Académique Documents
Professionnel Documents
Culture Documents
Application of MIS in
AB Bank
Couse Title: Management Information Systems
Course code: MGT-304
Prepared for
MD Rubel
Assistant Professor
Department of Management Studies
Jahangirnagar University.
Prepared by
Members ID Batch
MD:Momenul Islam Sumon(L) 1842 7th
Tanjum Sarwar Rimi 1813 7th
Md. Delwar Hossain 1840 7th
Dipu paul 1826 7th
Md: Juwel Rana 1839 7th
Afsana Fairuj Yeati 1812 7th
To
MR.MD. Rubel
Jahangirnagar University
Savar , Dhaka
Dear Sir,
With due admiration, we beg to state that we are the student of Dept. of Management Studies
Jahangirnagar University. It is certainly a great happiness to have the chance to submit the
report. We have prepared the report to submit according to your advice. The topic name is “MIS
Application in AB Bank”. We have tried our best to complete the report with more information
and standard one. Please you will recommend us if any part of the report means inappropriate
and irrelevant with the subject.
We are grateful to you for giving us a great time and giving us the support to do this report.
If you want to have any clarification we will be honored to be in your service. Thank you.
With regards
Md. Momenul Islam Sumon
Id: 1842
On behalf of “Team MGT 7th Batch”
2
Acknowledgment
At first we would like to pay our gratefulness to “Our Honorable Teacher” to give us such an
interesting and educative topic. Our assignment topic is “MIS Application in AB Bank.”. Our team
which is comprises six members give its whole hearted co-operation and effort to do the report
successfully. At the very beginning we have set our Objectives and sketch our roadmap to perform
the report. Initially we have spent some times to understand the general concept of overall report
& related things to it. More over this report requires not only the best utilization of our knowledge
and our commitment as well but also enriches our knowledge. This assignment helps us to gather
bulk of information which surely helps us in our future life.
3
Executive summary
This report is a written representation of the various activities performed by the Management Information
Systems (MIS) of AB Bank Limited. AB Bank Limited, the first private sector bank in Bangladesh, started
its journey on 1982, started implementing online operations since 2006, which is now put into effect in all
the branches connected to the AB Bank LAN. Online Operations Management System allows automated
conduction of traditional as well as modern banking products and services, with different management
methods and techniques. It is a colossal process, involving a great deal of tasks, most vital and significant
in successful everyday banking venture. The most important aspect of this system is the Network
Management process, responsible for maintaining the bank’s connectivity backbone, is accomplished
through Network planning and designing, Network implementation and configuration, Network monitoring
etc. The Hardware Management process within the system in question, deals with different IT
hardware back-end support and maintenance procedures. The AB Bank Data Centre, which is the heart of
AB Bank IT Division, is carefully monitored and maintained through constant dedicated observations. Any
system fault within the Data Centre is handled in instant supportive manners by the IT division. Branch
LAN Management, another important sector that maintains AB Bank Branch Connectivity architecture
through proper up keeping techniques. IT Division is also responsible for maintaining, monitoring and
troubleshooting email accounts and internet access provisions, allocated for the bank’s employees. Along
with all these activities, IT division provides support for smooth functioning of all banking software by
ensuring proper maintenance at the back-end with necessary supportive and monitoring measures. In fact,
IT Division also manages Logistics Support that includes the purchasing and replacing of different
hardware, as per the needs of the online operations management system. By highlighting all these activities,
this report provides a rather composed picture of the massive working process, conducted within a bank’s
Online Operations System.
