Vous êtes sur la page 1sur 37

A Report on

Application of MIS in
AB Bank
Couse Title: Management Information Systems
Course code: MGT-304

Prepared for

MD Rubel
Assistant Professor
Department of Management Studies
Jahangirnagar University.

Prepared by

Team MGT 7th Batch

Members ID Batch
MD:Momenul Islam Sumon(L) 1842 7th
Tanjum Sarwar Rimi 1813 7th
Md. Delwar Hossain 1840 7th
Dipu paul 1826 7th
Md: Juwel Rana 1839 7th
Afsana Fairuj Yeati 1812 7th

Date of Submission 30 July 2019


1
Letter of Transmittal

Date: 30, 07, 2019

To

MR.MD. Rubel

Dept. of Management Studies

Jahangirnagar University

Savar , Dhaka

Subject: Submission of MIS Report

Dear Sir,

With due admiration, we beg to state that we are the student of Dept. of Management Studies
Jahangirnagar University. It is certainly a great happiness to have the chance to submit the
report. We have prepared the report to submit according to your advice. The topic name is “MIS
Application in AB Bank”. We have tried our best to complete the report with more information
and standard one. Please you will recommend us if any part of the report means inappropriate
and irrelevant with the subject.

We are grateful to you for giving us a great time and giving us the support to do this report.

If you want to have any clarification we will be honored to be in your service. Thank you.

With regards
Md. Momenul Islam Sumon
Id: 1842
On behalf of “Team MGT 7th Batch”

2
Acknowledgment

At first we would like to pay our gratefulness to “Our Honorable Teacher” to give us such an
interesting and educative topic. Our assignment topic is “MIS Application in AB Bank.”. Our team
which is comprises six members give its whole hearted co-operation and effort to do the report
successfully. At the very beginning we have set our Objectives and sketch our roadmap to perform
the report. Initially we have spent some times to understand the general concept of overall report
& related things to it. More over this report requires not only the best utilization of our knowledge
and our commitment as well but also enriches our knowledge. This assignment helps us to gather
bulk of information which surely helps us in our future life.

3
Executive summary
This report is a written representation of the various activities performed by the Management Information
Systems (MIS) of AB Bank Limited. AB Bank Limited, the first private sector bank in Bangladesh, started
its journey on 1982, started implementing online operations since 2006, which is now put into effect in all
the branches connected to the AB Bank LAN. Online Operations Management System allows automated
conduction of traditional as well as modern banking products and services, with different management
methods and techniques. It is a colossal process, involving a great deal of tasks, most vital and significant
in successful everyday banking venture. The most important aspect of this system is the Network
Management process, responsible for maintaining the bank’s connectivity backbone, is accomplished
through Network planning and designing, Network implementation and configuration, Network monitoring
etc. The Hardware Management process within the system in question, deals with different IT
hardware back-end support and maintenance procedures. The AB Bank Data Centre, which is the heart of
AB Bank IT Division, is carefully monitored and maintained through constant dedicated observations. Any
system fault within the Data Centre is handled in instant supportive manners by the IT division. Branch
LAN Management, another important sector that maintains AB Bank Branch Connectivity architecture
through proper up keeping techniques. IT Division is also responsible for maintaining, monitoring and
troubleshooting email accounts and internet access provisions, allocated for the bank’s employees. Along
with all these activities, IT division provides support for smooth functioning of all banking software by
ensuring proper maintenance at the back-end with necessary supportive and monitoring measures. In fact,
IT Division also manages Logistics Support that includes the purchasing and replacing of different
hardware, as per the needs of the online operations management system. By highlighting all these activities,
this report provides a rather composed picture of the massive working process, conducted within a bank’s
Online Operations System.

4
Table of content

No Name Page no
Introduction
1.1 Objectives of the report 6
1.2 Methodology 6
1.2 Online Operation Of the Bank 7
Organization Profile
2.1 Company background 8
2.2 Corporate Information 9
2.3 IT Division at a Glance 10
AB Bank MIS Policy
3.1 Introduction 11
3.2 MIS Policy 11
3.3 Email Policy 12
3.4 Anti-virus Policy 13
3.5 Documentation 14
Application Of MIS In Bank
4.1 IT Infrastructure 15
4.2 Network Management 15
4.3 Hardware Management 20
4.4 AB Bank Data Centre Maintenance 22
4.5 AB Bank Email Account Management 23
4.6 Banking software Support 26
4.7 Logistics Support Management 27
4.8 Branch Support 29
4.9 Hardware Support 32
Interactive session
5 Limitations 34
6 Findings 35
7 Conclusion 36
8 Reference 37

5
1. Introduction
1.1 Objective of the report

Bangladesh Bank has adopted advanced ICT to be digitized in all spheres of its functions including
monetary policy, banking supervision and internal management. BB has already permitted for e-
commerce, e-banking, automated clearing house, ATM Services, electronic fund transfer etc. This has seen
the introduction of sophisticated Online Operations Management System in different banks of the country
and AB Bank is no difference. The field of Information & Communication Engineering, concepts at
analogue and digital communication systems, information processing and computer communication
networks provide a resourceful appendage to relevant learning and understandings.

