রবিবার, ১০ নভেম্বর, ২০১৩

Cover and Table of Contents




[To buy, please contact: IBB @ +880 2 9137282, +880 2 9137283, +880 2 9137284]


Table of Contents

Module-A: Introduction to IT and Computer Systems

Chapter-1: Computer & Information Technology

1.         What is Computer?
2.         What is Information Technology?
3.         Importance and use of IT

Chapter-2: Electronic Banking and Online Banking

1.         Electronic Banking
1.1.      ATM
1.2.      POS terminal
1.3.      Internet Banking
1.4.      sms Banking
1.5.      Alert Banking
1.6.      IVR
2.         Advantages and disadvantages of Electronic Banking
2.1.      Advantages
2.2.      Disadvantages
3.         Online Banking
3.1.      Advantages
3.2.      Disadvantages

Chapter-3: Introduction to m-Commerce, Mobile Banking, e-commerce and MIS

1.         m-Commerce
2.         Mobile Banking
3.         e-Commerce
4.         MIS

Chapter-4: Computer Hardware

1.         History of Development of Computer
2.         Generation of Computer
3.         Types of Computer
4.         Computer Hardware and Devices
4.1.      Input devices
4.2.      Output devices
4.3.      Processing Devices
4.4.      Memory Device
4.4.1.   Primary or Main memory
4.4.2.   Secondary or Auxiliary memory
4.4.3.   Cache memory
4.5.      Special Devices

Chapter-5: Computer Software and Software Systems

1.         Computer Software
1.1.      System Software
1.2.      Application Software
2.         Programming Language
2.1.      Low-Level Language
2.2.      High Level Language
2.3.      Object Oriented Language
3.         Database Management System
4.         Internet and related terminologies
4.1.      Internet
4.2.      WWW
4.3.      Hypertext
4.4.      Hyperlinks
4.5.      Web browser
4.6.      Web Page
4.7.      Internet vs WWW
4.8.      URL
5.         E-mail

Module-B: Different Approaches to Bank Automation

Chapter-6: Networking and Computer Hardware for Banks

1.         Concept of LAN and WAN
1.1.      Local Area Network
1.2.      Wide Area Network
1.3.      Transmission Media
            1.3.1.   Transmission Media for LAN
            1.3.2.   Transmission Media for WAN
                        a)         Land Lines
                        b)         Microwave
                        c)         Satellites
1.4.      LAN/WAN for Banks
            1.4.1.   Firewall
            1.4.2.   DMZ
2.         Hardware & infrastructure used for Bank automation
2.1.      Advanced Hardware Terminology
2.1.1.   Various Computer Servers
            a)         Branch Server
            b)         Application Server
            c)         Database Server
2.1.2.   RAID
2.1.3.   External Storage Device
2.1.4.   SAN Switch
2.1.5.   Clustering
            a)         High-availability Clusters
            b)         Load-balancing clusters
2.1.6.   Replication
            a)         Async Replication
            b)         Sync Replication
            c)         Dark Fiber
2.2.      Data Center
2.3.      Disaster Recovery Site

Chapter-7: Bank Computerization approaches

1.         Stand-alone System
2.         LAN-based System
3.         WAN-based System with distributed database
4.         WAN-based System with centralized database

Chapter-8: Various Software Systems for Bank

1.         Core Banking Software
2.         Switching Software
3.         Credit Card Software
4.         Payment Gateway Software
            Functions of a payment gateway software
5.         Mobile Banking Software
            5.1.      Mobile Banking System VS Core Banking System
            5.2.      Mobile Banking system VS sms Banking system
            5.3.      Available software for Mobile Banking
            5.4.      Customers of Mobile Banking and menu items for them
5.5.      Features of a Mobile Banking Software

