Electronic Banking (Synopsis)

Embed Size (px)

Citation preview

  • 8/10/2019 Electronic Banking (Synopsis)

    1/12

    Electronic Banking

  • 8/10/2019 Electronic Banking (Synopsis)

    2/12

    Abstract

    The objective of the system is to nd whether the web

    application is a genuine one or not. This is done by authenticating the web

    application by using a cipher key, which can be obtained by implementing

    standard encryption algorithm. This cipher key is used to identify the fraud web

    application to avoid misuse of the sensitive information. After authenticating the

    web application the authorized users will be allowed to access the application to

    get various services and provide information that includes transactions like

    inserting, modifying and deleting records, which vary with dierent kind of the

    users in a role based web application.

    The system will check the users e!istence in the database and

    provide the set of services with respect to the role of the user. The application is

    based on three"tier architecture. The cipher key obtained will help to nd the

    fraud application. The business logic helps in authenticating the application,

    authorizing the users and providing services. The technologies are chosen by

    keeping the compatibility and performance as the constraints for the application.

  • 8/10/2019 Electronic Banking (Synopsis)

    3/12

    SYSTEM REQUIRMENT SPECIFICATIONS FOR ElECTRONIC BANKIN

    The objective of the project is to design and develop #ecure online

    $anking Application using Antiphishing concept

    #ome customers avoid online banking as they perceive it as being

    too vulnerable to fraud. The security measures employed by most banks

    are never %&&' safe, but in practice the number of fraud victims due to

    online banking is very small. (ndeed, conventional banking practices may

    be more prone to abuse by fraudsters than online banking. )redit card

    fraud, signature forgery and identity theft are far more widespread

    *o+ine* crimes than malicious hacking. $ank transactions are generally

    traceable and criminal penalties for bank fraud are high. nline banking

    can be more insecure if users are careless, gullible or computer illiterate.

    An increasingly popular criminal practice to gain access to a user-s

    nances is phishing, whereby the user is in some way persuaded to hand

    over their passwords/ to the fraudster.

    T!E E"ISTIN SYSTEM#

    The system will check the users e!istence in the database and

    provide the set of services with respect to the role of the user. The

    application is based on three"tier architecture. The cipher key obtained

    will help to nd the fraud application. The business logic helps in

    authenticating the application, authorizing the users and providingservices. The technologies are chosen by keeping the compatibility and

    performance as the constraints for the application$

    Further Drawbacks of the Existing System:

    The following are the drawbacks of the e!isting manual #ystem.

  • 8/10/2019 Electronic Banking (Synopsis)

    4/12

    Ti%e &ela'# (n the e!isting system, information related to all transactions

    is stored in dierent registers. #ince all the transactions are stored in

    dierent registers it takes lot of time to prepare dierent reports.

    Re()n(anc'#As the information passes through dierent registers, each

    register is consolidated and sent to ne!t register. #o the same information

    is being tabulated at each register, which involves lot of complication and

    duplication in work, thus it causes redundancy.

    Acc)rac'# #ince the same data is compiled at dierent sections, the

    possibility of tabulating data wrongly increases. Also if the data is more,

    validations become di0cult. This may result in loss of accuracy of data.

    In*or%ation Retrie+al# As the information is stored in the particular

    1ormat, it can only be retrieved in the same format. $ut if it is to be

    retrieve in dierent format, it is not possible.

    Storage Me(ia#(n the e!isting system, data transaction being stored on

    too long registers it is very di0cult to refer after some time.

    Re,orts# At the various reports are tabulated manually. They are notsuch

    Attractive and re2uire more time. They do not provide ade2uate

    help in maintaining the accounts.

    En-)ir'#3n2uiry for dierent level of information is much more

    di0cult. n

    4ine en2uiry of data is not possible.

  • 8/10/2019 Electronic Banking (Synopsis)

    5/12

    PROPOSE& SYSTEM

    #ystem analysis will be performed to determine if it is feasible to

    design information based on policies and plans of the

    organization and on user re2uirements and to eliminate the

    weaknesses of the present system.

    5eneral re2uirements are6 "

    %. The new system should be cost eective.