1.2 Methodology
1.2.1 Research design: We conducted a descriptive research to correlate the theories

of Management

Information Systems with current practices.

1.2.2 Data collection method We used both primary and secondary data to conduct the study.

1.2.3 Primary data

Primary data will be collected from-Key Informants Attend (KIA) who are knowledgeable or expert

of Management Information Systems in Bangladesh.

1.2.4 Secondary data

Secondary data will be collected from-Journals Textbooks Articles Publications Websites

1.2.5 Instruments of data collection

Different types of data collection tools will be applied in this study considering types of the respondents

and methods of the study. Major data collection tools that will be applied to conduct the study are as

follows: Semi-Structured Interview Schedule (SSIS): A semi-structured interview schedules was used to

6
collect data from operation level managers .Question Guideline for expert interview: A comprehensive

question guideline was developed. This guideline facilitated the process of interviewing the experts and

higher level managers.

1.3Online Operations of a Bank


Online Operations within a bank are basically the direct automated deliveries of both modern and
traditional banking products and services to customers through electronic, interactive communication
channels. Online operations of a bank are performed through a management system that allows financial
institution customers, be it individuals or businesses, to perform the following—

Access accounts

Transact business

Obtain information on financial products and services through a public or private network, including the
internet

Customers access online banking services through intelligent electronic devices, namely—

Personal Computer (PC)

Automated Teller Machine (ATM)

Mobile phone

Online banking operations are providing much-needed advantages for a bank, required to enhance its
reputation for providing thorough and proper banking services. Some of the many benefits of online
operations include—

Operation cost reduction

Improved introduction of new products

Better customer service

Improved risk management

Mitigation of Operational Risk

Real-time transaction

Scaled up operations

Efficient and easy technique .

7
2. Organization profile
2.1 Company Background
AB Bank Limited, the first private sector bank was incorporated in Bangladesh on 31st December 1981 as
Arab Bangladesh Bank Limited and started its operation with effect from April 12, 1982.

AB Bank is known as one of leading bank of the country since its commencement 27 years ago. It continues
to remain updated with the latest products and services, considering consumer and client perspectives. AB
Bank has thus been able to keep their consumer‘s and client‘s trust while upholding their reliability, across
time.

During the last 27 years, AB Bank Limited has opened 77 Branches in different Business Centers of the
country, one foreign Branch in Mumbai, India and also established a wholly owned Subsidiary Finance
Company in Hong Kong in the name of AB International Finance Limited. To facilitate cross border trade
and payment related services, the Bank has correspondent relationship with over 220 international banks of
repute across 58 countries of the World.

8
2.2 Corporate Information

Company name & logo

Legal Form: A public limited company incorporated on 31st December, 1981 under the
Companies Act, 1913 and listed in the Dhaka Stock Exchange Ltd and Chittagong Stock Exchange
Ltd.

Commencement of Business
27th February 1982

Registered Office
BCIC Bhaban, 30-31, Dilkusha C/A
Dhaka 1000, Bangladesh.
Tel: +88-02-9560312
Fax: +88-02-9564122, 23
SWIFT: ABBLBDDH
E-mail: info@abbank.com.bd
Web: www.abbank.com.bd

9
2.3 IT Division at a glance
Being the first private sector Bank of the country, AB Bank has prided itself in the quality of the banking
services it provides by taking conscious decision to employ the best available banking technology to serve
the customers which now stands over 200,000 in all. Core Banking System KAPITI was employed
alongside the manual banking operations ever since 1984. Later on in the year 2004, Misys core banking
solution was selected for implementation to take AB in to super highway of real time online banking of
today. Beginning, 2005 MISYS implementation was taken-up and in the 1st Phase seven branches were
upgraded to the new core banking system.

