Cash Less Society- Digital Payments

Cash Less Society
- Digital Payments
Cash Less Society
a society in which purchases of goods or services are made by credit
card / electronic funds transferral / Digital Wallet rather than with cash
 Digital Footprints (Record mapping).
 Smaller wallets (easy to carry cards, instead of rupees and coins).
 Reduction in counting and accounting time.
 Reduction in the cost of producing/printing coins/notes.
 A healthy Financial Eco-system.
 Cash stolen / Can I borrow – statements will be disappeared.
 May have reward points on certain Digital transactions.
 Impossible to sustain the Black Market
 Criminal activity will be reduced: because it is risky to carry out criminal
transactions. Kashmir is an example, as no such activity like “patthar-baji”,
“danga” will be carried out.
Transactions
Credit / Debit Cards for the month of May
2017
2609.0
361406.8
2163917.8
375084.1
0.0
500000.0
1000000.0
1500000.0
2000000.0
2500000.0
ATM (in millions) PoS (in millions)
Transactions
Credit Cards Debit Cards
ATM (in
millions)
PoS (in
millions)
Credit
Cards 2609.0 361406.8
Debit Cards 2163917.8 375084.1
ATMS PoS
208476 2692986
https://rbi.org.in/scripts/ATMView.aspx
0.0
50.0
100.0
150.0
200.0
250.0
RTGS NEFT CTS* IMPS* NACH* UPI* USSD** Debit and
Credit
Cards at
POS &
PPI # Mobile
Banking
Volume in Million for the month of May
2017
Series1
Volume in Million for the month of May 2017
RTGS NEFT CTS* IMPS* NACH* UPI* USSD**
Debit and
Credit
Cards at
POS &
PPI #
Mobile
Banking
10.4 155.8 97.1 66.7 194.4 9.2 192.6 233.4 91.3 64.9
stats
 Source – ACI Survey
Cash Less Society- Digital Payments
Terms one should know
 Internet Banking
 RTGS : RealTime Gross Settlement
 National Electronics FundsTransfer System (NEFT)
 IMPS : Immediate Payment Services
 DigitalWallet
 Plastic Money
 OTP : One time Password
Terms to know
 Payer
 Payee
 Remitter Bank
 Beneficiary Bank
 NPCI
 BankAccount holders
 Merchants
Funds transfer services
Services
Cash Less Society- Digital Payments
Cash Less Society- Digital Payments
 C2C (Citizen to Citizen) –
 BHIM / UPI –app
 M-Wallets / Paytm
 AEPS
 Internet Banking (RTGS/NEFT)
 Cash
 Paperbased
• G2B (Government to Business)
• Internet Banking (RTGS/NEFT)
• PFMS
• Cash
• Cheque
• Paper based
• G2G (Government to Government)
• PFMS
• NEFT / RTGS
• Paper based
• C2G (Customer to Government) :
• Cash
• NEFT / RTGS
• Online portal
• PoS
• Mobile App
• IMPS
• Sugam / CSC Centres
• Demand Draft / Paper based / Challan
DigitalTransactions
USSD
*99#
Unstructured Supplementary Service Data (USSD)
*99# Facility
Generate MMID and MPIN
 SMS Banking : - SMS <MBSREG> to 9223440000/ 567676
 Customer will receive the User ID and default MPIN via SMS
on Mobile no.
 Change default M-PIN through any one of the chosen modes
(mobile banking application /WAP application / USSD/SMS /
ATM).
 Accepts the terms and conditions.
Cash Less Society- Digital Payments
Cash Less Society- Digital Payments
Cash less transactions using Feature Phones:
 Steps to operate :
 Dial *99#
(for regional language you may dial *99*22#)
 Type Bank Name
 Enter Beneficiary Mobile Number.
 Enter beneficiary MMID -(7 digit Mobile Money Identifier) / Bank IFSC and
Account number / Aadhaar Number
(you will get the same from the person you are sending the money)
 Enter amount and remarks (separated by space)
 Enter M-PIN to authorize the transaction and last 4 digits of your account
number (separated by space), and tap on send.
 Payment done.
Cash Less Society- Digital Payments
Cash less transactions using Feature Phones:
 Problems :
 One have to prompt with in 10 seconds,
Otherwise the transaction fails.
 Number of time an error message is there:
External application down.
 Number should be registered with the bank.
 Daily Limit Rs. 5000/-
Cash less transactions using Feature Phones:
 Benefits :
 No charge
 No roaming charges
 Available in Regional Languages
Point of Sale
PoS
Plastic Money
 Access your funds 24/7 and make purchases at millions of locations worldwide as well
as to make online transaction.
 Can be used at :
 PoS : Point of Sale
 ATM : AutomatedTeller Machine
 Online transaction.
 Types :
 Debit Card : A payment card that deducts money directly from a consumer’s checking
account to pay for a purchase.
 Credit Card: A payment can be made using credit/deduct money from the A/C.
Plastic Money – Prons/Cons
Plastic Money – Prons/Cons
Plastic Money – Prons/Cons
Plastic Money – Prons/Cons
Plastic Money – Prons/Cons
Plastic Money – Prons/Cons
 Non-Acceptance at Small Retail Outlets
 Cannot be used for all daily needs
 Loss & Misuse
 Service Charges
 Damage to Card
 Impulsive Purchases / Overuse of card
 No connectivity
Plastic Money – Security alert
 Report a misplaced / stolen card
 Shhhhhh. Keep your pin secret
 Beware of phishing.
Plastic Money – Understand your debit card
 CVV :Card verification value
 7- Signature Panel
In last two years there is an increase in credit
and debit cards users by 25 and 42 percent
respectively
25
42
Credit Card Debit Card
AxisTitle
Axis Title
%AGE INCREASE
%age increase
PHYSICAL POS
Physical Card Swiping – PTSN
with landline / GPRS enabled
MPOS
Phone connected with external
POS device through jack /
Bluetooth
V-POS
Virtual E-payment Gateway
Types of PoS
PoS : During most of late 1980s and throughout the 90s, stand
alone credit card devices were developed and introduced.
 POS or PoS is an abbreviation for (or Point-of-
Sale, or ).
 The term Point of Sale is often used in connection or
relative with the . In
the case of some locations, with wireless capable
systems or network wired via TCP/IP.
 Term is applicable to a , the checkout/cashier
counter in the store, or a location where such transactions can
occur in this type of environment.
with electronic cash register systems, touch-screen
display, , receipt printers, scales and pole
displays.
Physical PoS
SWIPE A
DEBIT/CREDIT
CARD ON THE POS
MACHINE
1 2 ENTER AMOUNT
TO BE PAID AND
PIN
3 GENERATE
RECEIPT
Installation of Physical PoSTerminal
Open / identify current
account for transactions
1
3 Identify type of PoS
required (landline / GPRS)
2 Fill in the application form
(online / at the branch)
4 Submit following documents:
– Proof of business (any one)
• Shop & establishment registration certificate
• VAT certificate
• Sales tax
– Proof of address
– Photo identity proof of proprietor / partner
– Financial details
• Bank statement
• Income tax return
5 Acceptance of MDR by merchant
6 Execution of Merchant
Establishment Agreement
mPoS – Any GPRS-enabled touch screen mobile
phone could be converted into POS terminal
 a handheld portable device with the ability to carry out a transaction
as same as Physical PoS.
 Used to bridge the gap between POS systems and eCommerce
businesses
 Less Investment.
 Can be use alternatively.
 Affordable to repair or replace
- in a restaurant, a server could
generate the bill at the table itself.
- can used for Cash on Delivery.
Who is providing this service?
There are a number of mPOS
solutions providers in the
world, Infosys, Motorola, HP,
StellaNova, AccuPOS,
Harbortouch to name a few. In
India Mswipe,MRLpay and
Ezetap are prominent names
in this field. UK based
mPOWA recently forayed in
India.
How it works ???
The mobile device could be a tablet,
smartphone and even an iPod Touch. The
basic functioning involves scanning the
product’s barcode or manually entering the
transaction details into the device, swiping the
customer’s card, taking an electronic signature
and even generating a receipt with a portable
printer.
Note: mSwipe is used as an example of MPOS here
Mobile PoS
V-PoS
No PoS machine required
QR code used for payment to bank account
of merchant
Complete privacy of merchant bank account
Benefits
 Depending on the software features, retailers can
track pricing accuracy, inventory changes, gross
revenue and sales patterns. Using integrated
technology to track data helps retailers catch
discrepancies in pricing or cash flow that could
lead to profit loss or interrupt sales. POS systems
that monitor inventory and buying trends can help
retailers avoid customer service issues, such as
out-of-stock sales, and tailor purchasing and
marketing to consumer behavior.
Must DoPractices
• Register your mobile number at bank for regular information by SMS for every
transaction
• Transact at only trusted merchants
• Your Debit card PIN is highly sensitive and should NOT be shared.
• Make sure your PIN is not being observed by anyone while you enter it at the ATM or
while shopping.
• As a preventive measure change your PIN frequently.
• Memorise your PIN. Do not write it anywhere.
• Inform the caretaker / bank immediately in case you find any additional/ suspicious
/loose devices attached to the ATM.
• Press the “Cancel” button in case the ATM screen goes blank or the transaction is not
completed.
• Never forget your debit card at the ATM or billing counter after the transaction.
