SlideShare une entreprise Scribd logo
1  sur  20
Topics
1. Market Basket Analysis
2. Global Information Systems
3. Prototyping
4. Change Management
5. Optimization
6. Competitive Advantages in Business
7. Change Management
8. Electronic Data Interchange
9. BPM
10. Cyber Security
What is meant by Market Basket
Analysis?
Market basket analysis is a data mining technique used by retailers to increase
sales by better understanding customer purchasing patterns. It involves
analyzing large data sets, such as purchase history, to reveal product groupings,
as well as products that are likely to be purchased together.
Why market basket analysis?
Retailers use analytics methods like market basket analysis (MBA) to
comprehend the purchasing patterns of their customers. It is used to find out
which products customers usually buy together or put in the same basket.
This purchasing data is used to increase the efficiency of sales and marketing.
Global Information Systems
What are global information systems used for?
A global information system (GIS) is an information system which is developed
and / or used in a global context. A global information system (GIS) is any
information system which attempts to deliver the totality of measurable data
worldwide within a defined context.
Some examples of GIS are SAP, The Global Learning Objects Brokered Exchange
and other systems.
Key components of a global
information system
A working GIS integrates five key components: hardware, software, data,
people, and methods. Hardware is the computer on which a GIS operates. Today,
GIS software runs on a wide range of hardware types, from centralized computer
servers to desktop computers used in stand-alone or networked configurations.
Prototyping
Prototyping is an experimental process where design teams implement
ideas into tangible forms from paper to digital. Teams build prototypes of
varying degrees of fidelity to capture design concepts and test on users. With
prototypes, you can refine and validate your designs so your brand can
release the right products.
Some of the examples of prototypes are wireframes, slides, landing pages,
working models, an interactive frontend, and videos.
types of prototyping
The 4 types of project prototyping are
feasibility prototypes,
low-fidelity user prototypes,
high-fidelity user prototypes and
live-data prototypes.
Benefits of prototyping
Estimation of production costs, manufacturing time and material
requirements. Select machinery required for production. Testing to determine
fit and durability. Receive feedback from customers and end users.
Advantages of using Prototype Model :
• This model is flexible in design.
• It is easy to detect errors.
• We can find missing functionality easily.
• There is scope of refinement, it means new requirements can be easily
accommodated.
• It can be reused by the developer for more complicated projects in the
future.
Change Management
Change management is a systematic approach to dealing with the
transition or transformation of an organization's goals, processes or
technologies. The purpose of change management is to implement
strategies for effecting change, controlling change and helping people to
adapt to change.
5 key elements of change
management
• Prepare the Organization for Change.
• Craft a Vision and Plan for Change.
• Implement the Changes.
• Embed Changes Within Company Culture and Practices.
• Review Progress and Analyze Results.
Optimization
Optimization analysis is a process through which a firm estimates or determines
the output level and maximizes its total profits. There are basically two
approaches followed for optimization − Total revenue and total cost approach.
Marginal revenue and Marginal cost approach.
Types of Optimization
We can distinguish between two different types of optimization methods:
Exact optimization methods that guarantee finding an optimal solution and
heuristic optimization methods where we have no guarantee that an optimal
solution is found.
Competitive Advantage in Business
A competitive advantage is anything that gives a company an edge over its
competitors, helping it attract more customers and grow its market share. A
competitive advantage can take three primary forms: Cost advantage–
producing a product or providing a service at a lower cost than competitors.
Sources of Competitive Advantage
• Product Attribute Differentiation. One way to gain an advantage over
competitors is by differentiating your product from theirs.
• Customers' Willingness to Pay.
• Price Discrimination.
• Bundled Pricing.
• Human Capital.
Electronic Data Interchange
Electronic Data Interchange (EDI) is the computer-to-computer exchange of
business documents in a standard electronic format between business
partners.
Electronic Data Interchange (EDI) is the electronic interchange of business
information using a standardized format; a process which allows one
company to send information to another company electronically rather than
with paper. Business entities conducting business electronically are called
trading partners.
Examples of EDI include Purchase orders, invoices, shipping statuses,
payment information, and so on.
Components of EDI
The 4 major components of EDI are: standard document format, translation and
mapping, preferred communication method and communication network to
send and receive documents.
BPM Lifecycle
The BPM lifecycle standardizes the process of implementing and managing
business processes inside an organization as a series of cyclical stages. It consists
of five phases including design, model, execute, monitor, and optimize.
Steps of BPM
Business Process Management (BPM) is a way to improve and standardize
processes in an organization.
BPM Lifecycle: The 5 Steps in Business Process Management
Step 1: Design.
Step 2: Model.
Step 3: Execute.
Step 4: Monitor.
Step 5: Optimize.
Bank cyber security
Cyber security refers to the organization of technologies, procedures, and
methods designed to prevent networks, devices, programs, and data from
attack, damage, malware, viruses, hacking, data thefts or unauthorized access.
Why is cyber security important in
banking?
Protecting the user's assets is the primary goal of cybersecurity in banking. As
more people become cashless, additional acts or transactions go online. People
conduct transactions using digital payment methods like debit and credit cards,
which must be protected by cybersecurity.
Cybersecurity can be categorized into five distinct types:
• Critical infrastructure security.
• Application security.
• Network security.
• Cloud security.
• Internet of Things (IoT) security.

