0% found this document useful (0 votes)
21 views4 pages

INFT151 Project

Uploaded by

aapertod77308
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views4 pages

INFT151 Project

Uploaded by

aapertod77308
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

NAME: OWUSU RICHMOND

INDEX NUMBER: UEB3200723

IT LEVEL 100C

C12
1. Users of the Computer System

Domain: Financial Services Users:

Bank Tellers: They will use the computer system to process transactions, check account balances,
print statements, and handle customer inquiries.

Loan Officers: They will use it to assess loan applications, check credit scores, and manage loan
approvals.

Financial Analysts: They will utilize the system for market research, financial modeling, and
generating reports.

Customers: Through online banking portals, they will access accounts, transfer funds, and pay
bills.

2. Types of Computers

Bank Tellers: Use desktop computers at their workstations.

Loan Officers: Use desktop or laptop computers for mobility.

Financial Analysts: Use high-performance desktop workstations for data analysis and modeling.

Customers: Use personal computers, laptops, tablets, or smartphones for online banking.

3. Highest Storage Capacity


Financial Analysts: Need the highest storage capacity for large datasets, possibly up to 4TB per
workstation for data analysis.

4. Network Type and Topologies

Network Type: The domain will use a Local Area Network (LAN) within each bank branch
connected to a Wide Area Network (WAN) for inter-branch communication.

Network Topologies:

LAN: Likely a Star Topology with each computer (teller, loan officer, analyst) connected to a
central network switch.

WAN: Mesh Topology to ensure redundancy and reliability between branches.

5. Pictorial Presentation

6. Security Threats

Phishing Attacks: Emails pretending to be from the bank to steal login credentials.

Malware: Targeting systems for data theft or disruption.


Insider Threats: Employees accessing or sharing sensitive information.

Data Breaches: Unauthorized access to customer financial data.

7. Security Mechanisms

Firewalls: To block unauthorized access and filter malicious traffic.

Antivirus Software: To detect and remove malware.

Encryption: For data protection during transmission and storage.

Access Control: Role-based access to limit what users can view and modify.

Regular Training: Educating employees about security best practices.

8. Operating System and Utility Software

Operating System: Windows 10/11 for desktops and laptops, possibly Windows Server for
servers.

Utility Software:

Anti-virus: Such as McAfee or Norton for security.

Backup Software: Like Acronis or Veal for data backups.

Productivity Tools: Microsoft Office Suite for document management.

9. Application Software

Banking Software: Core banking systems for transaction processing.

Loan Management Software: For loan officers to process applications.

Data Analysis Tools: Such as SAS or Tableau for financial analysts.

Online Banking Applications: For customers to access their accounts.

10. Hardware

Input Devices: Keyboards and mice for data entry.

Output Devices: Monitors for displaying information.


Systems: Desktops for bank tellers, laptops for loan officers, high-performance workstations for
analysts.

Devices:

Printers/Scanners: For document processing.

ATMs: As self-service kiosks for customers.

Storage:

Hard Drives: For general storage needs.

Solid State Drives (SSD): For faster access to frequently used data.

Servers:

File Servers: For storing shared documents.

Database Servers: For storing customer information securely.

You might also like