For the year 2006, in line with the growth strategy, service quality improvement and availability were put
into focus whereupon coverage of remaining Branches under MISYS became all the more important. Bank
took up a massive Project of migration, connectivity and standardization of processes and hardware
throughout. A CORE TEAM was formed. The theme was YES WE CAN. We made it possible.
Trade Finance Software: Trade Innovation
Internet Banking Software: Integrated Financial Module

10
3. AB Bank MIS Policy

3.1 Introduction
The banking industry has changed in the way they provide service to their customers and process
information in recent years. Information Technology has bought about this momentous transformation.
Security in Information Technology for a financial organization has therefore gained much greater in
importance, and it is a vital issue that we ensure that such risks are properly identified and managed.
Information and Information Technology systems are essential assets of the bank and as well as for their
customers and stakeholders. Protection and maintenance of these assets are critical to the organizations
‘sustainability. IT Division of the bank must take the responsibility of protecting the information from
unauthorized access, modification, disclosure and destruction to protect customers ‘interest.

3.2 MIS Policy


The MIS policy is basically a plan, outlining what the company's critical assets are, and how they must (and
can) be protected. Its main purpose is to provide staff with a brief overview of the "acceptable use" of any
of the Information Assets, as well as to explain what is deemed as allowable and what is not, thus engaging
them in securing the company's critical systems. The document acts as a "must read" source of information
for everyone using in any way systems and resources defined as potential targets. A good and well
developed security policy should address some of these following elements—

How sensitive information must be handled

How to properly maintain user ID(s) and password(s), as well as any other accounting data
How to respond to a potential security incident, intrusion attempt, etc.

How to protect virus attack & devastating

How to use workstations and Internet connectivity in a secure manner

How to properly use the corporate e-mail system

11
Basically, the main reasons behind the creation of a security policy is to set a company's information
security foundations, to explain to staff how they are responsible for the protection of the information
resources, and highlight the importance of having secured communications while doing business online.

3.3 Email Policy


Several rules and regulations are applied to ensure a smooth functioning of the email services provided to
the employees of AB Bank Limited. These rules are meticulously maintained and monitored in such a way
that users are unable to violate any rules. These rules are as follows—

If (E-mail) attachments are allowed, the attachment(s) must be scanned before opening as well as confirming
with the sender.

No attachments should exceed the 1MB limit within the branch, 20 MB within the head office and 10 MB to
outside users.
Maximum disk space limit for general email user account is 100 MB.

Java and ActiveX must be disabled while reading e-mail in order to prevent auto- execution of malicious
programs.
Company e-mail accounts should not be used for online registration purposes.

Company e-mail accounts should not be used for running any user‘s personal businesses, excessive personal
mailing, sending large attachments etc.

Users should not respond to chain letters, or any other sort of spam using the company email systems.

12
Never forward any company data to external e-mail accounts without first checking with the manager or
NOC.
The proper use of the E-mail system should continuously be monitored

Users are not allowed to send unsolicited email messages, including "junk mail"

No harassments should be done using company email

Unauthorized use or forging of email header information are not allowed

Spamming is strictly prohibited

To stop email rule violations, AB Bank email gateway solution is enabled for—

Corporate compliance (anti-spam, privacy, vulgarity, harassment)

IP protection

Regulatory compliance

3.4 Anti-Virus Policy

The anti-virus package must be kept up to date using an automated and timely process as possible. The method
of updating will be documented in a support procedure.

Systems management activity should interact with the anti-virus control package to record logs of detection.

Specifically, all LAN servers, PCs, and other vulnerable workstations must run an anti-virus control package
and, where possible, must be included as part of the standard-build for a particular environment.

Specific procedures must exist to ensure that all users of laptops or other portable equipment are updated
frequently.

Users should be educated about virus update and notify IT if the update does not take place.

Users should take responsibility of their own data if user‘s data is not managed centrally.

13
3.5 Documentation
To compliance with the ICT policy AB Bank Limited IT Division maintains the following documents for
smooth operation of IT task—

Organogram of IT Division.

Job Description (JD) for each individual of IT department

A scheduled roster for IT operation where needed.

Segregation of duties for IT tasks.

Fallback plans for various levels of system support personal.

4. Operations of Management Information Systems

14
4. Applications of MIS in AB Bank

4.1 IT Infrastructure

AB Bank Limited, which introduced online operations way back in 1984, is presently in possession
of one of the most efficient IT infrastructures among all the commercial banking organizations.
This infrastructure is handled by the Network Operations Center (NOC), which is operated
under the supervision of a team of 7 competent, talented and hardworking IT professionals. This
team, lead by the head of IT, provide with sincere efforts on maintaining the optimum efficiency
of the bank‘s online network. The team is responsible for providing services like LAN & WAN
link monitoring, new branch premises connectivity, bandwidth monitoring, data Centre & disaster
recovery maintenance, mail server (Exchange), Internet use monitoring and reporting (using
MacAfee Web Washer), IT budget, etc.