    7. To augment management, improve productivity and services.

    8. To enhance 9ser:#ystem interface.

    ;. To improve information 2ualify and usability.

    eveloping the system, which meets the #?# and solving all the

    re2uirements of the system@

    7/ >emonstrating the system and installing the system at client-s location

    after the acceptance testing is successful.

    8/ #ubmitting the re2uired user manual describing the system interfaces

    to work on it and also the documents of the system.

  • 8/10/2019 Electronic Banking (Synopsis)

    6/12

    ;/ )onducting any user training that might be needed for using the

    system.

    etection in

    nline $ankingE can be categorized module "wise. $asically all the

    information is managed by the software and in order to access theinformation one has to produce one-s identity by entering the user"id and

    password. 3very user has their own domain of access beyond which the

    access is dynamically refrained rather denied.

    O)t,)t#The major outputs of the system are tables and reports. Tables

    are created dynamically to meet the re2uirements on demand. ?eports, as

    it is obvious, carry the gist of the whole information that =ows across theinstitution.

    This application must be able to produce output at dierent

    modules for dierent inputs.

    Per*or%ance Re-)ire%ents#

    Cerformance is measured in terms of reports generated weekly and

    monthly.

    SOFT.ARE AN& !AR&.ARE SPECIFICATIONS

  • 8/10/2019 Electronic Banking (Synopsis)

    7/12

    !ar(/are#

    Processor 6 (ntel Centium ((( or Above

    ?am # 012 MB or %ore

    Cac3e 6

  • 8/10/2019 Electronic Banking (Synopsis)

    8/12

    s)bter*)geto steal consumers- personal identity data and nancial

    account credentials. #ocial"engineering schemes use -spoofed- e"

    mails to lead consumers to counterfeit websites designed to trick

    recipients into divulging nancial data such as credit card numbers,account usernames, passwords and social security numbers.

    Kijacking brand names of banks, e"retailers and credit card

    companies, phishers often convince recipients to respond. Technical

    subterfuge schemes plant cri%e /areonto C)s to steal credentials

    directly, often using Trojan keylogger spyware.

    Post9!oli(a' P3is3ing S)rge Breaks Recor(

    P3is3ing Attacks in :an)ar' Rise to Ne/ Peak; 1< More T3an

    Pre+io)s !ig3 7ast :)ne

    More T3an Pre+io)s !ig3 7ast :)ne

  • 8/10/2019 Electronic Banking (Synopsis)

    9/12

    Cri%e/are M)tations Rise to Secon( Recor( in T/o Mont3s

    Further Drawbacks of the Existing System:

    The following are the drawbacks of the e!isting manual #ystem.

    Ti%e &ela'# (n the e!isting system, information related to all transactions

    is stored in dierent registers. #ince all the transactions are stored in

    dierent registers it takes lot of time to prepare dierent reports.

    Re()n(anc'#As the information passes through dierent registers, each

    register is consolidated and sent to ne!t register. #o the same information

    is being tabulated at each register, which involves lot of complication andduplication in work, thus it causes redundancy.

    Acc)rac'# #ince the same data is compiled at dierent sections, the

    possibility of tabulating data wrongly increases. Also if the data is more,

    validations become di0cult. This may result in loss of accuracy of data.

    In*or%ation Retrie+al# As the information is stored in the particular

    1ormat, it can only be retrieved in the same format. $ut if it is to be

    retrieve in dierent format, it is not possible.

  • 8/10/2019 Electronic Banking (Synopsis)

    10/12

    Storage Me(ia#(n the e!isting system, data transaction being stored on

    too long registers it is very di0cult to refer after some time.

    Re,orts# At the various reports are tabulated manually. They are not

    such

    Attractive and re2uire more time. They do not provide ade2uate

    help in maintaining the accounts.

    En-)ir'#3n2uiry for dierent level of information is much more

    di0cult. n

    4ine en2uiry of data is not possible.

  • 8/10/2019 Electronic Banking (Synopsis)

    11/12

  • 8/10/2019 Electronic Banking (Synopsis)

    12/12