• Avoid entertaining or engaging in long conversation with strangers while transacting
at an ATM.
Aadhaar Enabled Payment System (AEPS)
Step: 2:
Select option :
• Cash withdraw
• Deposit Cash
• Pay
• Check Balance
• Mini Statement
Step: 1:
VisitAEPS
Step: 3:
Enter Aadhaar Number
and Location
Step: 4:
Scan Biometrics and
collect receipt.
• AEPS transactions happens to 23:00 hours each day
• The settlement is affected by NPCI’s RealTime Gross Settlement (RTGS)
Aadhaar Enabled Payment System (AEPS)
Digital / MobileWallets
M- money
M/D-Wallets
Mobile wallets are essentially digital versions of traditional
wallets that someone would carry in their pocket. They offer
payment services through which the individuals / business can
receive/ send money via mobile devices. While there are many
variations, usually they can hold digital information about
credit and debit cards for making payments, store coupons
and loyalty programmes, specific information about personal
identity and more.
E-Wallets
 Closed : Issued by an entity for facilitating the purchase of goods and services from it.
These instruments do not permit cash withdrawal or redemption. Hence, RBI approval
is not required for issuing them.
 Semi-Closed e-wallets : for purchase of goods and services, including financial
services at merchant locations/ establishments.These wallets do not permit cash
withdrawal or redemption by the holder.These may be recharged upto Rs.10,000/-
only. Eg: Paytm, Freecharge, Momoe, PayUMoney, Mobikwik, Citrus, State Bank
Buddy`, Citi MasterPass, ICICI Pockets, HDFC Chillr, LIME
 Open e-wallets: Used at POS [Point of sale ] terminals like funds transfer at any card
accepting merchant locations eg: E.g. M-Pesa is an open wallet run byVodafone in
partnership with ICICI Bank. Axis Bank’s e-WalletCard’, can used for making
payments on sites that acceptVisa cards, with a minimum limit of Rs 10, and a
maximum limit of Rs 50,000, and a validity of 48 hours.
E-Wallets
 Pre-paid:The wallet have to be recharged
during the transaction or it is to be
recharged earlier.
 Auto/digitalWallet: first register with the
wallet; enter your card details such as card
number, expiry date, CVV and address.This
information is further validated through
one-time password (OTP). Once registered,
you can buy directly with just entering your
OTP.
UsingWallets
CONSUME
R
DOWNLOA
DS THE
APP ON
SMARTPHO
NE
SIGN UP
USING
MOBILE
LOAD MONEY
USING DEBIT
CARD/CREDIT
CARD OF
NETBANKING
START
USING
WALLET
TO MAKE
PAYMENT
S
Consumer Wallet Limits: Rs.20,000/month for all. Rs.1 lakh/month with KYC
SHOPKEEP
ER
/SERVICE
PROVIDER
DOWNLOAD
S THE APP
SIGN UP
USING
MOBILE
SELF
DECLARE
ITSELF AS
A
MERCHAN
T
START
ACCEPTING
PAYMENT
Merchant Wallet Limits: Rs.50,000/month with Self Declaration. Rs.1 lakh/month with KYC
Basic Requirements to Start Using a Wallet: Bank Account, Smartphone, 2G/3G/4G Connection & A Free Wallet
App
Cash Less Society- Digital Payments
Cash Less Society- Digital Payments
Cash Less Society- Digital Payments
UPI
Unified Payments Interface
 A system that powers multiple bank accounts into a
single mobile application
 seamless fund routing
 “Peer to Peer” collect request
 Launched on 11th April 2016 by Dr. Raghuram G
Rajan, Governor, RBI at Mumbai
 Transaction limit 1 L per transaction
Uniqueness
 Immediate money transfer
 Virtual address Payment (VPA) of the customer for
Pull & Push (no other details required).
mmahajan@upi
 Single mobile application for accessing different
bank accounts - Interoperable
 PUSH and PULL Payments + Scheduling
Uniqueness
 Raising Complaint from Mobile App directly.
 Single Click 2 Factor Authentication (Mobile number +
MPIN + App PIN+OTP)
 Utility Bill Payments, Over the Counter Payments,
Barcode/ QCode (Scan and Pay) based payments.
 No need to share your name, your bank account number,
IFSC code, or bank branch
 .No physical device like : debit card etc required
Download App
 For Smart Phones:
 GoTo GOOGLE PLAY STORE Or iStore & SearchWithThe Keyword “UPI”
 You Can DownloadYour Bank UPIApp Or Any One of the following UPI Apps
S. No. Bank Name Android APP Name
1 State Bank of India SBI Pay
2 Andhra Bank Andhra Bank ONE – UPI App
3 ICICI Bank a. UPI Collect (or)
4 Canara Bank Canara Bank UPI - Empower
5 United Bank of India United UPI
6 Punjab National Bank PNB UPI
7 South Indian Bank SIB M-Pay
8 Vijaya Bank Vijaya UPI
9 AXIS Bank Axis Pay UPI App
10 Union Bank of India Union Bank UPI App
Update profile and set UPI PIN
Push – Pay Money
•User log-in to UPI application
•After successful login, user selects the option of Send
Money / Payment
•User enters beneficiary’s / Payee virtual id, amount and
selects account to be debited
•User gets confirmation screen to review the payment details
and clicks on Confirm
•User now enters MPIN
•User gets successful or failure message
Pull- Requesting Money Bill Sharing with friends.
Pull- Requesting Money Bill Sharing with friends.
• User log-in to his bank’s UPI application
• After successful login, user selects the option of collect money (request for
payment)
• User enters remitters / payers virtual id, amount and account to be credited
• User gets confirmation screen to review the payment details and clicks on
confirm
• The payer will get the notification on his mobile for request money
• Payer now clicks on the notification and opens his banks UPI app where he
reviews payment request
• Payer then decides to click on accept or decline
• In case of accept payment, payer will enter MPIN to authorize the transaction
• Transaction complete, payer gets successful or decline transaction notification
• Payee / requester gets notification and SMS from bank for credit of his bank
account
Payment using QR Code
 QR Code : QR code consists of black modules arranged in a square
pattern on a white background. The information encoded can be
made up of four standardized kinds (“modes”) of data (numeric,
alphanumeric, byte/binary, Kanji-logographic), or by supported
extensions virtually any kind of data. QR codes can be used for
proximity payments with UPI .Developers who are developing
merchant applications must generate a URL fully compliant to
specification in previous section and then create a QR code of that
URL.
Add Accounts
 Go to profile
 Add Account
 Enter Bank details
 Confirm the details by input
the Debit Card details.
 Generate M-PIN
Generate M-PIN:
• User receives OTP from the Issuer bank on
his/her registered mobile number
• User now enters last 6 digits of Debit card
number and expiry date
• User enters OTP and enters his preferred
numeric MPIN (MPIN that he would like to
set) and clicks on Submit
• After clicking submit, customer gets
notification (successful or decline)
Change M-PIN
• User enters his old MPIN and preferred new
MPIN (MPIN that he would like to set) and
clicks on Submit
• After clicking submit, customer gets
notification (successful or failure)
Bharat Interface for Money
BHIM snap shot
- usingVPA
BHIM –snapshot
-using Mobile No.
BHIM –snapshot
-using A/C No. &
IFSC
BHIM –snapshot
-using Mobile No.
Collect Money
Notification and Pay after Pull Service
Internet Banking
IB
Internet Banking
 A banking system in which an individual/organization will perform the
transactions remotely by using login credentials.
 How to use
 Register with Bank; have your login credentials
 Boot a machine (Smartphone/Leaptop/ Desktop) ; connect with internet; open
banks portal and go to Online banking ; Enter Login credentials.
 Benefits:
 24*7*365 Banking
 Any place
 Customer Convenience (no need to stand on queue and wait)
 Beware from
 Malware/ Spyware in the machine.
 Sharing of login credentials
 Phishing
Snap shot
RTGS : RealTime Gross Settlement (for Funds
transfer)
 (The RTGS system is primarily meant for large value transactions.The minimum amount to be
remitted through RTGS is Rs 2 lakh.The maximum limit is Rs 10 lakh per day.)
 Average charges :
Amount above Rs 2 lakh upto Rs 5 lakh - Rs 25 + ServiceTax
Amount above Rs 5 lakh upto Rs 10 lakh - Rs 50 + ServiceTax
 Timings :
The beneficiary bank has to credit the beneficiary's account within 30 minutes of receiving the funds
transfer message.
NEFT: National Electronics FundsTransfer System
 Operates on a Deferred Net Settlement (DNS) basis which settles transactions in batches
(the settlement takes place with all transactions received till the particular cut-off time.)
 Average charges :
 For transactions up to ₹10,000 (not exceeding) : ₹2.50 (+ Service Tax)
 For transactions above ₹10,000 up to ₹1 lakh (not exceeding) : ₹5 (+ Service Tax)
 For transactions above ₹1 lakh and up to ₹2 lakhs (not exceeding) : ₹15 (+ Service Tax)
 For transactions above ₹2 lakhs : ₹25 (+ Service Tax)
 Batch timings :
 NEFT operates in hourly batches - there are eleven settlements from 9:00 AM to 7:00 PM on week
days and five settlements from 9 am to 1 pm on Saturdays
How the RTGS / NEFT transactions take place:
 The branch should be RTGS/NEFT enabled.