The different elements of online infrastructure of AB Bank can be distributed into the following
categories—

Network Management

Hardware Management
Data Centre Maintenance
Mail & Internet Support
Branch Support

Desktop Application Support

4.2 Network Management


Network management is a combined term which comprises of the activities, methods, procedures,
devices and tools for performing different actions within a networking system. Network
Management basically includes—

Network planning and designing

15
Network implementation and configuration
Network monitoring

These features require the network management team to perform the following operations, as
instructed by International Standards Organization (ISO)—

Fault management - The process of identifying and locating faults in the network. This could
include discovering the existence of the problem, identifying the source, and possibly repairing (or
at least isolating the rest of the network from) the problem.

Accounting management - The process of identifying individual and group access to various
network resources to ensure proper access capabilities (bandwidth and security) or to properly
charge the various individuals and departments.
Configuration management - The process of identifying, tracking and modifying the setup of
devices on the network. This category is extremely important for devices that come with numerous
custom settings (e.g. routers and file servers).

Security management - The process of controlling (granting, limiting, restricting or denying) access
to the network and resources thereon. This could include setting up and managing access lists in
routers (creating "firewalls" to keep intruders out), creating and maintaining password access to
critical network resources, identifying the points of entry used by intruders and closing them.
Performance Management - The process of measuring the performance of various network
components. This also includes taking measures to optimize the network for maximum system
performance (periodically measuring of the use of network resources).

Network Planning and Designing


Network planning and designing is a complex process that involves topological network
design, network-synthesis, network-realization etc. for a proposed communication network of an
organization. Network planning and designing should satisfy the following requirements—

Identifying usable applications – Consider network related applications like Enterprise Resource
Management (ERM), Internet telephony, Instant Messaging (IM), e-mail etc.

16
Traffic Requirements - Identification and documentation of major traffic sources, Categorization
of traffic as local, distributed, client/server, peer-to-peer,terminal/host or server/server, Estimation
of bandwidth requirements for each application, Quality of Service (QoS) requirements for each
application, Reliability requirements etc.
Scalability Requirements - Provision for scalability related operations like add users, applications,
additional sites, and external network connections etc.

Geographical considerations – WAN and LAN implementation according to geographical


locations. For example, LAN should be established for communication over a smaller area and
WAN should be considered for communication over different LANs residing in different
geographical locations

Availability – Constant access and usage of the network must be ensured through proper network
planning and deigning for the purpose of company benefits

Security and Accessibility – Breach proof security plan should be devised by including a list of
network services and administrators, training procedures for related personnel, network recovery
strategies in case of security breaching incidents

Cost considerations - For LANs, costs for equipments like cable, routers, switches, computers,
servers along with labour cost should be reduced. As for WANs, bandwidth cost minimizing
should be primarily achieved.

Network implementation and configuration


Network implementation is the process of deploying a network by connecting necessary
equipment following methodical processes like—

Physical network design


Remote access provisions
Configuration of network elemen

17
Network monitoring
AB Bank Limited has a well Organized and promptly functioning network of 77 branches in
Bangladesh along with a branch in Mumbai, India. For better performance, this network design
follows redundant policy of one backup connection for each node within the network. The
efficiency of this network ensures the smooth functioning of online operations for all the branches
of the bank. To accomplish this, three categories of monitoring are performed, namely—

LAN and WAN monitoring

Network traffic Monitoring


VPN Tunnel Monitoring

LAN and WAN Monitoring Software


AB Bank Limited uses the very efficient and popular Nagios Network Monitoring System to
perform node monitoring. It basically performs the following—

Monitoring of network services and node resources

Parallelized and also customized service checks


Ability to define network host hierarchy and
Event handler creation for troubleshooting
Optional web interface for displaying monitoring statistics.

Network traffic Monitoring


Network traffic monitoring is the process of measuring, controlling and tracking the amount and
mode of communication to and from a network. A proper monitoring of the network traffic is aptly
necessary so that the bandwidth allocated to different sections of any organization is utilized to
ensure faster and efficient access to both the internet and the intranet. Usually, Network traffic
monitoring is performed through various methods such as—

Diagnosing network events

Network polling by continuously checking network devices to gather information of their


functionality states

18
Obtaining detailed statistics for IP addresses, ports, sessions, etc.
Monitoring application packets

Viewing protocols distribution, bandwidth utilization, and packet size


Monitoring network error packets in real time.
Generating inclusive statistics
Monitoring HTTP requests, email messages and FTP transfers.

Browsing decoded packet information of network nodes.


Viewing TCP connection status.
Defining advanced filters with logical rules and multiple parameters.

