State Bank of India

Total Page:16

File Type:pdf, Size:1020Kb

State Bank of India STATE BANK OF INDIA Internet banking services have made enormous strides over the past few years and have become increasingly popular. The introduction of Two-factor Authentication for conducting high-risk retail Internet banking transactions in mid-2005 was an important milestone significantly improving the security of Internet banking. To continue enjoying the convenience of Internet banking services, all you need to do is take a few simple safety precautions when using these services. TWO-FACTOR AUTHENTICATION MEANS STRONGER SECURITY Two-factor Authentication protects you from Internet banking fraud. It uses two elements to verify a user’s identity: THE BENEFITS OF USING TWO-FACTOR AUTHENTICATION Protection for high-risk transactions – All high-risk Internet banking transactions (such as fund transfers to non-designated accounts) are protected by an additional authentication factor that is physically held by you alone. Much more security – Computer hackers cannot steal something you have physically by way of the Internet. Password creation and maintenance Use safe passwords that are : different from your user IDs easy to remember only by yourself difficult to guess a combination of letters and numbers of at least 6 characters. Never disclose your online passwords to anyone (including bank staff and the police) and do not record them anywhere. Contact your bank immediately if you believe your passwords have been compromised. Do not use the same password for other online services, e.g. e-mail or Internet access, or for other Internet banking accounts. Change your passwords regularly. Disable your browser’s ‘AutoComplete’ function that remembers the data (including your online passwords) that you input. Refer to your browser’s ‘Help’ function for details. Your device for two-factor authentication, the security token, is now a crucial part of your personal identifier. Never leave it unattended or lend it to anyone. Enter your user-id password only in the space provided for- that you are normally used to. Any changes observed in the screen appearance from normal appearance, please make sure there is no attempt to steal your personal information before providing it. Do not provide user id passwords on any page popping up by clicking on a hyperlink received through email. Better practice would be to log into the service by typing in the URL in the address bar after making sure the page opening up is from the genuine service provider. Do not store passwords in a file on ANY computer system (including MIDs, I Pads, Palm Pilots or similar devices) without encryption. Change passwords at least once every 90 (ninety) days. Unique Characters: An acceptable password must have at least five (5) different characters. Repeated characters can make for palindromes and make it easier to crack. Character Types: An acceptable password must have characters from at least three (3) different character types -- upper case, lower case, digits, punctuation, etc. A password that includes a sample from a rich character set is difficult to crack. Long Alpha Sequences: An acceptable password must not have an alphabetic sequence any longer than three (3) characters. Long Digit Sequences: An acceptable password must not have a digit sequence any longer than two (2) characters. Forbidden Characters: There are a few characters that will cause problems if used in a password - the "delete" character is one of the obvious ones. Passwords should not be any of the following: o Dictionary words (including foreign and technical dictionaries) o Name of a person or a thing, a place, a proper noun, a phone number or a vehicle number o Simple pattern of letters on keyboards o Any of the above reversed or concatenated One possible method for picking a good password is to make up your own acronym. Do not let your computer remember your password. Do not accept auto complete option provided by your computer/ browser. As far as possible do not use un-trusted system to access sensitive service. If you must, change the password on the first occasion immediately thereafter from a trusted system. Hardware Token Maintenance • Never store your token with your login name or password. • Never provide personal banking information over the internet or phone if prompted by an email or website. • Always check your statements for unusual or suspicious transactions. • Avoid using public computers (internet cafes, libraries etc.) to access internet banking. • Don’t access iBank via links in other websites. • Always log out of iBank when you have finished. Don’t leave your session unattended because others can access your personal information or change your access code without your knowledge. A security