Contenu connexe

Similaire à Topic 12 Miscellaneous Concepts in IT.pptx

Digital Transformation.pptx
Digital Transformation.pptxDigital Transformation.pptx
Digital Transformation.pptx
Rajoo Jha
 
Chapter 2Valuing InnovationsExplain why and how companies ar.docx
Chapter 2Valuing InnovationsExplain why and how companies ar.docxChapter 2Valuing InnovationsExplain why and how companies ar.docx
Chapter 2Valuing InnovationsExplain why and how companies ar.docx
christinemaritza
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerce
ellamee27
 
Strategy Basecamp's IT Diagnostic - Six Steps to Improving Your Technology
Strategy Basecamp's IT Diagnostic - Six Steps to Improving Your TechnologyStrategy Basecamp's IT Diagnostic - Six Steps to Improving Your Technology
Strategy Basecamp's IT Diagnostic - Six Steps to Improving Your Technology
Paul Osterberg
 
Business.pdf
Business.pdfBusiness.pdf
Business.pdf
vikaschaurasia40
 
Business Intelligence Unit 1.pdf
Business Intelligence Unit 1.pdfBusiness Intelligence Unit 1.pdf
Business Intelligence Unit 1.pdf
vikaschaurasia40
 

Similaire à Topic 12 Miscellaneous Concepts in IT.pptx (20)

Digital Transformation.pptx
Digital Transformation.pptxDigital Transformation.pptx
Digital Transformation.pptx
 
Chapter 2Valuing InnovationsExplain why and how companies ar.docx
Chapter 2Valuing InnovationsExplain why and how companies ar.docxChapter 2Valuing InnovationsExplain why and how companies ar.docx
Chapter 2Valuing InnovationsExplain why and how companies ar.docx
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerce
 
Using Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic CommerceUsing Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic Commerce
 
BI
BIBI
BI
 
Customer Relationship Management unit 5 trends in crm
Customer Relationship Management unit 5 trends in crmCustomer Relationship Management unit 5 trends in crm
Customer Relationship Management unit 5 trends in crm
 
Strategy Basecamp's IT Diagnostic - Six Steps to Improving Your Technology
Strategy Basecamp's IT Diagnostic - Six Steps to Improving Your TechnologyStrategy Basecamp's IT Diagnostic - Six Steps to Improving Your Technology
Strategy Basecamp's IT Diagnostic - Six Steps to Improving Your Technology
 
Totem Sustainability Pitch Deck
Totem Sustainability Pitch DeckTotem Sustainability Pitch Deck
Totem Sustainability Pitch Deck
 
Driving Digital Supply Chain Transformation - A Handbook - 23 MAY 2017
Driving Digital Supply Chain Transformation - A Handbook - 23 MAY 2017Driving Digital Supply Chain Transformation - A Handbook - 23 MAY 2017
Driving Digital Supply Chain Transformation - A Handbook - 23 MAY 2017
 
Intelligent Shopping Recommender using Data Mining
Intelligent Shopping Recommender using Data MiningIntelligent Shopping Recommender using Data Mining
Intelligent Shopping Recommender using Data Mining
 
Lecture # 07 (developing business it strategies)
Lecture # 07 (developing business it strategies)Lecture # 07 (developing business it strategies)
Lecture # 07 (developing business it strategies)
 
Ivi external briefing_pack_v.aim
Ivi external briefing_pack_v.aimIvi external briefing_pack_v.aim
Ivi external briefing_pack_v.aim
 
Building cbis, mis, csvtu
Building cbis, mis, csvtuBuilding cbis, mis, csvtu
Building cbis, mis, csvtu
 
Digital Transformation Strategies for Small Businesses.pdf
Digital Transformation Strategies for Small Businesses.pdfDigital Transformation Strategies for Small Businesses.pdf
Digital Transformation Strategies for Small Businesses.pdf
 
IT and data analytics ppt(unit-2).pdf
IT and data analytics ppt(unit-2).pdfIT and data analytics ppt(unit-2).pdf
IT and data analytics ppt(unit-2).pdf
 
Digital strategy overview
Digital strategy overviewDigital strategy overview
Digital strategy overview
 
Enabling enterprises to emphasize on core products while we focus on the non-...
Enabling enterprises to emphasize on core products while we focus on the non-...Enabling enterprises to emphasize on core products while we focus on the non-...
Enabling enterprises to emphasize on core products while we focus on the non-...
 
