Case Studies and Management Resources |
" Information Kiosks: It includes providing information regarding various products and services offered by the bank to its customers and others in general. The bank's site receives and answers queries of customers through e-mails. " Basic Internet Banking: It includes enabling customers to open new accounts, check account balance and pay utility bills. " E-commerce Banking: Banks function as electronic market places (e-market place) enabling customers to use their accounts for money transfers, bills payment, purchase and sale of securities and online real time purchases and payments. In a typical Internet banking transaction, customers' requests for online banking information are passed on from Web server to the bank's Internet banking server through the WWW interface. These requests pass through a firewall[1] before they reach the Internet banking server. Due to the use of SSL technology[2] , only authenticated requests reach the Internet banking server. The customer information database is stored on a bank's server, which is protected by the use of various security tools in addition to the firewall technology. The WWW interface is the only media of communication with the Internet banking server and Internet banking server is the only media of communication with the customer database, thus ensuring the safety of operation and customer data. When the customer requests reach the Internet banking server it passes the requests to the bank server hoarding customer database. The database provides the required information to the Internet banking server, which is in turn passed on to the web server, through the firewall, from where the customer is able to access it (Refer Figure I).This sort of architecture, known as the 'three-tiered architecture' (comprising of a web server, Internet banking server and customer database protected by firewalls) creates a controlled environment, which allows quick incorporation of Internet security technologies. A security analyzer constantly monitors login attempts and recognizes failures that could indicate a possible unauthorized attempt to log into an account. When such trends are observed, steps are automatically taken to prevent that account from being used. INTERNET BANKING TRANSACTION MECHANISM ICICI - INTERNET BANKING INITIATIVES
[1]
A system designed to prevent
unauthorized access to or from a private network. Firewalls can be implemented
in both hardware and software, or a combination of both. Firewalls are
frequently used to prevent unauthorized Internet users from accessing private
networks connected to the Internet, especially intranets. All messages that
enter or leave the Intranet pass through the firewall, which examines each
message and blocks those that do not meet the specified security criteria.
2010, ICMR (IBS Center for Management Research).All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, used in a spreadsheet, or transmitted in any form or by any means - electronic or mechanical, without permission.
To order copies, call +91- 8417- 236667 or write to ICMR,
| ||||||||||
|