token is devices that enable you authenticate yourself electronically during Internet banking transactions. A Security token adds a second layer of security, giving you more protection. If you are using Internet banking security token, a fraudster will also require your security token in addition to your PIN to access your Internet banking site. That means that once you keep your security token safe from prying eyes, your Internet banking account will be safe from most threats. An Internet banking Security token will also enable you handle more of your banking needs online. So get one from your bank, it does not cost much. FAQs :- What is a security token? A security token is a small electronic device that generates a onetime password, entered when high risk transaction is undertaken over the Internet Banking. It provides an extra layer of security of your details to help counteract fraudulent internet attacks. What is a one-time password? A one-time password is a 6-digit number generated by pressing the grey button on a security token. Who can request a security token? All customers who are registered for Internet Banking can request a security token. How much does a security token cost? The security token will be at no cost to members at initial request, however a charge for any replacement security tokens will apply. Will a security token work on my computer? Yes. As there is no physical or wireless connectivity required between the security token and your computer you will not require any additional equipment or software. How do I request and activate a security token? A security token can only be requested through your bank branch where the terms and conditions of token use must be accepted. Do I have to use my security token every time I log into PCU Internet Banking? No. A onetime security token password will be required when a Member performs one of the following actions: Transfer of money to a third party. Add new Third Party Beneficiary. What if I enter an incorrect one time password? Wait 30 seconds and press the grey button on the security token again to generate a new one time password. What should I do if my security token is lost, damaged or stolen? Contact your bank branch. A charge for a replacement security token will apply. Can I use my security token anywhere? A security token can be used wherever you can log into Internet Banking. This includes overseas and in remote areas. Can I cancel my security token after activation? Although State Bank of India does not recommend cancelling your security token, you can do so at any time by calling your bank branch. Who can help me with a security token? Call us on between 10am to 5pm Monday to Friday or email .
Recommended publications
  • Security Token Service Application Pool
    Security Token Service Application Pool Unshipped and snobby Paolo never totalize his hurtfulness! Sorediate Wright retted his pandemonium postures sizzlingly. Inimitable Charlie emit: he rivetting his unfortunates costively and bareheaded. When joined to an AD domain it supports Windows Integrated Authentication. Otherwise, BDLC is unable to find and access the given secure store application. READ rights on all the web applications, the SP_Search will now run the Windows Service. Stops sharing the specified service application outside the farm. From here you need to bind that farm to whichever host you choose. Add the following to the web. In the Internet Information Services management console, in the Connections pane, expand the tree view, and then click Application Pools. Rename your object or delete the existing object. When the user hits the site, a central server will be contacted. The Security Token Service is no. Completely deletes an existing site collection and all subsites. But i am now not able to login to the site using windows authentication. Error: The Security Token Service is not available. Platform for creating functions that respond to cloud events. Restores one or more items from a backup. Checks and repairs the specified site collection and its contents. How can we make this translation better? Adds an endpoint to the Apps denied endpoint list. Sets a new credential mapping for a Secure Store Service application. Deletes a Secure Store application. Unless, there is a need due to business rules or performance constraint, these services may share single application pool in IIS. Can you copy the exact error code and I will be able to better help you! At what point in the install do I use the service account script? What do i need to do to resolve this? Three Service Instances are by default set up to run under the Local System or Local Service accounts: Claims to Windows Token Service, Document Conversions Launcher Service, and Document Conversions Load Balancer Service.
