Here are some questions created by students in another school.
They may or may not be important, but you can use them
to stimulate discussion.
1. Explain at least 5 different transactions that can be done using internet banking
2. Explain at least 4 different transactions that can be done using ATMs.
3. Explain at least 4 different transactions that can be done using mobile phones
4. Explain the use of emails in online banking.
5. What is IVR?
6. How does voice recognition work with IVR?
7. What are the limitation of voice recognition in IVR
8. “Online banking provides cost advantages to the bank”. Justify this statement with your explanation.
9. Explain the benefits (convenience) of using online banking for the customer
10. Explain the responsibilities of “Head of IT operations” in a bank or any service industry.
11. Define: authentication of users.
12. What is two factor (in some cases, multifactor) authentication method?
13. What is TAN?
14. What is OTP?
15. Explain two factor authentication used by “TransEuropa” bank with technical details.
16. From your research, write down other authentication features used by various banks across the globe.
17. What is phishing?
18. From your research, explain various steps taken by the bank to protect customers from phishing and evaluate their effectiveness.
19. What is Trojan?
20. Explain how Man-in-the-Browser Trojan works with technical details.
21. Explain the dangers of phishing and Man-in-the-Browser Trojan for online banking customers.
22. What is out-of-band verification?
23. Explain how out-of-band verification minimizes the risk for online bankers.
24. What is encryption?
25. What is symmetric encryption?
26. What is asymmetric encryption?
27. What is digital certificate?
28. What is the role of digital certificate in online banking/e-commerce?
29. Name at least two digital certificate agencies for e-commerce/online banking.
30. What is SSL protocol?
31. “Encryption key length of 2048 bits”. What is meant by this statement?
32. Explain how brute-force decryption method works?
33. What are backdoor decryption methods?