 An individual / organization may perform this transaction by using the Internet
Banking.
 An individual / organization may perform this transaction by visiting the bank. (may
have / or have not the BankAccount)
How the transaction take place using Internet
Banking
 Timing 0800AM to 0800PM
 Charges Rs. 5/- per transaction.
Bit Coin
Cyber Security
Cyber Crimes
• Identity Theft
• Spam and Cyber Stalking
• Infringement of privacy
• Hacking (White Hat ,Black Hat ,Grey Hat )
• Script kiddie: They are the unskilled hackers who break into computer systems by using automated tools
written by others.
• Neophyte: They are new to hacking or phreaking.
• Blue hat: These people’s expertise are used to bug-test a system prior to its launch
• Hacktivist: Hacktivism can be divided into two main groups:
• Cyberterrorism :Terrorism in cyber world is cyberterrorism. Section 66F of the ITA Act, 2008 defines the
word cyber terrorism
• Freedom of information
• Child Pornography & Pornography
• Cyber Warfare
• Cyber Squatting
• Economic Espionage
• Software Piracy and other Copyright Violation
• Computer Forgery and Counterfeiting
• Sabotage and Extortion by using Computer.
• Defamation, Hate Speech, Racist, Blogs and Xenophobic Propaganda
• Online Gambling
• Email Spoofing
• Data Dibbling
• Web Jacking and Email Bombing
Terminology used in the world of Cyber attack
 Access - To interact with a
system.
 Active Attack - attempts to
alter a system
 Blacklist - blocked or denied
privileges
 Bot -Internet connected
system is secretly
compromised
 Cryptography -
mathematical algos to
provide security services
 Digital Forensics - analysing
digital evidences
 Intrusion Detection -
methods for analyzing
information, if a security
violation has occurred.
 Key - numerical value used
to control cryptographic
operations
 Malware - software that
performs an unauthorized
operation
 Passive Attack - make use of
information but does not
attempt to alter the system
 PenetrationTesting - evaluation
methodology
 Phishing - A digital form of social
engineering to deceive individuals
into providing sensitive
information.
 Root - a set of tools to hide their
presence and control the
activities.
 Virus - infect a computer and
replicate
 Whitelist - A list of entities that
are considered trustworthy and
are granted access or privileges.
 Data Breach - disclosure of
sensitive info
Mobile- threat
 Mobile malware is rising fast, infecting nearly 13 million phones in the world during the
year first half of 2012, up to 177% from the same period a year ago.This came as the
security vendor found 5,582 malware programs designed for Android during the
month, another unprecedented number for the period.
 AndroidTrojan: ZitMo
 GIngerBreak
 AcnetSteal
 Cawitt
 FakeToken: steals both banking authentication factors directly from the mobile device
Cyber Security – good steps
 PCI DSS is current industry security standard set by American Express,Visa
International, MasterCardWorldwide – an essential certification.
 These companies use 128-bit encryption technology to crypt any information transfer
between two systems (It takes more than hundred trillion years to crack a password
under 128-bit encryption!) .
 Spreading awareness
Stop; think; connect
 #Never share your Username and Password.
 #Avoid login from other’s Mobiles & Computers.
 #Use a strong Password
 #Change your Password at regular intervals.
 #Use Antivirus, Antispyware and firewalls
 #Run Updates regularly
 #Use Encryption
 #Don’t share your personal / sensitive information
Stop; think; connect
 #Use less-targeted browser such as Chrome or Firefox.
 #Ask loudly for your right to privacy: Don’t ever say I have nothing to hide, because that’s
equivalent to I don’t care about this right.
 #Be careful what you download, and ask questions about the site you are downloading
from.
Stop; think; connect
 # Never plug your USB/Phone at the place you don’t trust.
 # Clean your device or remove old software or packages.
 # Frequent data backups at multiple locations.
 # Use encryption to protect confidential information stored on your phone.
Stop; think; connect
 # Patterns Lock: Set your smartphone to lock after a short idle time, and set it to
require authentication for unlocking. If at all possible, use something stronger than a
simple-minded four-digit PIN.
 #Alert before Install: Mobile devices are an open gate to our privacy, secrets, and
money (mobile banking), be alert before you install any application.
 # useVPN ;For publicWifi;
 #Turn yourWi-Fi and Bluetooth off when you don’t use them.
 # Disable java on browser
Stop; think; connect
 #Fake emails: Never click links in emails or texts that seem to come from your bank,
the IRS, or any other institution. If you think the message might be valid, log into your
account directly, without using the supplied link.
 #2FA: For social Media; always use 2-factor authentication mode.
 #SSL: For online transaction check for https:// (secure socket layer)
 #Phishing: Be careful on which site you are at. (Beware of phishing).
 # Never save your card details during transaction.
Stop; think; connect
 #Use virtual keyboard during transaction.
 #Trust no facebook friend; the hackers may be your friend by a fake profile and steal
your information.
 #Check your bank statement in a week, to avoid phishing/fraud.
 #Prioritize your accounts and secure them,
 #Never access zip/rar files; sent from unknown users.
 #Webpages may have ads; or some ads may have malware; to protect the system ;
Block Pop-ups or use anti-Adware software/blocker. Don’t click any banner / adult
image.
Stop; think; connect
 Protecting your password:
 Who’s looking over your shoulder?
 Did you know that bystanders or co-workers can steal your passwords only by peeking at what
you’re typing?
 This is especially true is your passwords are as easy as 123456 (please change them if it’s the
case).
 Take a look around and make sure everything’s safe before typing a password. Also: NEVER
share your passwords. Ever.
 If it’s your system; check the keyboard plug-in device that no “”keylogger” is attached.
 Don’t do real time geo-tagging
Stop; think; connect
 If you want air-tight security for your email account, check the
following:
 Your recovery information (create multiple accounts)
 Your recent activity
 Your account permissions
 Your app passwords
 Your 2-step verification settings.
Stop; think; connect
 keep your inbox and devices safe:
 Be careful where you submit your email address
 Unsubscribe from any unnecessary newsletters
 Use filters and mark emails as spam to help your email provider block it more effectively
 NEVER click on links in spam emails
 NEVER download and open attachments in spam emails
 Disable the automatic downloading of HTML graphics in your mails
 Open an additional email account to keep your most important one safe
 When using social media, enhance your privacy settings so no one can see your email
account
 If you have a website, protect your email address from automatically being scanned and
harvested by spammers.
Check out for the fake profile in Social Media
 Step 1: Download the profile picture.
 Step 2: Use https://www.tineye.com/ or Google image search to see if that profile pic is
a stock photo or if someone else has used it. If it’s fake, lots of results will pop up.
Google Activity log – an example
 It will show you from what browsers and devices you’ve accessed it, when and from
what IP. If there’s something that you don’t recognize there or an old session from a
friend’s computer, you can choose to terminate it.
 Same option is available for many other online accounts, such as Facebook,Yahoo or
Dropbox.Access it to monitor where your accounts have been used and end any
sessions that you don’t recognize.
 If you also activate two-factor authentication, your accounts will be more secure
against intruders.
Cyber crime as business
 Search for new ways to monetize their attacks (sell data on the DarkWeb, purchase
new types of ransomware that is impossible to break, etc.);
 Monitor their income and use all kinds of tactics to expand their reach, harvest more
data and launch stronger and more lucrative attacks;
 Hire blackhat hackers to do it (they’re the bad kind, because there are good hackers
too – the whitehat kind);
 Invest in acquiring infrastructure they can use to launch attacks and keep them
anonymous;
 Buy exploit kits and ready-made malware that can be deployed instantly.
Challenges
Challenges
 Digital Divide
 Unavailability of user interface in regional languages across devices that support cashless
payments.
 Unavailability of devices
 Unavailability of Internet Facility
 Percentage of Digital Illiterate.
 Mind set / distrust towards application.
 Cyber Security: Without proper precautions and security policies, the highly reactive
nature of cyber security leaves us vulnerable to cyber attacks
Training Strategy
…… a beginning
ManuMahajan,CoreFaculty
+91-177-2734-620 & +91-988-25-93-423
1 de 104