Importing and exporting packets to the files in multiple formats

Virtual Private Network (VPN) Tunnel Monitoring


A tunnel is a secured network route established to transfer data of a particular network through
other networks. It is most commonly known as the Virtual Private Network (VPN) Tunnel. In
a VPN tunnel, packets constructed using a specific VPN protocol are encapsulated by some other
protocol, transmitted between VPN client and server and finally de-encapsulated of the outer
encapsulation upon receiving. VPN tunnels are essential components within any network, being
strong contender for state-of-the-artmonitoring privileges. The integrity of a VPN tunnel is
absolutely necessary for ensuring flawless performance of an organization network. Therefore, the
VPN tunnel is observed for any problems/failures and solved as higher priority, all this done by
VPN tunnel monitoring. VPN Tunnel monitoring is a process comprising of the following
features—

Active monitoring - Active monitoring is done to provide real-time monitoring for each devices
within the network, depending on inter-network alerts
Passive monitoring - This relies on external alerts for solving problems within the network
Thresholds monitoring – Alerts to warn for device parameter constraint breaching
Performance monitoring - To keep track of device state/health responsible for performance issues
Custom monitoring - To track for customized individual/combined network element performance
metrics
Active script performance monitoring – Keeps tracks for active scripting languages like
JavaScript, VB Script etc.

19
Pre-configured monitoring - Predefined monitoring processes set to begin monitoring
immediately at initial stages
Critical monitoring – Seeking out for critical component failure, troubleshooting and recovery
Security monitoring – Provides tracking and alerting support for any security breaches on the
VPN tunnel

4.3 Hardware Management

In information technology, hardware is a comprehensive term for all of the physical parts of a
computer, as distinguished from the data it contains or operates on, and the software that provides
instructions for the hardware to accomplish tasks. Hardware management basically comprises of
maintenance and troubleshooting procedure of different hardware, as categorized into following
classes—

Processing Components – Processing components are essential for proper functioning of IT


hardware, as they perform the core information processing. These include—

 CPU
 Casing
 Motherboard
 Power supply

Storage Components - Storage components include storage media for preserving essential
information permanently. Storage devices include—

 ROM (Read Only Memory)


 RAM (Random Access Memory)
 Hard disk drive
 Optical drives like CD, DVD etc.

Peripheral Components – Peripheral components work as human interfaces, and not included in
primary functionalities of a computer. These typically include—

 Display devices like monitor, multimedia projector etc.


 Mouse
 Keyboard

20
 Printer
 Scanner
 Modem

Networking Components – Networking components are responsible for data transmission and
operations of a computer network. These include—

 Router
 Switch
 Hub
 Gateway
 Access Point
 Network Interface Card (NIC)
 Networking Cable
 Network Bridge
 Modem

21
4.4 AB Bank Data Centre Maintenance
Data Centre maintenance is crucial in ensuring peak efficiency of a Data Centre. The
maintenance process in AB Bank Data Centre is performed by the following steps—

Component maintenance – Following essential Data Centre components are properly maintained
and upgraded—

 Routers
 Switches
 Servers
 Security components
 System resources (memory, storage, CPU, optical drives etc.)
 Operating systems
 Applications
 Accessories (server racks, cabling, panels, drive bays etc.)

The monitoring process focuses on the following elements within the Data Centre—

 Ventilation
 Lighting
 Power systems
 Security systems

22
4.5 AB Bank Email Account Management
AB Bank Limited maintains a well organized email account management system, carefully
operated under the watchful eyes of the Network Operations Center (NOC). AB Bank Limited
provides both webmail and desktop email client provisions for its employees. The webmail URL
of AB Bank Limited webmail is http://mail.abbank.com.bd and the bank uses Microsoft
Outlook as the desktop email client. This management is performed through the following steps—

Email User ID Creation


On formal request and approval from Branch Management or Department, two email addresses
are created for a user with both personal name as well as functional designation. Personal email
address will have mails forwarded to the corresponding user‘s personal folder and these mails will
not be archived or copied. However, the email address created with functional designation will
have official mails forwarded and archived or copied. If one employee leave the organization or
transferred to another branch/department, the new user of that functional post will get all the
official mails forwarded to the previous employee to help the new user track previous
correspondence.