Chapter-9: Plastic Money

1.         Plastic money types
            a)         Credit Cards
            b)         Debit Cards
            c)         Payment, Pre-Paid or Electronic Purse Cards
            d)         ATM Cards
            e)         Charge Cards
            f)          Store, Budget or Option Cards
2.         Benefits of Plastic Money
            a)         Benefits for Customers
            b)         Benefits for Merchants
3.         Issuer and Acquirer
4.         Terminology for Card transactions at ATM and POS terminals
            4.1.      On-us transaction
            4.2.      Off-us or Not on-us transaction
            4.3.      Remote on-us transaction
            4.4.      Interchange fee
            4.5.      Merchant Commission
            4.6.      EMV and Chip Card
            4.7.      Liability Shifting
            4.8.      Charge Back
5.         Payment Associations
            5.1.      International
                        5.1.1.   MasterCard
                        5.1.2.   VISA
5.2.      Local payment associations and ATM Networks
            5.2.1.   DBBL Nexus
            5.2.2.   BEPS
            5.2.3.   Q-Cash
            5.2.4.   E-Cash
            5.2.5.   Cashlink
            5.2.6.   Omnibus
            5.2.7.   Joining, monthly and transaction fees
6.         Income from Credit Card Business
6.1.      Sources of income from Debit Card issuing
6.2.      Sources of income from Credit Card issuing
6.3.      Sources of income from ATM acquiring
6.4.      Sources of income from POS acquiring
7.         Technology related to Plastic Card
7.1.      Plastic
7.2.      Magnetic Strip and Micro Chip
7.3.      Personalization of plastic cards
8.         Fraud in Plastic Money
            8.1.      Counterfeit
            8.2.      Application Fraud
            8.3.      PIN Fraud
            8.4.      Card Not Present
9.         Plastic Money Fraud Prevention Strategies
            9.1.      Action by Card Issuers
            9.2.      Action by Merchants
            9.3.      Action by Cardholders
            9.4.      Technological Solutions
                        9.4.1.   Protections against Card Counterfeiting
                        9.4.2.   Card Restrictions
                        9.4.3.   Fraud Detection Software
                        9.4.4.   Improved Cryptography
                        9.4.5.   EMV
                                    a)         What is EMV?
                                    b)         What is EMVCo?
                                    c)         Benefits of EMV
                                    d)         Why Banks should move to EMV?
                                    e)         What is the risk of counterfeit in Meg-stripe card?
                                    f)          How does EMV protect Counterfeit fraud?
                                    g)         What are main contents of a meg-stripe card and chip card?

Module-C: Electronic Payment Systems & Funds Transfer Systems

Chapter-10: ATM and Deposit Machine

1.         ATM
            1.1.      Services from ATM
            1.2.      How ATM works?
            1.3.      ATM Specifications & related topics
                        1.3.1    ATM specification
                        1.3.2.   Denomination available at ATM
                        1.3.3.   Cash feeding by 3rd party
                        1.3.4.   Partial Dispense of Cash and non-dispense of cash
                        1.3.5.   Capture of money
                        1.3.6.   Network used for connectivity
                        1.3.7.   Card Capture and hot card
                        1.3.8.   Space requirement for installation of ATM
                        1.3.9.   One-time and monthly expenditure for an ATM booth
                        1.3.10. Income from an ATM
            1.4.      ATM Fraud and remedy
                        1.4.1.   Card Reading Devices
                        1.4.2.   Card-Trapping Devices
2.         Deposit Machine
3.         Fast Track

Chapter-11: POS terminals

1.         What is POS terminal?
2.         Transaction types supported at POS terminals
3.         POS Specifications
4.         How POS works?
5.         POS terminology
            a)         PIN pad
            b)         Insert and Swipe
            c)         Merchant Commission
            d)         Interchange fee
6.         Number of POS terminals in operation in Bangladesh (in year-2010)
7.         Fraud at POS and remedy

Chapter-12: Internet Banking

1.         What is Internet Banking?
2.         i-Banking Password
3.         i-Banking functions
4.         Fraud in Internet Banking
            a)         Capture of password during transmission to the bank server
            b)         Phishing
            c)         Repudiation and Digital Signature
            d)         Two-factor authentication

Chapter-13: Sms and Alert Banking System

1.         sms Banking
2.         Alert Banking
            2.1.      Debit Alert
            2.2.      Credit Alert
            2.3.      Periodical Alert
3.         How sms Banking works?
4.         Important notes for the customers
5.         Security in sms and Alert Banking

Chapter-14: E-commerce & Internet Payment Gateway

1.         E-commerce
2.         Internet Payment Gateway
3.         How Internet Payment Gateway works?
4.         PayPal as payment gateway
5.         Fraud & remedy during e-commerce transactions
            a)         Capture of card information during transmission to the bank server
            b)         Phishing
            c)         Repudiation and Digital Signature
            d)         Two-factor authentication

Chapter-15: M-Commerce and Mobile Banking

1.         What is m-Commerce?
2.         History of m-commerce
3.         Mobile Banking
            3.1.      What is Mobile Banking?
            3.2.      Mobile Banking activities
                        3.2.1.   Agent and Merchant registration
                        3.2.2.   Consumer Registration
                        3.2.3.   Cash-in
                        3.2.4.   Cash-out
                        3.2.5.   Merchant Payment
                        3.2.6.   Fund Transfer
                        3.2.7.   Other services available to Consumers
            3.3.      Who will provide PIN?
            3.4.      Transaction Limits in Mobile Banking
            3.5.      Mobile Banking is costly
            3.6.      Models in Mobile Banking – Bank-led and Telco-led
            3.7.      Connectivity - sms VS USSD

Chapter-16: Call Centre

1.         What is a Call Centre?
2.         What is a Contact Centre?
3.         Difference between Call Centre and Contact Centre
4.         Mode of Communication in Contact Centre
5.         Key Components of Contact Centre
            5.1.      Interactive Voice Response (IVR)
            5.2.      Automatic Call Distributor (ACD)
            5.3.      Computer Telephony Integration (CTI)
            5.4.      Call Recording System
            5.5.      Staff (Agent / Supervisors)
            5.6.      Key Performance Indicator (KPI)
6.         How does the Call Centre / Contact Centre function?
7.         Types of Call Centre /Contact Centre Service
8.         Call Centre/Contact Centre Activity Type
            8.1.      Common Inbound Activities
            8.2.      Common Outbound Activities
9.         Quality Assurance at Contact/Call Centre