4
Table of content
No Name Page no
Introduction
1.1 Objectives of the report 6
1.2 Methodology 6
1.2 Online Operation Of the Bank 7
Organization Profile
2.1 Company background 8
2.2 Corporate Information 9
2.3 IT Division at a Glance 10
AB Bank MIS Policy
3.1 Introduction 11
3.2 MIS Policy 11
3.3 Email Policy 12
3.4 Anti-virus Policy 13
3.5 Documentation 14
Application Of MIS In Bank
4.1 IT Infrastructure 15
4.2 Network Management 15
4.3 Hardware Management 20
4.4 AB Bank Data Centre Maintenance 22
4.5 AB Bank Email Account Management 23
4.6 Banking software Support 26
4.7 Logistics Support Management 27
4.8 Branch Support 29
4.9 Hardware Support 32
Interactive session
5 Limitations 34
6 Findings 35
7 Conclusion 36
8 Reference 37
5
1. Introduction
1.1 Objective of the report
Bangladesh Bank has adopted advanced ICT to be digitized in all spheres of its functions including
monetary policy, banking supervision and internal management. BB has already permitted for e-
commerce, e-banking, automated clearing house, ATM Services, electronic fund transfer etc. This has seen
the introduction of sophisticated Online Operations Management System in different banks of the country
and AB Bank is no difference. The field of Information & Communication Engineering, concepts at
analogue and digital communication systems, information processing and computer communication
networks provide a resourceful appendage to relevant learning and understandings.
1.2 Methodology
1.2.1 Research design: We conducted a descriptive research to correlate the theories
of Management
1.2.2 Data collection method We used both primary and secondary data to conduct the study.
Primary data will be collected from-Key Informants Attend (KIA) who are knowledgeable or expert
Different types of data collection tools will be applied in this study considering types of the respondents
and methods of the study. Major data collection tools that will be applied to conduct the study are as
follows: Semi-Structured Interview Schedule (SSIS): A semi-structured interview schedules was used to
6
collect data from operation level managers .Question Guideline for expert interview: A comprehensive
question guideline was developed. This guideline facilitated the process of interviewing the experts and
Access accounts
Transact business
Obtain information on financial products and services through a public or private network, including the
internet
Customers access online banking services through intelligent electronic devices, namely—
Mobile phone
Online banking operations are providing much-needed advantages for a bank, required to enhance its
reputation for providing thorough and proper banking services. Some of the many benefits of online
operations include—
Real-time transaction
Scaled up operations
7
2. Organization profile
2.1 Company Background
AB Bank Limited, the first private sector bank was incorporated in Bangladesh on 31st December 1981 as
Arab Bangladesh Bank Limited and started its operation with effect from April 12, 1982.
AB Bank is known as one of leading bank of the country since its commencement 27 years ago. It continues
to remain updated with the latest products and services, considering consumer and client perspectives. AB
Bank has thus been able to keep their consumer‘s and client‘s trust while upholding their reliability, across
time.
During the last 27 years, AB Bank Limited has opened 77 Branches in different Business Centers of the
country, one foreign Branch in Mumbai, India and also established a wholly owned Subsidiary Finance
Company in Hong Kong in the name of AB International Finance Limited. To facilitate cross border trade
and payment related services, the Bank has correspondent relationship with over 220 international banks of
repute across 58 countries of the World.
8
2.2 Corporate Information
Legal Form: A public limited company incorporated on 31st December, 1981 under the
Companies Act, 1913 and listed in the Dhaka Stock Exchange Ltd and Chittagong Stock Exchange
Ltd.
Commencement of Business
27th February 1982
Registered Office
BCIC Bhaban, 30-31, Dilkusha C/A
Dhaka 1000, Bangladesh.
Tel: +88-02-9560312
Fax: +88-02-9564122, 23
SWIFT: ABBLBDDH
E-mail: info@abbank.com.bd
Web: www.abbank.com.bd
9
2.3 IT Division at a glance
Being the first private sector Bank of the country, AB Bank has prided itself in the quality of the banking
services it provides by taking conscious decision to employ the best available banking technology to serve
the customers which now stands over 200,000 in all. Core Banking System KAPITI was employed
alongside the manual banking operations ever since 1984. Later on in the year 2004, Misys core banking
solution was selected for implementation to take AB in to super highway of real time online banking of
today. Beginning, 2005 MISYS implementation was taken-up and in the 1st Phase seven branches were
upgraded to the new core banking system.
For the year 2006, in line with the growth strategy, service quality improvement and availability were put
into focus whereupon coverage of remaining Branches under MISYS became all the more important. Bank
took up a massive Project of migration, connectivity and standardization of processes and hardware
throughout. A CORE TEAM was formed. The theme was YES WE CAN. We made it possible.
Trade Finance Software: Trade Innovation
Internet Banking Software: Integrated Financial Module
10
3. AB Bank MIS Policy
3.1 Introduction
The banking industry has changed in the way they provide service to their customers and process
information in recent years. Information Technology has bought about this momentous transformation.