Recomendados

Unified payment interface por
Unified payment interfaceUnified payment interface
Unified payment interfaceRavi Raj Kamal
1.3K visualizações8 slides
Fintech por
FintechFintech
FintechNamrataChettri
778 visualizações13 slides
Digital payment por
Digital paymentDigital payment
Digital paymentRushikesh Maddalwar
1.1K visualizações18 slides
Unified Payments Interface (UPI) - Introduction por
Unified Payments Interface (UPI) - Introduction Unified Payments Interface (UPI) - Introduction
Unified Payments Interface (UPI) - Introduction indiastack
9.7K visualizações14 slides
E wallet por
E walletE wallet
E walletMrunmayee Joshi
5.3K visualizações30 slides
Digital Payment Campaign por
Digital Payment CampaignDigital Payment Campaign
Digital Payment Campaignpankajkumar3274
350 visualizações50 slides

Mais conteúdo relacionado

Mais procurados

E wallet- final por
E wallet- finalE wallet- final
E wallet- finalAnshuman Roy
855 visualizações15 slides
Overview of digital payments in india por
Overview of digital payments in india Overview of digital payments in india
Overview of digital payments in india Mathew Chacko
2.7K visualizações22 slides
Digital Payment-Revolution in India por
Digital Payment-Revolution in IndiaDigital Payment-Revolution in India
Digital Payment-Revolution in IndiaBinod Sinha
3K visualizações71 slides
Digital banking and its benefits por
Digital banking and its benefitsDigital banking and its benefits
Digital banking and its benefitsVijaya Bank
1.7K visualizações10 slides
Unified payments interface (upi) por
Unified payments interface (upi)Unified payments interface (upi)
Unified payments interface (upi)Naina Singh
1.6K visualizações8 slides
Digital payments por
Digital paymentsDigital payments
Digital paymentsVenkatesh Kumar Maale
6K visualizações46 slides

Mais procurados(20)

E wallet- final por Anshuman Roy
E wallet- finalE wallet- final
E wallet- final
Anshuman Roy855 visualizações
Overview of digital payments in india por Mathew Chacko
Overview of digital payments in india Overview of digital payments in india
Overview of digital payments in india
Mathew Chacko2.7K visualizações
Digital Payment-Revolution in India por Binod Sinha
Digital Payment-Revolution in IndiaDigital Payment-Revolution in India
Digital Payment-Revolution in India
Binod Sinha3K visualizações
Digital banking and its benefits por Vijaya Bank
Digital banking and its benefitsDigital banking and its benefits
Digital banking and its benefits
Vijaya Bank1.7K visualizações
Unified payments interface (upi) por Naina Singh
Unified payments interface (upi)Unified payments interface (upi)
Unified payments interface (upi)
Naina Singh1.6K visualizações
Digital payments por Chinnaiah S Vivek
Digital paymentsDigital payments
Digital payments
Chinnaiah S Vivek3.3K visualizações
Modes of Cashless Transactions - Cash-less Indian Economy por Rajan Chhangani
Modes of Cashless Transactions - Cash-less Indian EconomyModes of Cashless Transactions - Cash-less Indian Economy
Modes of Cashless Transactions - Cash-less Indian Economy
Rajan Chhangani2.6K visualizações
Consumers Perception Towards Growing Mobile-Wallet por Ashitha Devan
Consumers Perception Towards Growing Mobile-WalletConsumers Perception Towards Growing Mobile-Wallet
Consumers Perception Towards Growing Mobile-Wallet
Ashitha Devan30.4K visualizações
Innovation led Digital payments Seminar por TechXpla
Innovation led Digital payments Seminar Innovation led Digital payments Seminar
Innovation led Digital payments Seminar
TechXpla2.3K visualizações
Digital Payment System por poojaagrawal153
Digital Payment SystemDigital Payment System
Digital Payment System
poojaagrawal153442 visualizações
UPI Presentation.pptx por RaushanKumar375157
UPI Presentation.pptxUPI Presentation.pptx
UPI Presentation.pptx
RaushanKumar3751574.2K visualizações
Paytm ppt por Sukeerth cherry
Paytm pptPaytm ppt
Paytm ppt
Sukeerth cherry17.8K visualizações
Upi, e wallets &amp; other digital payments por Arshit Agarwal
Upi, e wallets &amp; other digital paymentsUpi, e wallets &amp; other digital payments
Upi, e wallets &amp; other digital payments
Arshit Agarwal2.8K visualizações
Towards cashless economy por Jithin Parakka
Towards cashless economyTowards cashless economy
Towards cashless economy
Jithin Parakka8.2K visualizações
Understanding Digital Payments por Santosh Potadar
Understanding Digital PaymentsUnderstanding Digital Payments
Understanding Digital Payments
Santosh Potadar1.5K visualizações
E Banking por cssangoram
E BankingE Banking
E Banking
cssangoram143K visualizações
Payment Gateway Integration: Growth Strategy for SAAS por Wayne Akey
Payment Gateway Integration: Growth Strategy for SAASPayment Gateway Integration: Growth Strategy for SAAS
Payment Gateway Integration: Growth Strategy for SAAS
Wayne Akey1.3K visualizações
Payments 101 - Visual Diagrams por Kapish Kaushal
Payments 101 - Visual DiagramsPayments 101 - Visual Diagrams
Payments 101 - Visual Diagrams
Kapish Kaushal1.3K visualizações
Unified payment interface por pranoy_seenu
Unified payment interfaceUnified payment interface
Unified payment interface
pranoy_seenu748 visualizações

Similar a Cash Less Society- Digital Payments

Digital payments Presentations por
Digital payments PresentationsDigital payments Presentations
Digital payments PresentationsTRIPLE S PORTFOLIO
25.6K visualizações16 slides
E commerce cashless payment system por
E commerce cashless payment systemE commerce cashless payment system
E commerce cashless payment systemMeet Shah
1.7K visualizações13 slides
Digital Payments Growth Strategy - Citi Challenge por
Digital Payments Growth Strategy - Citi ChallengeDigital Payments Growth Strategy - Citi Challenge
Digital Payments Growth Strategy - Citi ChallengeKaran Chhabra
466 visualizações8 slides
Signification of Digital Payment in today's banking por
Signification of Digital Payment in today's bankingSignification of Digital Payment in today's banking
Signification of Digital Payment in today's bankingAnkit Aman
311 visualizações39 slides
E banking por
E bankingE banking
E bankingmaartinaa
5.8K visualizações28 slides
Technology Changing The Face Of Microfinance por
Technology Changing The Face Of MicrofinanceTechnology Changing The Face Of Microfinance
Technology Changing The Face Of MicrofinanceJohn Owens
1.6K visualizações40 slides