An example of both personal and functional email address can be as follows—

Example Name - abc


Example Branch code - defg

Functional Designation - Manager


Personal Email ID - abc@abbank.com.bd
Functional Email ID - defgmg@abbank.com.bd

23
Email Password Setting
Passwords are an important aspect of email security. They are the front line of protection for user
email accounts. A poorly chosen password may result in the compromise of AB Bank‘s entire
corporate network. There are several rules for setting a password for an email account—

Minimum password length - 8 characters


Minimum password age - 1 day
Maximum password age - 30 days

Password history - 13 passwords


Account Lockout
Lockout after bad logon attempts - 5 attempts
Reset account after bad logon - 30 minutes

Lockout duration - Up to Administrator clearance


Forcibly disconnect users from sever when logon hours expire - Enabled
User must logon in order to change password - Enabled
Password for screen saver - On for 10 minutes

Guest account is disabled


Domain Guests group disabled

Email Password Protection


The following steps are briefed to AB Bank users regarding password protection of an email
account—

A password should not be revealed to absolutely anyone


"Remember Password" feature of applications should not be used

No hint should be given at the format of a password


Passwords should not be written down or stored without encryption.
Passwords should be changed at least once in a month
A password should be reset in case of any suspected compromises

24
Email Troubleshooting
Several troubleshooting issues faced by users of AB Bank Limited email account holders, are
solved from the NOC through remote access to their desktops. Examples of such troubleshooting
include—

User is unable to send email


User is unable to receive email

User forgets password


User signature is not added
Incorrect user signature

User is unable to login to email account


Email sent from a user is bounced back
User faces low disk-space problem

User information needs to be update on any changes (i.e. change of department/branch, change of
contact information; user is no longer employed in the bank etc.)
Email delivery is very slow
Email server requires updates
Email server is down

Rejection of email attachment


Email password leak

AB Bank Web Access Monitoring


AB Bank Limited uses a 5 MB (Megabyte) Internet connection for all its branches and also the
different sections of the corporate office. As per convention, both web access blocking and web
access monitoring are applied to all employees of the bank belonging to different sections, for the
purpose of a successful web access management system. The web access management process is
also performed by AB Bank‘s Network Operations Center (NOC).

AB Bank‘s NOC performs Internet access monitoring and blocking through McAfee Web
Gateway, which offers powerful, proactive protection against blended threats, spyware, and
targeted attacks.

25
AB Bank Desktop Application Management
AB Bank IT Division is responsible for handling all the software used within the organization.
This not only includes specific banking software but also general computer applications needed
for everyday organization activities-

Microsoft Windows XP Professional - Windows XP Professional is an operating system (OS)


produced by Microsoft for use on desktop, laptop, and media center Computers. It performs
management and coordination of processes and the sharing of the resources of hardware, acts as a
host for computing applications running on the OS.
Microsoft Office 2003 - Microsoft Office 2003 is a software suite written and distributed by
Microsoft for their Windows operating system. It includes core applications like Microsoft Word
2003, Microsoft Excel 2003, Microsoft PowerPoint 2003 etc.

Adobe Reader 5.0 - An application program developed by Adobe Systems. This application is
designed to view, create, manipulate and manage files in Adobe's Portable Document Format
(PDF), used for representing documents in a format independent of the application software,
hardware, and operating system.

WinRAR 3.0 – WinRAR 3.0 is a file archiving and data compression utility. It is capable of encoding
information using fewer bits or other information-bearingunits, allowing the encoded data to
occupy lesser disk space than an un-encoded data file, through use of specific encoding schemes.

4.6 Banking Software Support


The rapid advancement in Information Technology (IT) has had a profound impact on the banking
industry over the last two decades. This has resulted in the tremendous rise of online operations
within banking sectors globally. Online operations now plays the leading role in facilitating a
bank‘s organizational structures, business strategies, customer services and other related functions.
Smooth functioning of online operations ensures the efficiency of performing successful banking
functionalities. An essential and integrating element of successful online operations within a
banking organization is state-of-the-art banking software solutions. In banking sector, such facility
is collectively termed as Core Banking System.

26
4.7 Logistics Support Management

AB Bank Limited IT Division handles the management process of IT logistics through


its Network Operations Center (NOC). NOC basically provides the logistics support for all
physically existing materials used as IT resources. These include the facilities, hardware, software,
documentation, manpower, and personnel needed to operate and support IT systems and the
software within those systems. These resources also include both stand-alone and embedded IT
systems. In order to perform logistics management, NOC considers the following parameters—

System constraints like design specifications, item configuration and safety precautions
Handling equipment and procedures

Security requirements
Geographic and environmental impacts and constraints
Spare or repair parts storage requirements

Emerging Packaging, Handling, Storage, and Transportation (PHS&T)technologies, methods,


or procedures
Resource-intensive PHS&T procedures

NOC has categorized its logistics management process in the following three sections—

Requirement Analysis
Purchase
Warranty Claim

Requirement Analysis
Requirements analysis by the IT division is the process of determining necessity for new or
modified IT equipments. Requirement analysis is done by the following steps—

Information of requirements for IT equipments are gathered from the users

Validity of the known requirements on clarity, completeness, essentiality, uniqueness, and meeting
the financial limits set by the permitted budget is determined