Security in Information Technology for a financial organization has therefore gained much greater in
importance, and it is a vital issue that we ensure that such risks are properly identified and managed.
Information and Information Technology systems are essential assets of the bank and as well as for their
customers and stakeholders. Protection and maintenance of these assets are critical to the organizations
‘sustainability. IT Division of the bank must take the responsibility of protecting the information from
unauthorized access, modification, disclosure and destruction to protect customers ‘interest.
How to properly maintain user ID(s) and password(s), as well as any other accounting data
How to respond to a potential security incident, intrusion attempt, etc.
11
Basically, the main reasons behind the creation of a security policy is to set a company's information
security foundations, to explain to staff how they are responsible for the protection of the information
resources, and highlight the importance of having secured communications while doing business online.
If (E-mail) attachments are allowed, the attachment(s) must be scanned before opening as well as confirming
with the sender.
No attachments should exceed the 1MB limit within the branch, 20 MB within the head office and 10 MB to
outside users.
Maximum disk space limit for general email user account is 100 MB.
Java and ActiveX must be disabled while reading e-mail in order to prevent auto- execution of malicious
programs.
Company e-mail accounts should not be used for online registration purposes.
Company e-mail accounts should not be used for running any user‘s personal businesses, excessive personal
mailing, sending large attachments etc.
Users should not respond to chain letters, or any other sort of spam using the company email systems.
12
Never forward any company data to external e-mail accounts without first checking with the manager or
NOC.
The proper use of the E-mail system should continuously be monitored
Users are not allowed to send unsolicited email messages, including "junk mail"
To stop email rule violations, AB Bank email gateway solution is enabled for—
IP protection
Regulatory compliance
The anti-virus package must be kept up to date using an automated and timely process as possible. The method
of updating will be documented in a support procedure.
Systems management activity should interact with the anti-virus control package to record logs of detection.
Specifically, all LAN servers, PCs, and other vulnerable workstations must run an anti-virus control package
and, where possible, must be included as part of the standard-build for a particular environment.
Specific procedures must exist to ensure that all users of laptops or other portable equipment are updated
frequently.
Users should be educated about virus update and notify IT if the update does not take place.
Users should take responsibility of their own data if user‘s data is not managed centrally.
13
3.5 Documentation
To compliance with the ICT policy AB Bank Limited IT Division maintains the following documents for
smooth operation of IT task—
Organogram of IT Division.
14
4. Applications of MIS in AB Bank
4.1 IT Infrastructure
AB Bank Limited, which introduced online operations way back in 1984, is presently in possession
of one of the most efficient IT infrastructures among all the commercial banking organizations.
This infrastructure is handled by the Network Operations Center (NOC), which is operated
under the supervision of a team of 7 competent, talented and hardworking IT professionals. This
team, lead by the head of IT, provide with sincere efforts on maintaining the optimum efficiency
of the bank‘s online network. The team is responsible for providing services like LAN & WAN
link monitoring, new branch premises connectivity, bandwidth monitoring, data Centre & disaster
recovery maintenance, mail server (Exchange), Internet use monitoring and reporting (using
MacAfee Web Washer), IT budget, etc.
The different elements of online infrastructure of AB Bank can be distributed into the following
categories—
Network Management
Hardware Management
Data Centre Maintenance
Mail & Internet Support
Branch Support
15
Network implementation and configuration
Network monitoring
These features require the network management team to perform the following operations, as
instructed by International Standards Organization (ISO)—
Fault management - The process of identifying and locating faults in the network. This could
include discovering the existence of the problem, identifying the source, and possibly repairing (or
at least isolating the rest of the network from) the problem.
Accounting management - The process of identifying individual and group access to various
network resources to ensure proper access capabilities (bandwidth and security) or to properly
charge the various individuals and departments.
Configuration management - The process of identifying, tracking and modifying the setup of
devices on the network. This category is extremely important for devices that come with numerous
custom settings (e.g. routers and file servers).
Security management - The process of controlling (granting, limiting, restricting or denying) access
to the network and resources thereon. This could include setting up and managing access lists in
routers (creating "firewalls" to keep intruders out), creating and maintaining password access to
critical network resources, identifying the points of entry used by intruders and closing them.