Similar a Cash Less Society- Digital Payments(20)

Digital payments Presentations por TRIPLE S PORTFOLIO
Digital payments PresentationsDigital payments Presentations
Digital payments Presentations
TRIPLE S PORTFOLIO25.6K visualizações
E commerce cashless payment system por Meet Shah
E commerce cashless payment systemE commerce cashless payment system
E commerce cashless payment system
Meet Shah1.7K visualizações
Digital Payments Growth Strategy - Citi Challenge por Karan Chhabra
Digital Payments Growth Strategy - Citi ChallengeDigital Payments Growth Strategy - Citi Challenge
Digital Payments Growth Strategy - Citi Challenge
Karan Chhabra466 visualizações
Signification of Digital Payment in today's banking por Ankit Aman
Signification of Digital Payment in today's bankingSignification of Digital Payment in today's banking
Signification of Digital Payment in today's banking
Ankit Aman311 visualizações
E banking por maartinaa
E bankingE banking
E banking
maartinaa5.8K visualizações
Technology Changing The Face Of Microfinance por John Owens
Technology Changing The Face Of MicrofinanceTechnology Changing The Face Of Microfinance
Technology Changing The Face Of Microfinance
John Owens1.6K visualizações
Atm (bm) por Neha Patel
Atm (bm)Atm (bm)
Atm (bm)
Neha Patel26.8K visualizações
Electronic payment system por Ayush G. Kottary
Electronic payment systemElectronic payment system
Electronic payment system
Ayush G. Kottary550 visualizações
Out sources of atm por Dharmik
Out sources of atmOut sources of atm
Out sources of atm
Dharmik 5.8K visualizações
Cashless economy - Presentation of Cashless economy methods to follow por Abhinav Reddy Lattu
Cashless economy - Presentation of Cashless economy methods to followCashless economy - Presentation of Cashless economy methods to follow
Cashless economy - Presentation of Cashless economy methods to follow
Abhinav Reddy Lattu10.4K visualizações
cashlesseconomyppt-171212063021 (1).pdf por DarshanAgrawal18
cashlesseconomyppt-171212063021 (1).pdfcashlesseconomyppt-171212063021 (1).pdf
cashlesseconomyppt-171212063021 (1).pdf
DarshanAgrawal188 visualizações
ATM and E- Banking por AniketPujari
ATM and E- BankingATM and E- Banking
ATM and E- Banking
AniketPujari294 visualizações
electronic commerce payment systems por tumetr1
electronic commerce payment systemselectronic commerce payment systems
electronic commerce payment systems
tumetr11.7K visualizações
Seminar on atm por khurda
Seminar on atmSeminar on atm
Seminar on atm
khurda24.5K visualizações
Payment trends 2016 por kay_sjc
Payment trends 2016Payment trends 2016
Payment trends 2016
kay_sjc350 visualizações
Mk seminar por HCL Technologies
Mk seminarMk seminar
Mk seminar
HCL Technologies375 visualizações
Mk seminar por HCL Technologies
Mk seminarMk seminar
Mk seminar
HCL Technologies249 visualizações

Mais de mahajanmanu

Information and communication technology por
Information and communication technologyInformation and communication technology
Information and communication technologymahajanmanu
423 visualizações43 slides
E services por
E servicesE services
E servicesmahajanmanu
408 visualizações54 slides
E governance por
E governanceE governance
E governancemahajanmanu
171 visualizações63 slides
Computer basics por
Computer basicsComputer basics
Computer basicsmahajanmanu
701 visualizações96 slides
Tally por
TallyTally
Tallymahajanmanu
1.2K visualizações24 slides
Office management por
Office managementOffice management
Office managementmahajanmanu
157 visualizações17 slides

Mais de mahajanmanu(10)

Information and communication technology por mahajanmanu
Information and communication technologyInformation and communication technology
Information and communication technology
mahajanmanu423 visualizações
E services por mahajanmanu
E servicesE services
E services
mahajanmanu408 visualizações
E governance por mahajanmanu
E governanceE governance
E governance
mahajanmanu171 visualizações
Computer basics por mahajanmanu
Computer basicsComputer basics
Computer basics
mahajanmanu701 visualizações
Tally por mahajanmanu
TallyTally
Tally
mahajanmanu1.2K visualizações
Office management por mahajanmanu
Office managementOffice management
Office management
mahajanmanu157 visualizações
IT tools in research methodology por mahajanmanu
IT tools in research methodologyIT tools in research methodology
IT tools in research methodology
mahajanmanu395 visualizações
How to google por mahajanmanu
How to googleHow to google
How to google
mahajanmanu57 visualizações
Grievance Redressal mechanism por mahajanmanu
Grievance Redressal mechanismGrievance Redressal mechanism
Grievance Redressal mechanism
mahajanmanu613 visualizações
ICT - an introduction in Government setup por mahajanmanu
ICT - an introduction in Government setupICT - an introduction in Government setup
ICT - an introduction in Government setup
mahajanmanu139 visualizações

Último

20231123_Camunda Meetup Vienna.pdf por
20231123_Camunda Meetup Vienna.pdf20231123_Camunda Meetup Vienna.pdf
20231123_Camunda Meetup Vienna.pdfPhactum Softwareentwicklung GmbH
45 visualizações73 slides
PRODUCT PRESENTATION.pptx por
PRODUCT PRESENTATION.pptxPRODUCT PRESENTATION.pptx
PRODUCT PRESENTATION.pptxangelicacueva6
18 visualizações1 slide
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... por
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...The Digital Insurer
24 visualizações52 slides
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 por
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院IttrainingIttraining
69 visualizações8 slides
MVP and prioritization.pdf por
MVP and prioritization.pdfMVP and prioritization.pdf
MVP and prioritization.pdfrahuldharwal141
37 visualizações8 slides
HTTP headers that make your website go faster - devs.gent November 2023 por
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023Thijs Feryn
26 visualizações151 slides

Último(20)

PRODUCT PRESENTATION.pptx por angelicacueva6
PRODUCT PRESENTATION.pptxPRODUCT PRESENTATION.pptx
PRODUCT PRESENTATION.pptx
angelicacueva618 visualizações
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... por The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
The Digital Insurer24 visualizações
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 por IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
IttrainingIttraining69 visualizações
MVP and prioritization.pdf por rahuldharwal141
MVP and prioritization.pdfMVP and prioritization.pdf
MVP and prioritization.pdf
rahuldharwal14137 visualizações
HTTP headers that make your website go faster - devs.gent November 2023 por Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn26 visualizações
Evolving the Network Automation Journey from Python to Platforms por Network Automation Forum
Evolving the Network Automation Journey from Python to PlatformsEvolving the Network Automation Journey from Python to Platforms
Evolving the Network Automation Journey from Python to Platforms
Network Automation Forum17 visualizações
Info Session November 2023.pdf por AleksandraKoprivica4
Info Session November 2023.pdfInfo Session November 2023.pdf
Info Session November 2023.pdf
AleksandraKoprivica415 visualizações
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... por TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc72 visualizações
"Surviving highload with Node.js", Andrii Shumada por Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays33 visualizações
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors por sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab23 visualizações
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf por Dr. Jimmy Schwarzkopf
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf
Dr. Jimmy Schwarzkopf24 visualizações
Democratising digital commerce in India-Report por Kapil Khandelwal (KK)
Democratising digital commerce in India-ReportDemocratising digital commerce in India-Report
Democratising digital commerce in India-Report
Kapil Khandelwal (KK)20 visualizações
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... por Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Jasper Oosterveld27 visualizações
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... por Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker48 visualizações
Data Integrity for Banking and Financial Services por Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely29 visualizações
STPI OctaNE CoE Brochure.pdf por madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb14 visualizações
Case Study Copenhagen Energy and Business Central.pdf por Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana17 visualizações
Igniting Next Level Productivity with AI-Infused Data Integration Workflows por Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software317 visualizações
Ransomware is Knocking your Door_Final.pdf por Security Bootcamp
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdf
Security Bootcamp66 visualizações

