Upload
sanjaykumarguptaa
View
222
Download
0
Embed Size (px)
Citation preview
8/10/2019 Electronic Banking (Synopsis)
1/12
Electronic Banking
8/10/2019 Electronic Banking (Synopsis)
2/12
Abstract
The objective of the system is to nd whether the web
application is a genuine one or not. This is done by authenticating the web
application by using a cipher key, which can be obtained by implementing
standard encryption algorithm. This cipher key is used to identify the fraud web
application to avoid misuse of the sensitive information. After authenticating the
web application the authorized users will be allowed to access the application to
get various services and provide information that includes transactions like
inserting, modifying and deleting records, which vary with dierent kind of the
users in a role based web application.
The system will check the users e!istence in the database and
provide the set of services with respect to the role of the user. The application is
based on three"tier architecture. The cipher key obtained will help to nd the
fraud application. The business logic helps in authenticating the application,
authorizing the users and providing services. The technologies are chosen by
keeping the compatibility and performance as the constraints for the application.
8/10/2019 Electronic Banking (Synopsis)
3/12
SYSTEM REQUIRMENT SPECIFICATIONS FOR ElECTRONIC BANKIN
The objective of the project is to design and develop #ecure online
$anking Application using Antiphishing concept
#ome customers avoid online banking as they perceive it as being
too vulnerable to fraud. The security measures employed by most banks
are never %&&' safe, but in practice the number of fraud victims due to
online banking is very small. (ndeed, conventional banking practices may
be more prone to abuse by fraudsters than online banking. )redit card
fraud, signature forgery and identity theft are far more widespread
*o+ine* crimes than malicious hacking. $ank transactions are generally
traceable and criminal penalties for bank fraud are high. nline banking
can be more insecure if users are careless, gullible or computer illiterate.
An increasingly popular criminal practice to gain access to a user-s
nances is phishing, whereby the user is in some way persuaded to hand
over their passwords/ to the fraudster.
T!E E"ISTIN SYSTEM#
The system will check the users e!istence in the database and
provide the set of services with respect to the role of the user. The
application is based on three"tier architecture. The cipher key obtained
will help to nd the fraud application. The business logic helps in
authenticating the application, authorizing the users and providingservices. The technologies are chosen by keeping the compatibility and
performance as the constraints for the application$
Further Drawbacks of the Existing System:
The following are the drawbacks of the e!isting manual #ystem.
8/10/2019 Electronic Banking (Synopsis)
4/12
Ti%e &ela'# (n the e!isting system, information related to all transactions
is stored in dierent registers. #ince all the transactions are stored in
dierent registers it takes lot of time to prepare dierent reports.
Re()n(anc'#As the information passes through dierent registers, each
register is consolidated and sent to ne!t register. #o the same information
is being tabulated at each register, which involves lot of complication and
duplication in work, thus it causes redundancy.
Acc)rac'# #ince the same data is compiled at dierent sections, the
possibility of tabulating data wrongly increases. Also if the data is more,
validations become di0cult. This may result in loss of accuracy of data.
In*or%ation Retrie+al# As the information is stored in the particular
1ormat, it can only be retrieved in the same format. $ut if it is to be
retrieve in dierent format, it is not possible.
Storage Me(ia#(n the e!isting system, data transaction being stored on
too long registers it is very di0cult to refer after some time.
Re,orts# At the various reports are tabulated manually. They are notsuch
Attractive and re2uire more time. They do not provide ade2uate
help in maintaining the accounts.
En-)ir'#3n2uiry for dierent level of information is much more
di0cult. n
4ine en2uiry of data is not possible.
8/10/2019 Electronic Banking (Synopsis)
5/12
PROPOSE& SYSTEM
#ystem analysis will be performed to determine if it is feasible to
design information based on policies and plans of the
organization and on user re2uirements and to eliminate the
weaknesses of the present system.
5eneral re2uirements are6 "
%. The new system should be cost eective.
7. To augment management, improve productivity and services.
8. To enhance 9ser:#ystem interface.
;. To improve information 2ualify and usability.
eveloping the system, which meets the #?# and solving all the
re2uirements of the system@
7/ >emonstrating the system and installing the system at client-s location
after the acceptance testing is successful.
8/ #ubmitting the re2uired user manual describing the system interfaces
to work on it and also the documents of the system.
8/10/2019 Electronic Banking (Synopsis)
6/12
;/ )onducting any user training that might be needed for using the
system.
etection in
nline $ankingE can be categorized module "wise. $asically all the
information is managed by the software and in order to access theinformation one has to produce one-s identity by entering the user"id and
password. 3very user has their own domain of access beyond which the
access is dynamically refrained rather denied.
O)t,)t#The major outputs of the system are tables and reports. Tables
are created dynamically to meet the re2uirements on demand. ?eports, as
it is obvious, carry the gist of the whole information that =ows across theinstitution.
This application must be able to produce output at dierent
modules for dierent inputs.
Per*or%ance Re-)ire%ents#
Cerformance is measured in terms of reports generated weekly and
monthly.
SOFT.ARE AN& !AR&.ARE SPECIFICATIONS
8/10/2019 Electronic Banking (Synopsis)
7/12
!ar(/are#
Processor 6 (ntel Centium ((( or Above
?am # 012 MB or %ore
Cac3e 6
8/10/2019 Electronic Banking (Synopsis)
8/12
s)bter*)geto steal consumers- personal identity data and nancial
account credentials. #ocial"engineering schemes use -spoofed- e"
mails to lead consumers to counterfeit websites designed to trick
recipients into divulging nancial data such as credit card numbers,account usernames, passwords and social security numbers.
Kijacking brand names of banks, e"retailers and credit card
companies, phishers often convince recipients to respond. Technical
subterfuge schemes plant cri%e /areonto C)s to steal credentials
directly, often using Trojan keylogger spyware.
Post9!oli(a' P3is3ing S)rge Breaks Recor(
P3is3ing Attacks in :an)ar' Rise to Ne/ Peak; 1< More T3an
Pre+io)s !ig3 7ast :)ne
More T3an Pre+io)s !ig3 7ast :)ne
8/10/2019 Electronic Banking (Synopsis)
9/12
Cri%e/are M)tations Rise to Secon( Recor( in T/o Mont3s
Further Drawbacks of the Existing System:
The following are the drawbacks of the e!isting manual #ystem.
Ti%e &ela'# (n the e!isting system, information related to all transactions
is stored in dierent registers. #ince all the transactions are stored in
dierent registers it takes lot of time to prepare dierent reports.
Re()n(anc'#As the information passes through dierent registers, each
register is consolidated and sent to ne!t register. #o the same information
is being tabulated at each register, which involves lot of complication andduplication in work, thus it causes redundancy.
Acc)rac'# #ince the same data is compiled at dierent sections, the
possibility of tabulating data wrongly increases. Also if the data is more,
validations become di0cult. This may result in loss of accuracy of data.
In*or%ation Retrie+al# As the information is stored in the particular
1ormat, it can only be retrieved in the same format. $ut if it is to be
retrieve in dierent format, it is not possible.
8/10/2019 Electronic Banking (Synopsis)
10/12
Storage Me(ia#(n the e!isting system, data transaction being stored on
too long registers it is very di0cult to refer after some time.
Re,orts# At the various reports are tabulated manually. They are not
such
Attractive and re2uire more time. They do not provide ade2uate
help in maintaining the accounts.
En-)ir'#3n2uiry for dierent level of information is much more
di0cult. n
4ine en2uiry of data is not possible.
8/10/2019 Electronic Banking (Synopsis)
11/12
8/10/2019 Electronic Banking (Synopsis)
12/12