Performance Management - The process of measuring the performance of various network
components. This also includes taking measures to optimize the network for maximum system
performance (periodically measuring of the use of network resources).
Identifying usable applications – Consider network related applications like Enterprise Resource
Management (ERM), Internet telephony, Instant Messaging (IM), e-mail etc.
16
Traffic Requirements - Identification and documentation of major traffic sources, Categorization
of traffic as local, distributed, client/server, peer-to-peer,terminal/host or server/server, Estimation
of bandwidth requirements for each application, Quality of Service (QoS) requirements for each
application, Reliability requirements etc.
Scalability Requirements - Provision for scalability related operations like add users, applications,
additional sites, and external network connections etc.
Availability – Constant access and usage of the network must be ensured through proper network
planning and deigning for the purpose of company benefits
Security and Accessibility – Breach proof security plan should be devised by including a list of
network services and administrators, training procedures for related personnel, network recovery
strategies in case of security breaching incidents
Cost considerations - For LANs, costs for equipments like cable, routers, switches, computers,
servers along with labour cost should be reduced. As for WANs, bandwidth cost minimizing
should be primarily achieved.
17
Network monitoring
AB Bank Limited has a well Organized and promptly functioning network of 77 branches in
Bangladesh along with a branch in Mumbai, India. For better performance, this network design
follows redundant policy of one backup connection for each node within the network. The
efficiency of this network ensures the smooth functioning of online operations for all the branches
of the bank. To accomplish this, three categories of monitoring are performed, namely—
18
Obtaining detailed statistics for IP addresses, ports, sessions, etc.
Monitoring application packets
Active monitoring - Active monitoring is done to provide real-time monitoring for each devices
within the network, depending on inter-network alerts
Passive monitoring - This relies on external alerts for solving problems within the network
Thresholds monitoring – Alerts to warn for device parameter constraint breaching
Performance monitoring - To keep track of device state/health responsible for performance issues
Custom monitoring - To track for customized individual/combined network element performance
metrics
Active script performance monitoring – Keeps tracks for active scripting languages like
JavaScript, VB Script etc.
19
Pre-configured monitoring - Predefined monitoring processes set to begin monitoring
immediately at initial stages
Critical monitoring – Seeking out for critical component failure, troubleshooting and recovery
Security monitoring – Provides tracking and alerting support for any security breaches on the
VPN tunnel
In information technology, hardware is a comprehensive term for all of the physical parts of a
computer, as distinguished from the data it contains or operates on, and the software that provides
instructions for the hardware to accomplish tasks. Hardware management basically comprises of
maintenance and troubleshooting procedure of different hardware, as categorized into following
classes—
CPU
Casing
Motherboard
Power supply
Storage Components - Storage components include storage media for preserving essential
information permanently. Storage devices include—
Peripheral Components – Peripheral components work as human interfaces, and not included in
primary functionalities of a computer. These typically include—
20
Printer
Scanner
Modem
Networking Components – Networking components are responsible for data transmission and
operations of a computer network. These include—
Router
Switch
Hub
Gateway
Access Point
Network Interface Card (NIC)
Networking Cable
Network Bridge
Modem
21
4.4 AB Bank Data Centre Maintenance
Data Centre maintenance is crucial in ensuring peak efficiency of a Data Centre. The
maintenance process in AB Bank Data Centre is performed by the following steps—
Component maintenance – Following essential Data Centre components are properly maintained
and upgraded—
Routers
Switches
Servers
Security components
System resources (memory, storage, CPU, optical drives etc.)
Operating systems
Applications
Accessories (server racks, cabling, panels, drive bays etc.)
The monitoring process focuses on the following elements within the Data Centre—
Ventilation
Lighting
Power systems
Security systems
22
4.5 AB Bank Email Account Management
AB Bank Limited maintains a well organized email account management system, carefully
operated under the watchful eyes of the Network Operations Center (NOC). AB Bank Limited
provides both webmail and desktop email client provisions for its employees. The webmail URL
of AB Bank Limited webmail is http://mail.abbank.com.bd and the bank uses Microsoft
Outlook as the desktop email client. This management is performed through the following steps—
23
Email Password Setting
Passwords are an important aspect of email security. They are the front line of protection for user
email accounts. A poorly chosen password may result in the compromise of AB Bank‘s entire
corporate network. There are several rules for setting a password for an email account—
24
Email Troubleshooting
Several troubleshooting issues faced by users of AB Bank Limited email account holders, are
solved from the NOC through remote access to their desktops. Examples of such troubleshooting
include—
User information needs to be update on any changes (i.e. change of department/branch, change of
contact information; user is no longer employed in the bank etc.)