Cash Less Society- Digital Payments

  • 1. Cash Less Society - Digital Payments
  • 2. Cash Less Society a society in which purchases of goods or services are made by credit card / electronic funds transferral / Digital Wallet rather than with cash
  • 3.  Digital Footprints (Record mapping).  Smaller wallets (easy to carry cards, instead of rupees and coins).  Reduction in counting and accounting time.  Reduction in the cost of producing/printing coins/notes.  A healthy Financial Eco-system.  Cash stolen / Can I borrow – statements will be disappeared.  May have reward points on certain Digital transactions.  Impossible to sustain the Black Market  Criminal activity will be reduced: because it is risky to carry out criminal transactions. Kashmir is an example, as no such activity like “patthar-baji”, “danga” will be carried out.
  • 4. Transactions Credit / Debit Cards for the month of May 2017 2609.0 361406.8 2163917.8 375084.1 0.0 500000.0 1000000.0 1500000.0 2000000.0 2500000.0 ATM (in millions) PoS (in millions) Transactions Credit Cards Debit Cards ATM (in millions) PoS (in millions) Credit Cards 2609.0 361406.8 Debit Cards 2163917.8 375084.1 ATMS PoS 208476 2692986 https://rbi.org.in/scripts/ATMView.aspx
  • 5. 0.0 50.0 100.0 150.0 200.0 250.0 RTGS NEFT CTS* IMPS* NACH* UPI* USSD** Debit and Credit Cards at POS & PPI # Mobile Banking Volume in Million for the month of May 2017 Series1 Volume in Million for the month of May 2017 RTGS NEFT CTS* IMPS* NACH* UPI* USSD** Debit and Credit Cards at POS & PPI # Mobile Banking 10.4 155.8 97.1 66.7 194.4 9.2 192.6 233.4 91.3 64.9
  • 6. stats  Source – ACI Survey
  • 8. Terms one should know  Internet Banking  RTGS : RealTime Gross Settlement  National Electronics FundsTransfer System (NEFT)  IMPS : Immediate Payment Services  DigitalWallet  Plastic Money  OTP : One time Password
  • 9. Terms to know  Payer  Payee  Remitter Bank  Beneficiary Bank  NPCI  BankAccount holders  Merchants
  • 14.  C2C (Citizen to Citizen) –  BHIM / UPI –app  M-Wallets / Paytm  AEPS  Internet Banking (RTGS/NEFT)  Cash  Paperbased • G2B (Government to Business) • Internet Banking (RTGS/NEFT) • PFMS • Cash • Cheque • Paper based • G2G (Government to Government) • PFMS • NEFT / RTGS • Paper based • C2G (Customer to Government) : • Cash • NEFT / RTGS • Online portal • PoS • Mobile App • IMPS • Sugam / CSC Centres • Demand Draft / Paper based / Challan DigitalTransactions
  • 16. Unstructured Supplementary Service Data (USSD) *99# Facility
  • 17. Generate MMID and MPIN  SMS Banking : - SMS <MBSREG> to 9223440000/ 567676  Customer will receive the User ID and default MPIN via SMS on Mobile no.  Change default M-PIN through any one of the chosen modes (mobile banking application /WAP application / USSD/SMS / ATM).  Accepts the terms and conditions.
  • 20. Cash less transactions using Feature Phones:  Steps to operate :  Dial *99# (for regional language you may dial *99*22#)  Type Bank Name  Enter Beneficiary Mobile Number.  Enter beneficiary MMID -(7 digit Mobile Money Identifier) / Bank IFSC and Account number / Aadhaar Number (you will get the same from the person you are sending the money)  Enter amount and remarks (separated by space)  Enter M-PIN to authorize the transaction and last 4 digits of your account number (separated by space), and tap on send.  Payment done.
  • 22. Cash less transactions using Feature Phones:  Problems :  One have to prompt with in 10 seconds, Otherwise the transaction fails.  Number of time an error message is there: External application down.  Number should be registered with the bank.  Daily Limit Rs. 5000/-
  • 23. Cash less transactions using Feature Phones:  Benefits :  No charge  No roaming charges  Available in Regional Languages
  • 25. Plastic Money  Access your funds 24/7 and make purchases at millions of locations worldwide as well as to make online transaction.  Can be used at :  PoS : Point of Sale  ATM : AutomatedTeller Machine  Online transaction.  Types :  Debit Card : A payment card that deducts money directly from a consumer’s checking account to pay for a purchase.  Credit Card: A payment can be made using credit/deduct money from the A/C.
  • 26. Plastic Money – Prons/Cons
  • 27. Plastic Money – Prons/Cons
  • 28. Plastic Money – Prons/Cons
  • 29. Plastic Money – Prons/Cons
  • 30. Plastic Money – Prons/Cons
  • 31. Plastic Money – Prons/Cons  Non-Acceptance at Small Retail Outlets  Cannot be used for all daily needs  Loss & Misuse  Service Charges  Damage to Card  Impulsive Purchases / Overuse of card  No connectivity
  • 32. Plastic Money – Security alert  Report a misplaced / stolen card  Shhhhhh. Keep your pin secret  Beware of phishing.
  • 33. Plastic Money – Understand your debit card  CVV :Card verification value  7- Signature Panel
  • 34. In last two years there is an increase in credit and debit cards users by 25 and 42 percent respectively 25 42 Credit Card Debit Card AxisTitle Axis Title %AGE INCREASE %age increase
  • 35. PHYSICAL POS Physical Card Swiping – PTSN with landline / GPRS enabled MPOS Phone connected with external POS device through jack / Bluetooth V-POS Virtual E-payment Gateway Types of PoS
  • 36. PoS : During most of late 1980s and throughout the 90s, stand alone credit card devices were developed and introduced.  POS or PoS is an abbreviation for (or Point-of- Sale, or ).  The term Point of Sale is often used in connection or relative with the . In the case of some locations, with wireless capable systems or network wired via TCP/IP.  Term is applicable to a , the checkout/cashier counter in the store, or a location where such transactions can occur in this type of environment. with electronic cash register systems, touch-screen display, , receipt printers, scales and pole displays.
  • 37. Physical PoS SWIPE A DEBIT/CREDIT CARD ON THE POS MACHINE 1 2 ENTER AMOUNT TO BE PAID AND PIN 3 GENERATE RECEIPT
  • 38. Installation of Physical PoSTerminal Open / identify current account for transactions 1 3 Identify type of PoS required (landline / GPRS) 2 Fill in the application form (online / at the branch) 4 Submit following documents: – Proof of business (any one) • Shop & establishment registration certificate • VAT certificate • Sales tax – Proof of address – Photo identity proof of proprietor / partner – Financial details • Bank statement • Income tax return 5 Acceptance of MDR by merchant 6 Execution of Merchant Establishment Agreement
  • 39. mPoS – Any GPRS-enabled touch screen mobile phone could be converted into POS terminal  a handheld portable device with the ability to carry out a transaction as same as Physical PoS.  Used to bridge the gap between POS systems and eCommerce businesses  Less Investment.  Can be use alternatively.  Affordable to repair or replace - in a restaurant, a server could generate the bill at the table itself. - can used for Cash on Delivery.
  • 40. Who is providing this service? There are a number of mPOS solutions providers in the world, Infosys, Motorola, HP, StellaNova, AccuPOS, Harbortouch to name a few. In India Mswipe,MRLpay and Ezetap are prominent names in this field. UK based mPOWA recently forayed in India.
  • 41. How it works ??? The mobile device could be a tablet, smartphone and even an iPod Touch. The basic functioning involves scanning the product’s barcode or manually entering the transaction details into the device, swiping the customer’s card, taking an electronic signature and even generating a receipt with a portable printer.
  • 42. Note: mSwipe is used as an example of MPOS here Mobile PoS
  • 43. V-PoS No PoS machine required QR code used for payment to bank account of merchant Complete privacy of merchant bank account
  • 44. Benefits  Depending on the software features, retailers can track pricing accuracy, inventory changes, gross revenue and sales patterns. Using integrated technology to track data helps retailers catch discrepancies in pricing or cash flow that could lead to profit loss or interrupt sales. POS systems that monitor inventory and buying trends can help retailers avoid customer service issues, such as out-of-stock sales, and tailor purchasing and marketing to consumer behavior.
  • 45. Must DoPractices • Register your mobile number at bank for regular information by SMS for every transaction • Transact at only trusted merchants • Your Debit card PIN is highly sensitive and should NOT be shared. • Make sure your PIN is not being observed by anyone while you enter it at the ATM or while shopping. • As a preventive measure change your PIN frequently. • Memorise your PIN. Do not write it anywhere. • Inform the caretaker / bank immediately in case you find any additional/ suspicious /loose devices attached to the ATM. • Press the “Cancel” button in case the ATM screen goes blank or the transaction is not completed. • Never forget your debit card at the ATM or billing counter after the transaction. • Avoid entertaining or engaging in long conversation with strangers while transacting at an ATM.
