How Banks Work
  • Home
  • Banking Framework
    • Channels
    • Engines
    • Management Information
    • Customer Relationship Management
    • Gateways to the Banking Industry
  • Articles
  • Links
  • Contact
Select Page
Development of IT Security: In the Next Two Years

Development of IT Security: In the Next Two Years

by Robert Tripp | Jul 25, 2006 | Articles, Banking Product Engines

Given the high degree of complexity in IT security and the very large costs in changing security embedded in programs there will not be a radical change over the next couple of years but rather some more steps in the continuous evolution. The author’s forecast is that...
Development of IT Security: History of IT Security During 2005-Today

Development of IT Security: History of IT Security During 2005-Today

by Robert Tripp | Jul 25, 2006 | Articles, Banking Product Engines

This brings us up to date and is illustrated in the diagram below. In essence, most banks have bits of security processing from every generation of technology development. This means we are running a complicated mess with a desire to move more of the access control to...
Development of IT Security: History of IT Security During 2003

Development of IT Security: History of IT Security During 2003

by Robert Tripp | Jul 25, 2006 | Articles, Banking Product Engines

The arrival of browser technology as a way of presenting and accessing information produced some particular challenges. People outside the bank (customers and brokers) would directly access the core data. Previously any customer based electronic banking carefully...
Development of IT Security: History of IT Security During 1990

Development of IT Security: History of IT Security During 1990

by Robert Tripp | Jul 25, 2006 | Articles, Banking Product Engines, General

RACF was helping tidy up the security processes on the mainframe where many important bank processes were carried out.Unfortunately most banks were buying and building lots of systems on other IT infrastructure such as AS/400, UNIX, Microsoft NT. This is illustrated...

Development of IT Security: History of IT Security During 1980

by Robert Tripp | Jul 25, 2006 | Articles, Banking Product Engines

IBM spotting a market opportunity produced a piece of software called RACF (Resource Access Control Facility) which tried to centralise the security processing. This is illustrated in the diagram below. The key ideas are that there is a separate database of users,...
« Older Entries

Search

Recent Posts

  • CBDCs and Digital IDs – like love and marriage
  • Retail CBDC – Don’t do it!
  • Managing Change in Financial Services Risk and Compliance Communities – why is it more difficult?
  • Update to Banking Technologies and Strategies
  • Banking Operations Strategies & Technologies Review

Social Links

Latest News

  • FT
  • Banking Tech
  • Euromoney
  • Finextra
‘Act big’ in the US means thinking smaller in the UK
Sunak will be forced to raise UK taxes again, economists warn
Northern Ireland protocol risks being tested to destruction
US suspends tariffs on UK exports in Airbus-Boeing trade dispute
Property boss says stimulus has made UK market ‘too big to fail’
No items
No items
Amazon opens cashierless store in London
Ripple touts private version of XRP ledger as CBDC problem-solver
Salary-on-demand startup Minu raises $14 million
Goldman to hire 100 more technology staff in Singapore
Finastra to rewrite developer terms to counter algorithmic bias

TRIPPLE CONSULTING

Tripple Consulting are the creative force behind Howbankswork.com. Read more about us or visit our website at www.trippleconsulting.co.uk

Privacy Policy & Disclaimer

Howbankswork.com takes your privacy seriously.
Read our Privacy Policy and Disclaimer

  • Banking Framework
  • Articles
  • Blog
  • Links
  • Privacy & Disclaimer
  • Contact