Email delivery is very slow
Email server requires updates
Email server is down
AB Bank‘s NOC performs Internet access monitoring and blocking through McAfee Web
Gateway, which offers powerful, proactive protection against blended threats, spyware, and
targeted attacks.
25
AB Bank Desktop Application Management
AB Bank IT Division is responsible for handling all the software used within the organization.
This not only includes specific banking software but also general computer applications needed
for everyday organization activities-
Adobe Reader 5.0 - An application program developed by Adobe Systems. This application is
designed to view, create, manipulate and manage files in Adobe's Portable Document Format
(PDF), used for representing documents in a format independent of the application software,
hardware, and operating system.
WinRAR 3.0 – WinRAR 3.0 is a file archiving and data compression utility. It is capable of encoding
information using fewer bits or other information-bearingunits, allowing the encoded data to
occupy lesser disk space than an un-encoded data file, through use of specific encoding schemes.
26
4.7 Logistics Support Management
System constraints like design specifications, item configuration and safety precautions
Handling equipment and procedures
Security requirements
Geographic and environmental impacts and constraints
Spare or repair parts storage requirements
NOC has categorized its logistics management process in the following three sections—
Requirement Analysis
Purchase
Warranty Claim
Requirement Analysis
Requirements analysis by the IT division is the process of determining necessity for new or
modified IT equipments. Requirement analysis is done by the following steps—
Validity of the known requirements on clarity, completeness, essentiality, uniqueness, and meeting
the financial limits set by the permitted budget is determined
27
Once requirements are found valid, they are documented and sent to AB Bank purchase division
from IT to issue purchase order
Purchase
As the purchase requests are sent from the IT division to the purchase division of AB Bank, the
following methods are performed—
Price quotations are obtained from the respective vendors of the equipments as mentioned in the
documented requirement analysis
All the received price quotations are scrutinized and the one that offers the best product with
minimum expense is selected
A memo of the selected price quotation for the required product is sent to the management
committee of the bank for final accreditation
Once the management committee approves of the purchase, a purchase order is issued to the
selected vendor and the product is obtained upon payment
Warranty Claim
After purchasing of any IT equipment, if it falters over time, then the following actions are
performed for warranty claim—
The warranty period of the faltering equipment is checked to see if it is still applicable
If warranty period is over, then a purchase of a newer version of the equipment is performed
following proper procedures
If warranty period still persists, then the vendor is contacted and asked to supply with a fresh copy
of that faltering equipment
28
Connected with selected remote computer as remote window opened
Logged into selected remote computer with administrator privilege
Performed the required application maintenance operation
Logged off and the remote window closed automatically
Located shared printer from its original location by opening it using the Run command
Used the connect command to share it with the remote computer
Printed a test page from the remote computer to ensure that the printer is working properly
If successful, then logged off, otherwise, repeated the steps again
After adding all necessary information, closed the Active Directory Services and logged off from
the server
29
Opened Active Directory Services
From Users folder select desired user, used the Move command to move the user to the destination
branch,
After moving user, close the Active Directory Services and logged off from the server
Again from Users folder, selected user, added new exchange task and then added custom additional
attributes
After adding all necessary information, closed the Active Directory Services and logged off from
the server
Asked user to log in to AB Bank Webmail using his/her own username and password
30
Once user logged in, opened the signature editing window
Typed the signature information and saved it
Logged off from the computer
From Users folder, selected user and using reset password menu, provided a new password to the
user
After adding all necessary information, closed the Active Directory Services and logged off from
the server
31
Installed the software
Restart the remote computer to finish installation (If needed)
If installation was successful, logged off from the computer, otherwise repeated all steps again
During primary checking, the computer is examined for component faults, failures, conflicts etc.
