Chapter 15 - Technology in Treasury Flashcards
One of the core functions of treasury is to do what with treasury operations as it relates to other operational areas?
Integrate
Areas of data management that Treasury is responsible for:
(review)
- Protecting financial assets
- Compiling data from a wide array of internal and external sources
- Sorting, analyzing, and storing information
- Initiating and validating transactions
- Obtaining account balancers and transaction details from external sources
- Obtaining internal information that affects the cash flow timeline
- Consolidating information into the cash position worksheet
- Creating forecasts
- Identifying, measuring, and managing risk
- Providing data for accounting
- Reporting information to management
- Assisting with other areas with any treasury-related research
- Automating as much of the collation and analysis of the above activities as possible
Major Benefits of Spreadsheets
Low initial cost, ubiquity, and ease of access and use
Ideal for standalone analysis
Primary Downside to Bank Portals
They are typically limited to just one bank
Greatest Advantage for ERP Systems
Single processing platform for all of an organization’s accounting and finance software
Disadvantages of the Treasury Module in an ERP
Requires more IT support
Can be much more expensive
Three Types of Technology Platforms
Installed System
Enterprise Technology
Cloud or SAAS
Installed System
Installed onto the company’s server and accessible by multiple computers
Can be limited to specific department or company-wide
Usually customized to meet the needs of the client
Downside to Installed Systems
Difficult and more cumbersome to update
Enterprise Technology
Similar to a departmental client/server environment but is expanded and typically has more processing capability to handle the overall information technology needs of an entire organization
Enterprise Technology will require the existence of what?
A dedicated IT function to handle the overall security, backup, and information control
Advantages and Disadvantages of Enterprise Technology
Easy to exert control
Competing desires for new technology
Higher cost
Hosted solutions are also often referred to as
Cloud computing
How is billing usually setup for SAAS?
Per-use or per-user or some combination
Billed based on what is used, unlike locally installed solutions
What does the pricing model for SAAS usually lead to?
Results in higher ongoing fees, but will reduce or eliminates up-front costs for new software or new hardware
Information Security 5 Basic Elements
* Privacy
* Authentication
* Authorization
* Integrity
* Non-repudiation
Privacy – information is only accessible by authorized individuals
Authentication – the ability to know who is accessing information or initiating
Authorization – ability to know and control what functions an data an individual can access
Integrity – ensure a message was not modified and that stored data has not been improperly modified or deleted
Non-repudiation – inability of the sender or receiver to deny having sent or received the message or that the original is not valid
Authentication 4 Basic Factors
Something the individual knows
Something the individual has
Something the individual is
Something the individual does
What is the current standard when it comes to authentication when trying to stay secure?
Dual-factor authentication
Out-of-Band Authentication Controls
Additional steps taken outside the technology boundaries of a specific transaction
For example, a callback to a previously known number
Encryption
Process of transforming information using a computer-based model to make it unreadable except by those possessing a key
Two Basics of Information Technology that encryption addresses
Privacy
Non-repudiation
Public-Key Infrastructure (PKI)
One private key and one public key
Information encrypted using the public key can be decrypted by the private key and information decrypted using the public can be verified as coming from the private key
Digital Signatures are tied to what?
The individual document and the signer
Digital Certificates
Tie the identity of the user (private key) to the user’s public key
May be used to authenticate the devices used to create documents or transactions