    [Show full text]
  • Step 4 How to Install Security Token to PC/Laptop & Change Token
    Classification : PUBLIC Step 4 How to Install Security Token to PC/Laptop & Change Token PIN How to Install Security Token to PC/Laptop 1. Plug the Security Token to PC/Laptop and copy the Trust_Key Software from Security Token. 2. Extract the content & install software Double Click on Trust Key Application Install the Trust Key Authentication ClientDouble click Classification : PUBLIC Click Install (Then it will install the driver) Click Finish Click the Trust key icon desktop. The display will look like this before plugging in the token. Classification : PUBLIC Plug in token After plugging in the token, display will look like this. Classification : PUBLIC Click user certificate Click View Classification : PUBLIC Click view to appear the certificate details. Click *Start*. Type *Run* and select it. Classification : PUBLIC Type *certmgr.msc* and click *OK* Certificate of current user appears Classification : PUBLIC Click *Personal* Click *Certificates* Classification : PUBLIC The Certificate will be displayed as User Certificate Installing SafeNet Authentication Client on Mac To install with the installer: 1. Double click the SafeNetAuthenticationClient.10.2.x.x.dmg file 2. To start the installation, double click SafeNet Authentication Client 10.2.pkg Classification : PUBLIC 3. Click Continue The Welcome to the SafeNet Authentication Client Installer window opens 4. Click Continue The Software License Agreement window opens 5. Click Agree to accept the software license agreement Classification : PUBLIC 6. Click Install The Standard Install window opens 7. Enter Username and Password and click Install Software NOTE: Administrator permissions are required to install SafeNet Authentication Client 8. Click Close and then perform a Restart (recommended) Classification : PUBLIC How to Change Security Token PIN The security token contains your Private Key, therefore neither the security token nor the token PIN should be shared with anyone under any circumstances.
    [Show full text]
  • Multi-Factor Authentication Version: 1.0 Date: February 2017 Author: PCI Security Standards Council
    INFORMATION SUPPLEMENT Multi-Factor Authentication Version: 1.0 Date: February 2017 Author: PCI Security Standards Council INFORMATION SUPPLEMENT Guidance for Multi-Factor Authentication Table of Contents Overview ....................................................................................................................................................................1 MFA and PCI DSS .................................................................................................................................................1 Terminology ............................................................................................................................................................1 Authentication Factors ............................................................................................................................................2 Independence of Authentication Mechanisms ......................................................................................................2 Out-of-Band Authentication .....................................................................................................................................3 Cryptographic Tokens .............................................................................................................................................3 Protection of Authentication Factors .....................................................................................................................5 Multi-step vs. Multi-Factor .......................................................................................................................................5
    [Show full text]
  • Security Token Service for SAP Single Sign-On and SAP Identity Management Document Version: 1.1 – 2018-07-31
    IMPLEMENTATION GUIDE | PUBLIC Security Token Service for SAP Single Sign-On and SAP Identity Management Document Version: 1.1 – 2018-07-31 Security Token Service for SAP Single Sign-On and SAP Identity Management company. All rights reserved. All rights company. affiliate THE BEST RUN 2018 SAP SE or an SAP SE or an SAP SAP 2018 © Content 1 Security Token Service for SAP Single Sign-On and SAP Identity Management.............3 1.1 What is a Security Token Service..................................................3 STS in Business-to-Business Scenarios...........................................4 1.2 Before Starting...............................................................6 System Requirements.......................................................6 Authorizations............................................................ 6 Limitations of the Security Token Service..........................................7 Keys and Keystores.........................................................8 1.3 Adding a Security Token Service to Your Network.......................................9 Downloading and Installing the Federation Software..................................9 Configuring the Security Token Service.......................................... 10 Enabling the Security Token Service.............................................12 Selecting Authentication Types for Web Services....................................12 Configuring Issued Security Tokens.............................................14 Trusting Application Service Providers...........................................16
    [Show full text]
  • State Bank of India – the Nation's Most Trusted Bank
    Press Release – For Immediate Release State Bank of India – the Nation’s Most Trusted Bank Brand Finance launches banking market research on India’s bank brands Indian banks enjoy an average trust score of 69.8% compared to 64.9% recorded by US banks State Bank of India is the nation’s most trustworthy bank with a score of 86.4% Over 50% of customers of the Oriental Bank of Commerce and the UCO Bank 'very likely' to switch to competition Brand Finance conducted research on bank brands in 22 markets to see how customers’ opinions have changed in an era of major disruption to the industry. As global banks retreated after the Great Recession, the traditional banking model has changed. The prevailing trends suggest fintechs and niche “challenger banks” are biting into banks’ profits and luring their customers away with better quality service at lower prices. Traditional banks tend not to be set up as quick innovators. Instead, they compete for customers’ trust and our research indicates which banks are the most trustworthy. State Bank of India was deemed the most trusted bank in the country with a trust level of 86.3% as well as the most popular bank among those customers that were looking to switch to competition with 21.4% declaring they would choose the brand over others. State Bank of India is the country’s largest commercial bank in terms of assets, deposits, branches, number of customers and employees. On the opposite end of the ranking, over 50% of customers of the Oriental Bank of Commerce and the UCO Bank were 'very likely' to switch to competition.
