Search

20 February, 2022

SWIFT, Online Processing, Spam, Spyware, Cash Memory, ATM, Smart Card, Extranet, Digital Signature, Data Encryption , Data Decryption

 SWIFT:

 The Society for Worldwide Interbank Financial Telecommunication (SWIFT) provides a network that enables financial institutions worldwide to send and receive information about financial transactions in a secure, standardized and reliable environment. Swift also sells software and services to financial institutions, much of it for use on the SWIFT Net Network.

 Online Processing:

 A method of using a terminal remote from a company mainframe or an interface to the Internet like an e-commerce website for taking product orders and dealing with payments. The online processing of orders offers considerable savings and greater overall efficiency for most business sales operations, although system down time can be costly in terms of lost sales.

 Spam:

 spamming is the use of electronic messaging systems to send unsolicited messages (spam), especially advertising. As well as sending messages repeatedly on the same site. While the most widely recognized form of spam is e-mail spam.

 Spyware:

 Spyware is software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.

 Cash Memory:

 Cache memory, also called CPU memory, is random access memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM.

As the microprocessor processes data, it looks first in the cache memory and if it finds the data there (from a previous reading of data), it does not have to do the more time-consuming reading of data from larger memory

 ATM:

 An automated teller machine or automatic teller machinealso known as an automated banking machineis an electronic telecommunications device that enables the customers of a financial institution to perform financial transactions without the need for a human cashier, clerk or bank tellerOn most modern ATMs, the customer is identified by inserting a plastic ATM card with a magnetic stripe or a plastic smart card with a chip that contains a unique card number and some security information. Authentication is provided by the customer entering a personal identification number (PIN).

 Smart Card:

A smart card is a plastic card about the size of a credit card, with an embedded microchip that can be loaded with data, used for telephone calling, electronic cash payments, and other applications, and then periodically refreshed for additional use. Smart cards can provide identification, authentication, data storage and application processing.[2] Smart cards may provide strong security authentication for single sign-on (SSO) within large organizations.

 Extranet:

 An extranet is a computer network that allows controlled access from outside of an organization's intranet. Extranets are used for specific use cases including business-to-business (B2B). In a business-to-business context, an extranet can be viewed as an extension of an organization's intranet that is extended to users outside the organization, usually partners, vendors and suppliers, in isolation from all other Internet users. It is in context of that isolation that an extranet is different from an intranet or internet. In contrast, business-to-consumer (B2C) models involve known servers of one or more companies, communicating with previously unknown consumer users. An extranet is similar to a DMZ in that it provides access to needed services for channel partners, without granting access to an organization's entire network.

 Digital Signature:

 A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, such that the sender cannot deny having sent the message (authentication and non-repudiation) and that the message was not altered in transit (integrity). Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering.

 Data Encryption:

 Encryption is the process of using an algorithm to transform information to make it unreadable for unauthorized users. This cryptographic method protects sensitive data such as credit card numbers by encoding and transforming information into unreadable cipher text. This encoded data may only be decrypted or made readable with a key. Symmetric-key and asymmetric-key are the two primary types of encryption. Encryption is essential for ensured and trusted delivery of sensitive information

 Data Decryption:

 Decryption is the process of transforming data that has been rendered unreadable through encryption back to its unencrypted form. In decryption, the system extracts and converts the garbled data and transforms it to texts and images that are easily understandable not only by the reader but also by the system. Decryption may be accomplished manually or automatically. It may also be performed with a set of keys or passwords.