  • 46. Aadhaar Enabled Payment System (AEPS)
  • 47. Step: 2: Select option : • Cash withdraw • Deposit Cash • Pay • Check Balance • Mini Statement Step: 1: VisitAEPS Step: 3: Enter Aadhaar Number and Location Step: 4: Scan Biometrics and collect receipt. • AEPS transactions happens to 23:00 hours each day • The settlement is affected by NPCI’s RealTime Gross Settlement (RTGS) Aadhaar Enabled Payment System (AEPS)
  • 49. M/D-Wallets Mobile wallets are essentially digital versions of traditional wallets that someone would carry in their pocket. They offer payment services through which the individuals / business can receive/ send money via mobile devices. While there are many variations, usually they can hold digital information about credit and debit cards for making payments, store coupons and loyalty programmes, specific information about personal identity and more.
  • 50. E-Wallets  Closed : Issued by an entity for facilitating the purchase of goods and services from it. These instruments do not permit cash withdrawal or redemption. Hence, RBI approval is not required for issuing them.  Semi-Closed e-wallets : for purchase of goods and services, including financial services at merchant locations/ establishments.These wallets do not permit cash withdrawal or redemption by the holder.These may be recharged upto Rs.10,000/- only. Eg: Paytm, Freecharge, Momoe, PayUMoney, Mobikwik, Citrus, State Bank Buddy`, Citi MasterPass, ICICI Pockets, HDFC Chillr, LIME  Open e-wallets: Used at POS [Point of sale ] terminals like funds transfer at any card accepting merchant locations eg: E.g. M-Pesa is an open wallet run byVodafone in partnership with ICICI Bank. Axis Bank’s e-WalletCard’, can used for making payments on sites that acceptVisa cards, with a minimum limit of Rs 10, and a maximum limit of Rs 50,000, and a validity of 48 hours.
  • 51. E-Wallets  Pre-paid:The wallet have to be recharged during the transaction or it is to be recharged earlier.  Auto/digitalWallet: first register with the wallet; enter your card details such as card number, expiry date, CVV and address.This information is further validated through one-time password (OTP). Once registered, you can buy directly with just entering your OTP.
  • 52. UsingWallets CONSUME R DOWNLOA DS THE APP ON SMARTPHO NE SIGN UP USING MOBILE LOAD MONEY USING DEBIT CARD/CREDIT CARD OF NETBANKING START USING WALLET TO MAKE PAYMENT S Consumer Wallet Limits: Rs.20,000/month for all. Rs.1 lakh/month with KYC SHOPKEEP ER /SERVICE PROVIDER DOWNLOAD S THE APP SIGN UP USING MOBILE SELF DECLARE ITSELF AS A MERCHAN T START ACCEPTING PAYMENT Merchant Wallet Limits: Rs.50,000/month with Self Declaration. Rs.1 lakh/month with KYC Basic Requirements to Start Using a Wallet: Bank Account, Smartphone, 2G/3G/4G Connection & A Free Wallet App
  • 56. UPI
  • 57. Unified Payments Interface  A system that powers multiple bank accounts into a single mobile application  seamless fund routing  “Peer to Peer” collect request  Launched on 11th April 2016 by Dr. Raghuram G Rajan, Governor, RBI at Mumbai  Transaction limit 1 L per transaction
  • 58. Uniqueness  Immediate money transfer  Virtual address Payment (VPA) of the customer for Pull & Push (no other details required). mmahajan@upi  Single mobile application for accessing different bank accounts - Interoperable  PUSH and PULL Payments + Scheduling
  • 59. Uniqueness  Raising Complaint from Mobile App directly.  Single Click 2 Factor Authentication (Mobile number + MPIN + App PIN+OTP)  Utility Bill Payments, Over the Counter Payments, Barcode/ QCode (Scan and Pay) based payments.  No need to share your name, your bank account number, IFSC code, or bank branch  .No physical device like : debit card etc required
  • 60. Download App  For Smart Phones:  GoTo GOOGLE PLAY STORE Or iStore & SearchWithThe Keyword “UPI”  You Can DownloadYour Bank UPIApp Or Any One of the following UPI Apps S. No. Bank Name Android APP Name 1 State Bank of India SBI Pay 2 Andhra Bank Andhra Bank ONE – UPI App 3 ICICI Bank a. UPI Collect (or) 4 Canara Bank Canara Bank UPI - Empower 5 United Bank of India United UPI 6 Punjab National Bank PNB UPI 7 South Indian Bank SIB M-Pay 8 Vijaya Bank Vijaya UPI 9 AXIS Bank Axis Pay UPI App 10 Union Bank of India Union Bank UPI App
  • 61. Update profile and set UPI PIN
  • 62. Push – Pay Money •User log-in to UPI application •After successful login, user selects the option of Send Money / Payment •User enters beneficiary’s / Payee virtual id, amount and selects account to be debited •User gets confirmation screen to review the payment details and clicks on Confirm •User now enters MPIN •User gets successful or failure message
  • 63. Pull- Requesting Money Bill Sharing with friends.
  • 64. Pull- Requesting Money Bill Sharing with friends. • User log-in to his bank’s UPI application • After successful login, user selects the option of collect money (request for payment) • User enters remitters / payers virtual id, amount and account to be credited • User gets confirmation screen to review the payment details and clicks on confirm • The payer will get the notification on his mobile for request money • Payer now clicks on the notification and opens his banks UPI app where he reviews payment request • Payer then decides to click on accept or decline • In case of accept payment, payer will enter MPIN to authorize the transaction • Transaction complete, payer gets successful or decline transaction notification • Payee / requester gets notification and SMS from bank for credit of his bank account
  • 65. Payment using QR Code  QR Code : QR code consists of black modules arranged in a square pattern on a white background. The information encoded can be made up of four standardized kinds (“modes”) of data (numeric, alphanumeric, byte/binary, Kanji-logographic), or by supported extensions virtually any kind of data. QR codes can be used for proximity payments with UPI .Developers who are developing merchant applications must generate a URL fully compliant to specification in previous section and then create a QR code of that URL.
  • 66. Add Accounts  Go to profile  Add Account  Enter Bank details  Confirm the details by input the Debit Card details.  Generate M-PIN Generate M-PIN: • User receives OTP from the Issuer bank on his/her registered mobile number • User now enters last 6 digits of Debit card number and expiry date • User enters OTP and enters his preferred numeric MPIN (MPIN that he would like to set) and clicks on Submit • After clicking submit, customer gets notification (successful or decline) Change M-PIN • User enters his old MPIN and preferred new MPIN (MPIN that he would like to set) and clicks on Submit • After clicking submit, customer gets notification (successful or failure)
  • 68. BHIM snap shot - usingVPA
  • 73. Notification and Pay after Pull Service
  • 75. Internet Banking  A banking system in which an individual/organization will perform the transactions remotely by using login credentials.  How to use  Register with Bank; have your login credentials  Boot a machine (Smartphone/Leaptop/ Desktop) ; connect with internet; open banks portal and go to Online banking ; Enter Login credentials.  Benefits:  24*7*365 Banking  Any place  Customer Convenience (no need to stand on queue and wait)  Beware from  Malware/ Spyware in the machine.  Sharing of login credentials  Phishing
  • 77. RTGS : RealTime Gross Settlement (for Funds transfer)  (The RTGS system is primarily meant for large value transactions.The minimum amount to be remitted through RTGS is Rs 2 lakh.The maximum limit is Rs 10 lakh per day.)  Average charges : Amount above Rs 2 lakh upto Rs 5 lakh - Rs 25 + ServiceTax Amount above Rs 5 lakh upto Rs 10 lakh - Rs 50 + ServiceTax  Timings : The beneficiary bank has to credit the beneficiary's account within 30 minutes of receiving the funds transfer message.
  • 78. NEFT: National Electronics FundsTransfer System  Operates on a Deferred Net Settlement (DNS) basis which settles transactions in batches (the settlement takes place with all transactions received till the particular cut-off time.)  Average charges :  For transactions up to ₹10,000 (not exceeding) : ₹2.50 (+ Service Tax)  For transactions above ₹10,000 up to ₹1 lakh (not exceeding) : ₹5 (+ Service Tax)  For transactions above ₹1 lakh and up to ₹2 lakhs (not exceeding) : ₹15 (+ Service Tax)  For transactions above ₹2 lakhs : ₹25 (+ Service Tax)  Batch timings :  NEFT operates in hourly batches - there are eleven settlements from 9:00 AM to 7:00 PM on week days and five settlements from 9 am to 1 pm on Saturdays
  • 79. How the RTGS / NEFT transactions take place:  The branch should be RTGS/NEFT enabled.  An individual / organization may perform this transaction by using the Internet Banking.  An individual / organization may perform this transaction by visiting the bank. (may have / or have not the BankAccount)