    [Show full text]
  • Security, Encryption, and Certificates FAQ
    Security, Encryption, and Certificates FAQ Overview In Security Center 5.4, several new capabilities will be added that further strengthen the security of the platform itself, as well as the privacy of data. The aim is to prevent unauthorized access to stored and transmitted messages and data, as well as prevent attacks through the use of stronger encryption and authentication mechanisms. With growing demand for privacy, new capabilities in Security Center 5.4 will strengthen Genetec’s position and overall value proposition. This FAQ addresses some of the most common questions in relation to the new capabilities of Security Center: Encryption, Authentication, and Digital Certificates. These concepts are first described in generic terms; the FAQ then outlines how these new measures are used within Security Center 5.4. Encryption vs. Authentication vs. Authorization What is the difference between encryption, authentication, and authorization? Encryption is used to encrypt data so that only authorized users can see it. Authentication determines whether an entity is who they claim to be, eg. in the case of an individual, it is usually based on a username/password combination. Authentication does not actually say anything about what someone is authorized to do or has the right to do. o Client-side authentication uses username/password combinations, tokens (dual authentication), and other techniques. o Server-side authentication uses certificates to identify trusted third parties. Authorization is the function of specifying the rights, eg. defining the access rights someone has over a set of recourses such as a private data, computing resources, or an application. When users log into a Security Center system, what they are allowed or authorized to do depends on the set of privileges assigned to them by administrators.
    [Show full text]
  • The First Line of Defense in Security Is the Management of User Ids and Passwords
    User Credential Management The first line of defense in security is the management of user IDs and passwords RouteOne eBook User Credential Management - page 1 User IDs When establishing new user IDs verify that the access (permissions) granted is only what is needed for a user to perform their job. This is referred to as ‘least privilege.’ Often users are granted more access than necessary to perform their responsibilities. A single dealer employee (preferably the Dealer Security Manager) should be given the responsibility to administrator user accounts (IDs and passwords); a second individual should be given responsibility of the backup administrator. Passwords Rules Users that have been terminated by the dealership must have Do not share your passwords. Always make new passwords their access to dealership systems terminated immediately. difficult to guess by mixing letters, numbers, characters and Regardless of whether the user is voluntarily or involuntarily punctuation. The greater the mix, the more difficult the password terminated, their access to dealership systems should be will be to guess. terminated no later than the close-of-business on their last Additional Password Rules: day of employment with the dealership. A user ID that is not deactivated or terminated could be used by the former o Avoid using dictionary words employee or, if known, current employees for malicious o Change your password often activity. o Don’t share them with anyone o The longer, the better o Make it a phrase o Don’t leave them lying around RouteOne eBook User Credential Management - page 2 Multi Factor Authentication RouteOne has implemented Multi-Factor Authentication to further enhance the security of the RouteOne system.
