SWIFT:
The
Society for Worldwide Interbank Financial Telecommunication (SWIFT) provides a
network that enables financial institutions worldwide to send and receive
information about financial transactions in a secure, standardized and reliable
environment. Swift also sells software and services to financial institutions,
much of it for use on the SWIFT Net Network.
Online
Processing:
A
method of using a terminal remote from a company mainframe or an interface to
the Internet like an e-commerce website for taking product orders and dealing with
payments. The online processing of orders offers considerable savings and
greater overall efficiency for most business sales operations, although system
down time can be costly in terms of lost sales.
Spam:
spamming
is the use of electronic messaging systems to send unsolicited messages (spam),
especially advertising. As well as sending messages repeatedly on the same
site. While the most widely recognized form of spam is e-mail spam.
Spyware:
Spyware
is software that aids in gathering information about a person or organization
without their knowledge and that may send such information to another entity
without the consumer's consent, or that asserts control over a computer without
the consumer's knowledge.
Cash
Memory:
Cache
memory, also called CPU memory, is random access memory (RAM) that a computer
microprocessor can access more quickly than it can access regular RAM.
As
the microprocessor processes data, it looks first in the cache memory and if it
finds the data there (from a previous reading of data), it does not have to do
the more time-consuming reading of data from larger memory
ATM:
An
automated teller machine or automatic teller machinealso known as an automated
banking machineis an electronic telecommunications device that enables the customers
of a financial institution to perform financial transactions without the need
for a human cashier, clerk or bank tellerOn most modern ATMs, the customer is
identified by inserting a plastic ATM card with a magnetic stripe or a plastic
smart card with a chip that contains a unique card number and some security
information. Authentication is provided by the customer entering a personal
identification number (PIN).
Smart
Card:
A
smart card is a plastic card about the size of a credit card, with an embedded
microchip that can be loaded with data, used for telephone calling, electronic
cash payments, and other applications, and then periodically refreshed for
additional use. Smart cards can provide identification, authentication, data
storage and application processing.[2] Smart cards may provide strong security
authentication for single sign-on (SSO) within large organizations.
Extranet:
An
extranet is a computer network that allows controlled access from outside of an
organization's intranet. Extranets are used for specific use cases including
business-to-business (B2B). In a business-to-business context, an extranet can
be viewed as an extension of an organization's intranet that is extended to
users outside the organization, usually partners, vendors and suppliers, in
isolation from all other Internet users. It is in context of that isolation
that an extranet is different from an intranet or internet. In contrast,
business-to-consumer (B2C) models involve known servers of one or more
companies, communicating with previously unknown consumer users. An extranet is
similar to a DMZ in that it provides access to needed services for channel
partners, without granting access to an organization's entire network.
Digital
Signature:
A
digital signature is a mathematical scheme for demonstrating the authenticity
of a digital message or document. A valid digital signature gives a recipient
reason to believe that the message was created by a known sender, such that the
sender cannot deny having sent the message (authentication and non-repudiation)
and that the message was not altered in transit (integrity). Digital signatures
are commonly used for software distribution, financial transactions, and in
other cases where it is important to detect forgery or tampering.
Data
Encryption:
Encryption
is the process of using an algorithm to transform information to make it
unreadable for unauthorized users. This cryptographic method protects sensitive
data such as credit card numbers by encoding and transforming information into
unreadable cipher text. This encoded data may only be decrypted or made
readable with a key. Symmetric-key and asymmetric-key are the two primary types
of encryption. Encryption is essential for ensured and trusted delivery of
sensitive information
Data
Decryption:
Decryption
is the process of transforming data that has been rendered unreadable through
encryption back to its unencrypted form. In decryption, the system extracts and
converts the garbled data and transforms it to texts and images that are easily
understandable not only by the reader but also by the system. Decryption may be
accomplished manually or automatically. It may also be performed with a set of
keys or passwords.