigned
Asset to the asset to arrive at the risk weighted asset number. Risk weight for
different assets vary e.g. 0% on a Government Dated Security and 20%
on a AAA rated foreign bank etc.
CRAR (Capital to Capital to risk weighted assets ratio is arrived at by dividing the capital of
Risk Weighted the bank with aggregated risk weighted assets for credit risk, market risk
Assets Ratio) and operational risk. The higher the CRAR of a bank the better
capitalized it is.
Net operating Operating profit before provision minus provision for loan losses,
profit depreciation in investments, write off and other provisions.
Return on Asset Return on Assets (ROA) is a profitability ratio which indicates the net
(ROA)- After Tax profit (net income) generated on total assets. It is computed by dividing
net income by average total assets. Formula- (Profit after tax/Av. Total
assets) *100
Net Interest The NII is the difference between the interest income and the interest
Income (NII) expenses.
Liquid Assets Liquid assets consist of: cash, balances with RBI, balances in current
accounts with banks, money at call and short notice, inter-bank
placements due within 30 days and securities under "held for trading" and
"available for sale" categories excluding securities that do not have ready
market.
Venture Capital A fund set up for the purpose of investing in start-up businesses that is
Fund perceived to have excellent growth prospects but does not have access
to capital markets.
Held Till Maturity The securities acquired by the banks with the intention to hold them up to
(HTM) maturity.
Yield to maturity The Yield to maturity (YTM) is the yield promised to the bondholder on
(YTM) or Yield the assumption that the bond will be held to maturity and coupon
payments will be reinvested at the YTM. It is a measure of the return of
the bond.
CRR Cash reserve ratio is the cash parked by the banks in their specified
current account maintained with RBI.
SLR Statutory liquidity ratio is in the form of cash (book value), gold (current
market value) and balances in unencumbered approved securities.
More
Download Here
JAIIB Free PDFs
Join JAIIB
Selection Course - 2022
Enroll Now
Your One-Stop Interact With Peers Stay Updated With Ensure you are
Destination For All & Experts, Exchange All JAIIB/ CAIIB Online prepared to pass your
Exam Related Score & Improve Your Classes & Get Free CAIIB and JAIIB exams
Information & Preparation. Resources. with the right
Preparation Follow Us On information. Click the
Resources. Telegram below link to join
Join Us!
Explore Now Explore Now Explore Now Explore Now