    [Show full text]
  • Cointelegraph Security Token Report
    The Security Token Report 2021 Research Partners We thank our research partners for their support of this report. Authors Demelza Hays, Ph.D. Demelza Hays is the director of research at Cointelegraph, and formerly was a Forbes 30 Under 30, U.S. Department of State Fulbright Scholar, and fund manager of two regulated crypto funds. Katharina Gehra Katharina Gehra is the CEO & Co-Founder of Immutable Insight GmbH and the fund manager of the first German crypto hedge fund, a 3-times Capital Top 40 under 40 and a supervisory board member at Fürstlich Castell’sche Bank. She is the co-host of the blockchain pod- cast Block52. Silvan Thoma and Martin Liebi Silvan Thoma ([email protected]) / Martin Liebi ([email protected]) both PwC Legal, Switzerland advise and have advised multiple digital assets operators in the legal aspects of the issuance of digital assets and the set-up and licensing process of the operation of mul- tilateral trading facilities. Urszula McCormack Partner, Cross-Border Finance and Technology, King & Wood Mallesons. Urszula McCormack is one of Asia’s leading regulatory and digital economy lawyers, with a focus on emerging technologies. Urszula advises global banks, payment institutions, large technology com- panies, virtual asset issuers and innovators on new products, compliance and financial services licensing. She also advises on privacy regulation, digital transformation and algorith- mic design. Urszula is a member of multiple advisory bodies and is regularly invited to brief governments, regulators and transnational policymakers. Urszula is admitted to practice law in Hong Kong, Australia and England & Wales. © Crypto Research Report, © Cointelegraph Research, Security Token Report, 2021 3 Rika Khurdayan and Lee Schneider Rika Khurdayan is a lawyer and strategist, with a particular focus on blockchain and DLT.
    [Show full text]
  • CP (IB) No. 01/MB/2018]
    NCLT Mumbai Bench IA No. 1031/2020 in [CP (IB) No. 01/MB/2018] IN THE NATIONAL COMPANY LAW TRIBUNAL MUMBAI BENCH, SPECIAL BENCH II *** *** *** IA No. 1031 of 2020 in [CP (IB) No. 01/MB/2018] Under Section 60(5) of Insolvency and Bankruptcy Code, 2016 *** *** *** In the matter of STATE BANK OF INDIA Versus VIDEOCON TELECOMMUNICATIONS LIMITED Between ABHIJIT GUHATHAKURTA, Resolution Professional for 13 Videocon Group Companies Flat No. 701, A Wing, Satyam Springs, Cts No. 272a/2/l, Off BSD Marg, Deonar, Mumbai City, Maharashtra, 400088 … Applicant and DEPARTMENT OF TELECOMMUNICATIONS Ministry of Communications, Access Service Branch, AS-1 Division, Sanchar Bhawan, 20, Ashoka Road, New Delhi- 110001 … Respondent No. 1 BANK OF BARODA 3rd Floor, 10/12, Mumbai Samachar Marg, Fort, Mumbai- 400 001 … Respondent No. 2 Date of Order: 07.10.2020 CORAM: Hon’ble Janab Mohammed Ajmal, Member Judicial Hon’ble Ravikumar Duraisamy, Member Technical Appearance: For the Applicant : Senior Counsel Mr. Gaurav Joshi with Ms. Meghna Rajadhyaksha. For the Respondents : None Page 1 of 8 NCLT Mumbai Bench IA No. 1031/2020 in [CP (IB) No. 01/MB/2018] Per: Janab Mohammed Ajmal (Member Judicial) ORDER This is an Application by the Resolution Professional of the Corporate Debtor seeking necessary direction against the Respondent(s). 2. Facts leading to the Application may briefly be stated as follows. The Videocon Telecommunications Limited (hereinafter referred to as the Corporate Debtor) had availed various credit facilities from the State Bank of India and other Banks including Bank of Baroda (Respondent No. 2). The Department of Telecommunications, Government of India (Respondent No.
    [Show full text]
  • Is Payment Tokenization Ready for Primetime?
