Download presentation
Presentation is loading. Please wait.
Published byAugustine Stone Modified over 9 years ago
1
IT Banking Advantages and Disadvantages
3
Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the bank. IT banking is more efficient, allowing users to transfer funds at a much higher speed then traditional transactions. The user is also given the ability to manage more then one bank account. The user has the ability to manage assets more effectively.
4
Disadvantages IT banking has more security issues due to spyware (key loggers) and hackers.
5
Examples of the security problems of online banking In 2004, 12 million Americans each had on average $1,200 stolen. Amounting to a total of over $2 billion in losses. 8.9 million Americans fell victim to identity theft in 2003. An average of $5316 a person was stolen.
6
EFT- What is it? An Electronic Fund Transfer (EFT) is a process whereby money is transferred from one place to another electronically
7
Advantages of EFTs The EFT procedure is a quick and efficient way to transfer money from one account to another. Once funds have been paid into an account using this procedure, it should be available immediately. If you are earning a salary then the funds may be added to your account automatically. It also allows for the use of automated tellers and the use of debit cards for the payment of goods and services.
8
Dis-advatages of EFTs
9
What is EFT POS?
10
What is EDI?
12
Phishing, hacking and Cloning
13
Phishing Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication The main form of phishing is through emails, which directs users to fake websites impersonating trusted sites, such as a bank’s website. It will then prompt the user to enter sensitive information such as their account number and password. Phishing now includes various scams such as the creation of fake websites, installation of Trojan horses by key loggers and screen capture.
14
Cloning of Credit Cards The cloning of credit cards involves the use of a pocket sized device which resembles a
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.