If any such problem is found, then solved accordingly and the computer is sent for cleaning
The components are cleaned to remove any dirt/dust particles and sent for software installations
The hard disk of the computer is formatted and new partitions are created
A licensed copy of Windows XP Operating System is installed and
On its first run after operating system installation, the computer is given a name in correspondence
with the user, according to the bank‘s policy
Motherboard drivers for Graphics, Sound Card, Chipset and Network Interface Card are installed
Other peripheral drivers like printer, scanner, modem drivers etc. are installed
Necessary office software like Anti-Virus Software, Office Document editor, PDF Reader, File
Compressing software, Remote access software, Corresponding Banking Software etc.
After all hardware/software installation are completed, the computer is re- checked for faults and if
no problems found, it is sent to the respective branch for the new user
Once user receives the computer and turns it on, a unique IP address is provided from NOC and also,
the computer is added to ABBL network domain using its name given on first run
Finally, the computer is ready to be used for the user‘s official working purposes
32
Transferring data between hard disk drives
Turned off the power from the CPUs storing the source and destination hard disks respectively
Unplugged the source hard disk from its CPU case
Connected it to the CPU case holding the destination hard disk using SATA/IDE port
If both the hard disks do not use the same connection ports, then a converter is used in between
which is connected to the destination CPU‘s USB port
It should be ensured that the destination CPU has its own hard disk selected as the highest-
priority boot device
Once the source hard disk is connected properly, the destination computer is turned on
After it is turned on, the partitions of the source hard disk can be seen as different logical disk
drives along with the computer‘s own logical disk drives
The necessary data is then copied/moved from the source disk drives to the destination hard disk‘s
logical drives with necessary free-up spaces
Once data transfer is completed, the destination computer is turned off and the source hard disk
drive is disconnected from the destination computer
33
5. Limitations
The bank is using the IS very efficiently and increasing its profitability, but still there are many things that
should be improved. It’s mainly customized by their own employees. That’s why it takes low level
responsibilities. Management cannot use this software for market analysis, hypothesis testing or client
segmentation. However this software has some new features, but that should be more developed. Using of
this software is rarely new. So, it needs more time to make itself as an international standard. AB Bank use
high range software but skilled technicians are not available in Bangladesh. For any kind of software
problem bank has to contact with a software company which located in other country. Which hamper the
banking system. The network frequency in Bangladesh is not good. Some time it does not works. Fiber
optical is not fully operated in Bangladesh. So sometimes the server does not work.
34
6. Findings
The bank is using the IS very efficiently and increasing its profitability, but still there are many
things that should be improved.
A With the increase in the technology, the bank should made it IS up-to-date for providing
best services to their customers and attracting more customers and increasing its
productivity.
B The security of these system should be made.
C Credit cards system should be improved providing the unique facilities to their
customers which the other banks has not yet introduce.
35
7. CONCLUSION
A management information system is a system or process that provides the information necessary to manage
an organization effectively. MIS and the Information it generates are generally considered essential
components of Prudent and reasonable business decisions. This report discuses all the activities that the
Management Information System perform in our selected organization “AB Bank (Bangladesh)”.The
reports starts with the background history of the bank such as when it establish in Bangladesh, the branches,
pre and post era etc. It explains all the TPS how the transactions are made by the bank, using of these TPS
from the new events such as account opening, new allowances etc to the routine work including cash and
payments record, updating of records, payroll and the processing of the complaints. These TPS holds all
the activities from the manager and employees to the customers. The report discuss the inbound and the
outbound logistics and relate all the processes of TPS used in the bank with the MIS, enabling the bank to
provide the quality and satisfactory services to their customers. Also includes the inter relations, of all the
entities in the database of the bank. ERD diagram represents all these relations.
36
8.References
http://www.abbank.com.bd/background-of-abbl.html
http://www.abbank.com.bd/corporate-information.html
http://www.abbank.com.bd/products-and-services.html
http://www.abbank.com.bd/vision-mission.html
http://www.abbank.com.bd/abblit.html
http://www.abbank.com.bd/abbl-at-a-glance.html
http://en.wikipedia.org/wiki/Fixed_Assets_Register
http://google.com
http://en.wikipedia.org
http://misys.com
http://bangladesh-bank.org
AB Bank IT Division documentations
37