    Is Payment Tokenization Ready for Primetime? Perspectives from Industry Stakeholders on the Tokenization Landscape Marianne Crowe and Susan Pandy, Federal Reserve Bank of Boston David Lott, Federal Reserve Bank of Atlanta Steve Mott, BetterBuyDesign June 11, 2015 Marianne Crowe is Vice President and Susan Pandy is Director in the Payments Strategies Group at the Federal Reserve Bank of Boston. David Lott is a Payments Risk Expert in the Retail Payments Risk Forum at the Federal Reserve Bank of Atlanta. Steve Mott is the Principal of BetterBuyDesign. The views expressed in this paper are solely those of the authors and do not reflect official positions of the Federal Reserve Banks of Atlanta or Boston or the Federal Reserve System. Mention or display of a trademark, proprietary product or firm in this report does not constitute an endorsement or criticism by the Federal Reserve Bank of Boston or the Federal Reserve System and does not imply approval to the exclusion of other suitable products or firms. The authors would like to thank members of the MPIW and other industry stakeholders for their engagement and contributions to this report. Table of Contents I. Executive Summary ................................................................................................................. 3 II. Introduction .............................................................................................................................. 4 III. Overview of Tokenization ......................................................................................................
    [Show full text]
  • State Bank of India, Maharashtra Circle
    STATE BANK OF INDIA, MAHARASHTRA CIRCLE IMPORTANT ANNOUNCEMENT ENGAGEMENT OF RETIRED OFFICERS/ EMPLOYEES OF STATE BANK OF INDIA/ E-ABs AND RETIRED OFFICERS OF PSBs FOR DIFFERENT ROLES IN ANYTIME CHANNEL VERTICAL ON CONTRACT BASIS (Last Date – 21.06.2020) Applications are invited from retired employees and officers of the State Bank of India/ e-ABs of State Bank of India (retired as Clerical and retired in Scale I to IV) and Retired Officers of other PSBs (retired in Scale I to IV), who retired from Bank’s service on attaining superannuation on or before 31.05.2020 and should not have completed 63 years of age as on 30.06.2020, for engagement in the Anytime Channel Vertical, on contract basis. The applicant should have retired with good track record and no punishment/ penalty should have been inflicted on the retired employee/ officer during five years of his service in the Bank preceding his retirement. The retired employee/officer voluntarily retired/ resigned/suspended/ who have left the Bank otherwise before superannuation are not eligible for consideration for appointment. Applicant should be resident of the area, where AO/RBO is functioninq. Preference will be given to the officials who have worked in ATM operations. All interested eligible retired employees and officers are advised to send a scanned copy of their application as per Annexure II to the email id [email protected] (with cc to [email protected]). The last date for receipt of scanned copy of the application is 21.06.2020. The tentative region wise vacancies of Channel Manager Supervisor (CMS) and Channel Manager Facilitator (CMF) are placed below.
    [Show full text]
  • Financial Performance of State Bank of India and Icici
    FINANCIAL PERFORMANCE OF STATE BANK OF INDIA AND ICICI BANK – A COMPARATIVE STUDY D.Padma1 and V.Arulmathi2 1Associate Professor, Sree Saraswathi Thyagaraja College, Thippampatti, Pollachi, India. Email-id: [email protected] 2M.Phil. Research Scholar, N.G.M. College, Pollachi Abstract State Bank of India (SBI) and ICICI Bank are the two largest banks in India in public and private sector. Performance and efficiency of commercial banks are the key elements of countries financial system. In view of this, the study set out to apply Profitability ratios, Solvency ratios and Management efficiency ratios on SBI and ICICI Bank in order to compare their efficiency and solvency position. On basis of the analysis, it has been found that both the banks are maintaining the required standards and running profitably. This comparative study of SBI and ICICI Bank demonstrates that there are significant differences on the performance of SBI and ICICI Bank in terms of Deposits, Advances, Investments, Net profit, and Total assets. Based on the study, it can be said that SBI have an extensive operation than ICICI Bank. Keywords: SBI, ICICI, Profitability Ratios, Solvency Ratios, Efficiency ratios. 1. INTRODUCTION branches of its five Associate Banks, and is also accountable for one-fifth of the loans of India. It has about 8500 ATMs The banking industry plays an important role in the economic across the nation. development of a country. It supplies the lifeblood-money that supports and fosters growth in all the industries. Growth 1.2 ICICI Bank of the banking sector is measured by the increase in the number of banks’ branches, deposits, credit, etc.
    [Show full text]