Business.pdf
Business.pdfBusiness.pdf
Business.pdf
 
Business Intelligence Unit 1.pdf
Business Intelligence Unit 1.pdfBusiness Intelligence Unit 1.pdf
Business Intelligence Unit 1.pdf
 
Analytics in manufacturing
Analytics in manufacturingAnalytics in manufacturing
Analytics in manufacturing
 

Plus de CallplanetsDeveloper

Plus de CallplanetsDeveloper (20)

Deep Learning Basics.pptx
Deep Learning Basics.pptxDeep Learning Basics.pptx
Deep Learning Basics.pptx
 
Basics of Machine Learning.pptx
Basics of Machine Learning.pptxBasics of Machine Learning.pptx
Basics of Machine Learning.pptx
 
Artificial-Neural-Networks.pptx
Artificial-Neural-Networks.pptxArtificial-Neural-Networks.pptx
Artificial-Neural-Networks.pptx
 
Data Warehousing , Data Mining and BI.pptx
Data Warehousing , Data Mining and BI.pptxData Warehousing , Data Mining and BI.pptx
Data Warehousing , Data Mining and BI.pptx
 
Database Management Systems.pptx
Database Management Systems.pptxDatabase Management Systems.pptx
Database Management Systems.pptx
 
Regression.pptx
Regression.pptxRegression.pptx
Regression.pptx
 
Basics of Machine Learning.pptx
Basics of Machine Learning.pptxBasics of Machine Learning.pptx
Basics of Machine Learning.pptx
 
MIS.pptx
MIS.pptxMIS.pptx
MIS.pptx
 
Topic 13 Business Analytics.pptx
Topic 13 Business Analytics.pptxTopic 13 Business Analytics.pptx
Topic 13 Business Analytics.pptx
 
Unit 11 AI , ML , DL and Expert Systems.pptx
Unit 11 AI , ML , DL and Expert Systems.pptxUnit 11 AI , ML , DL and Expert Systems.pptx
Unit 11 AI , ML , DL and Expert Systems.pptx
 
Unit 10 Business Intelligence.pptx
Unit 10 Business Intelligence.pptxUnit 10 Business Intelligence.pptx
Unit 10 Business Intelligence.pptx
 
9. Data Warehousing & Mining.pptx
9. Data Warehousing & Mining.pptx9. Data Warehousing & Mining.pptx
9. Data Warehousing & Mining.pptx
 
Class 12 Probability Distributions.pptx
Class 12 Probability Distributions.pptxClass 12 Probability Distributions.pptx
Class 12 Probability Distributions.pptx
 
Class 11 Basic Probability.pptx
Class 11 Basic Probability.pptxClass 11 Basic Probability.pptx
Class 11 Basic Probability.pptx
 
8.DBMS.pptx
8.DBMS.pptx8.DBMS.pptx
8.DBMS.pptx
 
Claas 11 Basic Probability.pptx
Claas 11 Basic Probability.pptxClaas 11 Basic Probability.pptx
Claas 11 Basic Probability.pptx
 
5.Developing IT Solution.pptx
5.Developing IT Solution.pptx5.Developing IT Solution.pptx
5.Developing IT Solution.pptx
 
4. E Commerce Types.pptx
4. E Commerce Types.pptx4. E Commerce Types.pptx
4. E Commerce Types.pptx
 
Class 9 Covariance & Correlation Concepts.pptx
Class 9 Covariance & Correlation Concepts.pptxClass 9 Covariance & Correlation Concepts.pptx
Class 9 Covariance & Correlation Concepts.pptx
 
Unit 7 Management Challenges in IT.pptx
Unit 7 Management Challenges in IT.pptxUnit 7 Management Challenges in IT.pptx
Unit 7 Management Challenges in IT.pptx
 

Dernier

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 

Dernier (20)

SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 

Topic 12 Miscellaneous Concepts in IT.pptx

  • 1. Topics 1. Market Basket Analysis 2. Global Information Systems 3. Prototyping 4. Change Management 5. Optimization 6. Competitive Advantages in Business 7. Change Management 8. Electronic Data Interchange 9. BPM 10. Cyber Security
  • 2. What is meant by Market Basket Analysis? Market basket analysis is a data mining technique used by retailers to increase sales by better understanding customer purchasing patterns. It involves analyzing large data sets, such as purchase history, to reveal product groupings, as well as products that are likely to be purchased together.
  • 3. Why market basket analysis? Retailers use analytics methods like market basket analysis (MBA) to comprehend the purchasing patterns of their customers. It is used to find out which products customers usually buy together or put in the same basket. This purchasing data is used to increase the efficiency of sales and marketing.
  • 4. Global Information Systems What are global information systems used for? A global information system (GIS) is an information system which is developed and / or used in a global context. A global information system (GIS) is any information system which attempts to deliver the totality of measurable data worldwide within a defined context. Some examples of GIS are SAP, The Global Learning Objects Brokered Exchange and other systems.
  • 5. Key components of a global information system A working GIS integrates five key components: hardware, software, data, people, and methods. Hardware is the computer on which a GIS operates. Today, GIS software runs on a wide range of hardware types, from centralized computer servers to desktop computers used in stand-alone or networked configurations.
  • 6. Prototyping Prototyping is an experimental process where design teams implement ideas into tangible forms from paper to digital. Teams build prototypes of varying degrees of fidelity to capture design concepts and test on users. With prototypes, you can refine and validate your designs so your brand can release the right products. Some of the examples of prototypes are wireframes, slides, landing pages, working models, an interactive frontend, and videos.
  • 7. types of prototyping The 4 types of project prototyping are feasibility prototypes, low-fidelity user prototypes, high-fidelity user prototypes and live-data prototypes.
  • 8. Benefits of prototyping Estimation of production costs, manufacturing time and material requirements. Select machinery required for production. Testing to determine fit and durability. Receive feedback from customers and end users. Advantages of using Prototype Model : • This model is flexible in design. • It is easy to detect errors. • We can find missing functionality easily. • There is scope of refinement, it means new requirements can be easily accommodated. • It can be reused by the developer for more complicated projects in the future.
  • 9. Change Management Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes or technologies. The purpose of change management is to implement strategies for effecting change, controlling change and helping people to adapt to change.
  • 10. 5 key elements of change management • Prepare the Organization for Change. • Craft a Vision and Plan for Change. • Implement the Changes. • Embed Changes Within Company Culture and Practices. • Review Progress and Analyze Results.
  • 11. Optimization Optimization analysis is a process through which a firm estimates or determines the output level and maximizes its total profits. There are basically two approaches followed for optimization − Total revenue and total cost approach. Marginal revenue and Marginal cost approach.
  • 12. Types of Optimization We can distinguish between two different types of optimization methods: Exact optimization methods that guarantee finding an optimal solution and heuristic optimization methods where we have no guarantee that an optimal solution is found.
  • 13. Competitive Advantage in Business A competitive advantage is anything that gives a company an edge over its competitors, helping it attract more customers and grow its market share. A competitive advantage can take three primary forms: Cost advantage– producing a product or providing a service at a lower cost than competitors.
  • 14. Sources of Competitive Advantage • Product Attribute Differentiation. One way to gain an advantage over competitors is by differentiating your product from theirs. • Customers' Willingness to Pay. • Price Discrimination. • Bundled Pricing. • Human Capital.
  • 15. Electronic Data Interchange Electronic Data Interchange (EDI) is the computer-to-computer exchange of business documents in a standard electronic format between business partners. Electronic Data Interchange (EDI) is the electronic interchange of business information using a standardized format; a process which allows one company to send information to another company electronically rather than with paper. Business entities conducting business electronically are called trading partners. Examples of EDI include Purchase orders, invoices, shipping statuses, payment information, and so on.
  • 16. Components of EDI The 4 major components of EDI are: standard document format, translation and mapping, preferred communication method and communication network to send and receive documents.
  • 17. BPM Lifecycle The BPM lifecycle standardizes the process of implementing and managing business processes inside an organization as a series of cyclical stages. It consists of five phases including design, model, execute, monitor, and optimize.
  • 18. Steps of BPM Business Process Management (BPM) is a way to improve and standardize processes in an organization. BPM Lifecycle: The 5 Steps in Business Process Management Step 1: Design. Step 2: Model. Step 3: Execute. Step 4: Monitor. Step 5: Optimize.
  • 19. Bank cyber security Cyber security refers to the organization of technologies, procedures, and methods designed to prevent networks, devices, programs, and data from attack, damage, malware, viruses, hacking, data thefts or unauthorized access.
  • 20. Why is cyber security important in banking? Protecting the user's assets is the primary goal of cybersecurity in banking. As more people become cashless, additional acts or transactions go online. People conduct transactions using digital payment methods like debit and credit cards, which must be protected by cybersecurity. Cybersecurity can be categorized into five distinct types: • Critical infrastructure security. • Application security. • Network security. • Cloud security. • Internet of Things (IoT) security.