  • 80. How the transaction take place using Internet Banking
  • 81.  Timing 0800AM to 0800PM  Charges Rs. 5/- per transaction.
  • 84. Cyber Crimes • Identity Theft • Spam and Cyber Stalking • Infringement of privacy • Hacking (White Hat ,Black Hat ,Grey Hat ) • Script kiddie: They are the unskilled hackers who break into computer systems by using automated tools written by others. • Neophyte: They are new to hacking or phreaking. • Blue hat: These people’s expertise are used to bug-test a system prior to its launch • Hacktivist: Hacktivism can be divided into two main groups: • Cyberterrorism :Terrorism in cyber world is cyberterrorism. Section 66F of the ITA Act, 2008 defines the word cyber terrorism • Freedom of information • Child Pornography & Pornography • Cyber Warfare • Cyber Squatting • Economic Espionage • Software Piracy and other Copyright Violation • Computer Forgery and Counterfeiting • Sabotage and Extortion by using Computer. • Defamation, Hate Speech, Racist, Blogs and Xenophobic Propaganda • Online Gambling • Email Spoofing • Data Dibbling • Web Jacking and Email Bombing
  • 85. Terminology used in the world of Cyber attack  Access - To interact with a system.  Active Attack - attempts to alter a system  Blacklist - blocked or denied privileges  Bot -Internet connected system is secretly compromised  Cryptography - mathematical algos to provide security services  Digital Forensics - analysing digital evidences  Intrusion Detection - methods for analyzing information, if a security violation has occurred.  Key - numerical value used to control cryptographic operations  Malware - software that performs an unauthorized operation  Passive Attack - make use of information but does not attempt to alter the system  PenetrationTesting - evaluation methodology  Phishing - A digital form of social engineering to deceive individuals into providing sensitive information.  Root - a set of tools to hide their presence and control the activities.  Virus - infect a computer and replicate  Whitelist - A list of entities that are considered trustworthy and are granted access or privileges.  Data Breach - disclosure of sensitive info
  • 86. Mobile- threat  Mobile malware is rising fast, infecting nearly 13 million phones in the world during the year first half of 2012, up to 177% from the same period a year ago.This came as the security vendor found 5,582 malware programs designed for Android during the month, another unprecedented number for the period.  AndroidTrojan: ZitMo  GIngerBreak  AcnetSteal  Cawitt  FakeToken: steals both banking authentication factors directly from the mobile device
  • 87. Cyber Security – good steps  PCI DSS is current industry security standard set by American Express,Visa International, MasterCardWorldwide – an essential certification.  These companies use 128-bit encryption technology to crypt any information transfer between two systems (It takes more than hundred trillion years to crack a password under 128-bit encryption!) .  Spreading awareness
  • 88. Stop; think; connect  #Never share your Username and Password.  #Avoid login from other’s Mobiles & Computers.  #Use a strong Password  #Change your Password at regular intervals.  #Use Antivirus, Antispyware and firewalls  #Run Updates regularly  #Use Encryption  #Don’t share your personal / sensitive information
  • 89. Stop; think; connect  #Use less-targeted browser such as Chrome or Firefox.  #Ask loudly for your right to privacy: Don’t ever say I have nothing to hide, because that’s equivalent to I don’t care about this right.  #Be careful what you download, and ask questions about the site you are downloading from.
  • 90. Stop; think; connect  # Never plug your USB/Phone at the place you don’t trust.  # Clean your device or remove old software or packages.  # Frequent data backups at multiple locations.  # Use encryption to protect confidential information stored on your phone.
  • 91. Stop; think; connect  # Patterns Lock: Set your smartphone to lock after a short idle time, and set it to require authentication for unlocking. If at all possible, use something stronger than a simple-minded four-digit PIN.  #Alert before Install: Mobile devices are an open gate to our privacy, secrets, and money (mobile banking), be alert before you install any application.  # useVPN ;For publicWifi;  #Turn yourWi-Fi and Bluetooth off when you don’t use them.  # Disable java on browser
  • 92. Stop; think; connect  #Fake emails: Never click links in emails or texts that seem to come from your bank, the IRS, or any other institution. If you think the message might be valid, log into your account directly, without using the supplied link.  #2FA: For social Media; always use 2-factor authentication mode.  #SSL: For online transaction check for https:// (secure socket layer)  #Phishing: Be careful on which site you are at. (Beware of phishing).  # Never save your card details during transaction.
  • 93. Stop; think; connect  #Use virtual keyboard during transaction.  #Trust no facebook friend; the hackers may be your friend by a fake profile and steal your information.  #Check your bank statement in a week, to avoid phishing/fraud.  #Prioritize your accounts and secure them,  #Never access zip/rar files; sent from unknown users.  #Webpages may have ads; or some ads may have malware; to protect the system ; Block Pop-ups or use anti-Adware software/blocker. Don’t click any banner / adult image.
  • 94. Stop; think; connect  Protecting your password:  Who’s looking over your shoulder?  Did you know that bystanders or co-workers can steal your passwords only by peeking at what you’re typing?  This is especially true is your passwords are as easy as 123456 (please change them if it’s the case).  Take a look around and make sure everything’s safe before typing a password. Also: NEVER share your passwords. Ever.  If it’s your system; check the keyboard plug-in device that no “”keylogger” is attached.  Don’t do real time geo-tagging
  • 95. Stop; think; connect  If you want air-tight security for your email account, check the following:  Your recovery information (create multiple accounts)  Your recent activity  Your account permissions  Your app passwords  Your 2-step verification settings.
  • 96. Stop; think; connect  keep your inbox and devices safe:  Be careful where you submit your email address  Unsubscribe from any unnecessary newsletters  Use filters and mark emails as spam to help your email provider block it more effectively  NEVER click on links in spam emails  NEVER download and open attachments in spam emails  Disable the automatic downloading of HTML graphics in your mails  Open an additional email account to keep your most important one safe  When using social media, enhance your privacy settings so no one can see your email account  If you have a website, protect your email address from automatically being scanned and harvested by spammers.
  • 97. Check out for the fake profile in Social Media  Step 1: Download the profile picture.  Step 2: Use https://www.tineye.com/ or Google image search to see if that profile pic is a stock photo or if someone else has used it. If it’s fake, lots of results will pop up.
  • 98. Google Activity log – an example  It will show you from what browsers and devices you’ve accessed it, when and from what IP. If there’s something that you don’t recognize there or an old session from a friend’s computer, you can choose to terminate it.  Same option is available for many other online accounts, such as Facebook,Yahoo or Dropbox.Access it to monitor where your accounts have been used and end any sessions that you don’t recognize.  If you also activate two-factor authentication, your accounts will be more secure against intruders.
  • 99. Cyber crime as business  Search for new ways to monetize their attacks (sell data on the DarkWeb, purchase new types of ransomware that is impossible to break, etc.);  Monitor their income and use all kinds of tactics to expand their reach, harvest more data and launch stronger and more lucrative attacks;  Hire blackhat hackers to do it (they’re the bad kind, because there are good hackers too – the whitehat kind);  Invest in acquiring infrastructure they can use to launch attacks and keep them anonymous;  Buy exploit kits and ready-made malware that can be deployed instantly.
  • 101. Challenges  Digital Divide  Unavailability of user interface in regional languages across devices that support cashless payments.  Unavailability of devices  Unavailability of Internet Facility  Percentage of Digital Illiterate.  Mind set / distrust towards application.  Cyber Security: Without proper precautions and security policies, the highly reactive nature of cyber security leaves us vulnerable to cyber attacks

Notas do Editor

  1. May require more than one slide