27
Once requirements are found valid, they are documented and sent to AB Bank purchase division
from IT to issue purchase order

Purchase
As the purchase requests are sent from the IT division to the purchase division of AB Bank, the
following methods are performed—

Price quotations are obtained from the respective vendors of the equipments as mentioned in the
documented requirement analysis

All the received price quotations are scrutinized and the one that offers the best product with
minimum expense is selected

A memo of the selected price quotation for the required product is sent to the management
committee of the bank for final accreditation

Once the management committee approves of the purchase, a purchase order is issued to the
selected vendor and the product is obtained upon payment

Warranty Claim
After purchasing of any IT equipment, if it falters over time, then the following actions are
performed for warranty claim—

The warranty period of the faltering equipment is checked to see if it is still applicable

If warranty period is over, then a purchase of a newer version of the equipment is performed
following proper procedures

If warranty period still persists, then the vendor is contacted and asked to supply with a fresh copy
of that faltering equipment

Using Microsoft Remote Desktop Services


It usually required the following steps to be performed during remote support/maintenance using
Microsoft Remote Desktop Services —

Started Remote Desktop Services using the Run command


Entered computer name/IP address on the connection screen

28
Connected with selected remote computer as remote window opened
Logged into selected remote computer with administrator privilege
Performed the required application maintenance operation
Logged off and the remote window closed automatically

4.8 Branch Support


The Network Operations Center (NOC) of AB Bank Limited provides support services to all its
branches using remote access software VNC Viewer or Microsoft Remote Desktop Services.
There are several troubleshooting procedures as stated below—

Installing shared printer


Logged in as administrator to the Remote PC using remote access software

Located shared printer from its original location by opening it using the Run command
Used the connect command to share it with the remote computer

Printed a test page from the remote computer to ensure that the printer is working properly
If successful, then logged off, otherwise, repeated the steps again

Adding new application user to Server domain


Logged in to the Active Directory Server using remote access software

Opened Active Directory Services


Located the branch from the list under the domain
From Users folder under the branch, used the New command to create new user

Added new user information following on-screen instructions

After adding all necessary information, closed the Active Directory Services and logged off from
the server

Moving application user to different branch


Logged in to the Active Directory Server using remote access software

29
Opened Active Directory Services

Located the branch from the list under the domain

From Users folder select desired user, used the Move command to move the user to the destination
branch,

After moving user, close the Active Directory Services and logged off from the server

Adding new e-mail user to Server domain


Logged in to the Microsoft Exchange Server 2007 using remote access software
Opened Active Directory Services

Located the branch from the list under the domain


From Users folder under the branch, used the New command to create new user
Added new user information following on-screen instructions

Again from Users folder, selected user, added new exchange task and then added custom additional
attributes

After adding all necessary information, closed the Active Directory Services and logged off from
the server

Adding e-mail signature in Microsoft Outlook Account


Logged in to the remote branch computer where the new user is placed
Opened Microsoft Outlook
From tools menu, opened the signature input window

Typed the signature information and saved it


Logged off from the computer

Adding e-mail signature in AB Bank Webmail Account


Logged in to the remote branch computer where the new user is placed

Asked user to log in to AB Bank Webmail using his/her own username and password

30
Once user logged in, opened the signature editing window
Typed the signature information and saved it
Logged off from the computer

Resetting e-mail user password in network domain


Logged in to the Exchange Server using remote access software
Opened Active Directory Services
Located the branch from the list under the domain

From Users folder, selected user and using reset password menu, provided a new password to the
user

After adding all necessary information, closed the Active Directory Services and logged off from
the server

Solving low space problem for e-mail inbox in Outlook


Logged in to the remote branch computer where the new user is placed
Opened Microsoft Outlook

Cleared deleted and sent items folders


Moved important e-mails to backup mails folder
Sent a test e-mail to check if the e-mail account was working properly
If the test e-mail got successfully sent, logged off from the computer

Software installation on remote computer


Logged in as administrator to the Remote computer using remote access software
Opened branch ADC computer using Run menu
Located the desired software setup files in the ADC server
Copied software setup files into remote computer

31
Installed the software
Restart the remote computer to finish installation (If needed)

If installation was successful, logged off from the computer, otherwise repeated all steps again

4.9 Hardware Support


The IT division of AB Bank Limited provides hardware support services with the help of its
hardware team by following a consistent maintenance procedure. There are several hardware
troubleshooting procedures performed by this team are as stated below—

Setting up a computer for a new user


If a new computer is provided, then all the parts are assembled according to instruction manuals or
sent for primary hardware checking

During primary checking, the computer is examined for component faults, failures, conflicts etc.

