2..2 28 1 1 1 2 2 3 3 4 4 4 5 .1 11
1) 2) 3) 1) 2) 3) :1 :2 :3
Electronic Money
1)
Monitoring Controlling Assessing • • • • 2) .Virtual bank
3)
1) 2) 3)
Hypertext Links
Web 1)
.1
Smart cards Stored – value cards Electronic device Electronic cash :
2
Automatic teller Point of sale terminals
Debit cards Credit cards machines 2) 3)
Hypertext Links
Web currency swap
(1
Electronic cash (EC): the Funds or value is stored on an electronic device as the personal computer of the consumer which is loaded using specialized software0 EC is used to make small payments through a transfer of value to the merchants electronic device. 1
2
1..2 1998
:
:
(1) (2) (3) (4)
risk Operational 1) System security access Unauthorized Systems design, implementation, and maintenance .Outsourcing Slow- Down Customer misuse of services Security precautions Reputational risk 2) Legal risk 3) Validity 4) Cross- border Risk management Assessing risks (1)
risk exposures Controlling
2)
Implementing security policies and measures .(Identification /authentication Privacy Non – repudiation
(1) (2) (3) (4)
-:
( 1) (2) (3) ( 8) • On- line interaction with the issuer or a central operator • • • )
Coordinating internal communication Evaluating and developing services
) ) • • • •
Providing customer education and disclosure Contingency planning -:
•
.Data recovery .Alternative data – processing capabilities
Backup systems
• • •
:Monitoring risks 3) System testing and auditing
Penetration testing
• • •
(2
Hypertext Links
(3
Web
(1) (2) (3) (4) (5) (6) (7)
(1) (2)
(3) (4) (5) (6) (7) (8) (9)