Chapter-17:  Systems for sending fund transfer instruction

1.         Telex
2.         SWIFT
            2.1.      What is SWIFT?
            2.2.      SWIFT traffic
            2.3.      SWIFT membership
                        (a)        Member
                        (b)        Sub-members
                        (c)        Participants
            2.4.      Why to become SWIFT member?
            2.5.      Security at SWIFT
            2.6.      How the SWIFT works?
            2.7.      What are the drawbacks?
            2.8.      User Group in Bangladesh
3.         CHIPS
4.         FEDWIRE

Module-D: IT Security Standards and regulations

Chapter-18: Security Standards and Regulations

1.         Standards and Regulations
2.         Benefits of complying a Security Standard

Chapter-19:     Guideline on ICT Security for Scheduled Banks
            and Financial Institutions, Version-2 (April, 2010)
published by the Central Bank of Bangladesh

1.      Introduction
1        ICT Security Management
2        ICT Operation Management
3        Physical Security
4        Information Security Standard
4.1  Access Control for Information Systems
5.2              Network Security
5.3              Data Encryption
5.4              Virus Protection
5.5              Internet and e‐mail
5.6              Transactions through Alternative Channels
5.6.1        Services through Mobile
5.6.2        Internet Banking
5.6.3        Payment Cards
6.      Software Development and Acquisition
6.1              In‐house Software
6.2              Outsourced Software
7.      Business Continuity and Disaster Recovery Plan
7.1              Business Continuity Plan (BCP)
7.2              Disaster Recovery Plan (DRP)
7.3              Backup and Restore Plan (BRP)
8.      Service Provider Management
8.1              Service Level Agreement (SLA)
8.2              Outsourcing
8.3              Cross‐border System Support

Chapter-20: BS 7799 standards

1.         What is BS7799?
2.         History of BS 7799
3.         BS7799 vs ISO 17799
4.         Who must comply?
5.         BS7799: Part-I: Security Domains, Objectives and Controls
6.         BS 7799: Part-II: ISMS and Certification
            6.1.      Compliance/Certification Process
            6.2.      What is an ISMS?

Module-E: Document Handling Systems, Additional Banking Applications & Other Aspects

Chapter-21: Cheque Processing Systems

1.         Clearing and Settlement Systems
2.         Conventional Cheque Clearing Process
3.         MICR
4.         Cheque Truncation
5.         RTGS
6.         BACH
            6.1.      BACPS
            6.2.      BEFTN

Chapter-22: Additional Banking Applications

1.         ERP Software
1.1.      What is ERP System?
1.2.      Components / Modules of an ERP Software
1.3.      Components of an ERP System
1.4.      ERP advantages and disadvantages
1.5.      Renowned ERP Software
1.5.1.   SAP ERP from SAP
1.5.2.   PeopleSoft ERP from Oracle
2.         CRM Software
2.1.      What is CRM?
2.2.      Fields of application
2.3.      Software for CRM
3.         E-mail software
3.1.      What is e-mail?
3.2.      Operation Overview
3.3.      Components in a messaging system
3.4.      Popular E-mail Systems
3.5.      Licensing of commercial product
3.5.1.   Exchange Server
3.5.2.   Lotus Domino
4.            Anti-Virus software
4.1.         What is antivirus software?
4.2.         How Antivirus works?
4.2.1.     Signature based detection
4.2.2.     Behavior Based Detection
4.3.         Licensing
4.4.         Popular Antivirus programs

Module-F: Risk Management and Legal Framework in IT

Chapter-23: Cyber Law

1.         What is Cyber Law?
2.         Cyber Crime Categories
3.         Cyber Crime Activities
            3.1.      Unauthorized access & Hacking
            3.2.      Trojan Attack
            3.3.      Virus and Worm attack
            3.4.      E-mail related crimes
            3.5.      Denial of Service (DoS) attacks
            3.6.      Pornography
            3.7.      Forgery
            3.8.      IPR Violations
            3.9.      Cyber Terrorism
            3.10.    Banking/Credit card Related crimes
            3.11.    E-commerce/ Investment Frauds
            3.12.    Sale of illegal articles
            3.13.    Online gambling
            3.14.    Defamation
            3.15.    Identity Theft
            3.16.    Data diddling
            3.17.    Theft of Internet Hours
            3.18.    Theft of computer system (Hardware)
            3.19.    Physically damaging a computer system
            3.20.    Breach of Privacy and Confidentiality

Chapter-24: National ICT Policy – 2002

1.         Why ICT Policy?
2.         Objectives
3.         Coverage
4.         Selected Policy Clauses

Chapter-25: ICT Act-2006

1.         Introduction
2.         Applicable fields
3.         Objectives
4.         Selected clauses