If any such problem is found, then solved accordingly and the computer is sent for cleaning

The components are cleaned to remove any dirt/dust particles and sent for software installations
The hard disk of the computer is formatted and new partitions are created
A licensed copy of Windows XP Operating System is installed and

On its first run after operating system installation, the computer is given a name in correspondence
with the user, according to the bank‘s policy

Motherboard drivers for Graphics, Sound Card, Chipset and Network Interface Card are installed
Other peripheral drivers like printer, scanner, modem drivers etc. are installed

Necessary office software like Anti-Virus Software, Office Document editor, PDF Reader, File
Compressing software, Remote access software, Corresponding Banking Software etc.

After all hardware/software installation are completed, the computer is re- checked for faults and if
no problems found, it is sent to the respective branch for the new user
Once user receives the computer and turns it on, a unique IP address is provided from NOC and also,
the computer is added to ABBL network domain using its name given on first run
Finally, the computer is ready to be used for the user‘s official working purposes

32
Transferring data between hard disk drives
Turned off the power from the CPUs storing the source and destination hard disks respectively
Unplugged the source hard disk from its CPU case

Connected it to the CPU case holding the destination hard disk using SATA/IDE port

If both the hard disks do not use the same connection ports, then a converter is used in between
which is connected to the destination CPU‘s USB port

It should be ensured that the destination CPU has its own hard disk selected as the highest-
priority boot device

Once the source hard disk is connected properly, the destination computer is turned on

After it is turned on, the partitions of the source hard disk can be seen as different logical disk
drives along with the computer‘s own logical disk drives

The necessary data is then copied/moved from the source disk drives to the destination hard disk‘s
logical drives with necessary free-up spaces

Once data transfer is completed, the destination computer is turned off and the source hard disk
drive is disconnected from the destination computer

33
5. Limitations

The bank is using the IS very efficiently and increasing its profitability, but still there are many things that
should be improved. It’s mainly customized by their own employees. That’s why it takes low level
responsibilities. Management cannot use this software for market analysis, hypothesis testing or client
segmentation. However this software has some new features, but that should be more developed. Using of
this software is rarely new. So, it needs more time to make itself as an international standard. AB Bank use
high range software but skilled technicians are not available in Bangladesh. For any kind of software
problem bank has to contact with a software company which located in other country. Which hamper the
banking system. The network frequency in Bangladesh is not good. Some time it does not works. Fiber
optical is not fully operated in Bangladesh. So sometimes the server does not work.

If the server does not work the ATM network is stopped.

In some banks’ prediction is wrong.

In some case planning is wrong.


The present software is not capable to store huge volume of data.
AB Bank has 12 luck clients but the software capable to store only 3 to 4 luck client data.
Presently bank operates their activity by increasing RAM.

34
6. Findings
The bank is using the IS very efficiently and increasing its profitability, but still there are many
things that should be improved.

 A With the increase in the technology, the bank should made it IS up-to-date for providing
best services to their customers and attracting more customers and increasing its
productivity.
 B The security of these system should be made.
 C Credit cards system should be improved providing the unique facilities to their
customers which the other banks has not yet introduce.

35
7. CONCLUSION
A management information system is a system or process that provides the information necessary to manage
an organization effectively. MIS and the Information it generates are generally considered essential
components of Prudent and reasonable business decisions. This report discuses all the activities that the
Management Information System perform in our selected organization “AB Bank (Bangladesh)”.The
reports starts with the background history of the bank such as when it establish in Bangladesh, the branches,
pre and post era etc. It explains all the TPS how the transactions are made by the bank, using of these TPS
from the new events such as account opening, new allowances etc to the routine work including cash and
payments record, updating of records, payroll and the processing of the complaints. These TPS holds all
the activities from the manager and employees to the customers. The report discuss the inbound and the
outbound logistics and relate all the processes of TPS used in the bank with the MIS, enabling the bank to
provide the quality and satisfactory services to their customers. Also includes the inter relations, of all the
entities in the database of the bank. ERD diagram represents all these relations.

36
8.References
http://www.abbank.com.bd/background-of-abbl.html
http://www.abbank.com.bd/corporate-information.html
http://www.abbank.com.bd/products-and-services.html
http://www.abbank.com.bd/vision-mission.html
http://www.abbank.com.bd/abblit.html
http://www.abbank.com.bd/abbl-at-a-glance.html
http://en.wikipedia.org/wiki/Fixed_Assets_Register
http://google.com
http://en.wikipedia.org
http://misys.com
http://bangladesh-bank.org
AB Bank IT Division documentations

37

Vous aimerez peut-être aussi