You are on page 1of 30

1

CHAPTER 1

2
INTRODUCTION
Online banking fraud is the use of potentially illegal means to obtain money, assets, or other
property owned or held by a financial institution, or to obtain money from depositors by
fraudulently posing as a bank or other financial institution. Fraud or deception which makes use
of the Internet and could involve hiding of information or providing incorrect information for
the purpose of tricking victims out of money, property, and inheritance. Internet fraud is not
considered a single, distinctive crime but covers a range of illegal and illicit actions that are
committed in cyberspace.

A criminal asks people to pay an upfront fee to receive something of value, but does not deliver
anything to the victim. People tend to disclose more personal information about themselves
(e.g. birthday, e-mail, address, hometown and relationship status) in their social networking
profiles. This personally identifiable information could be used by fraudsters to steal users'
identities, and posting this information on social media makes it a lot easier for fraudsters to
take control of it. Due to oversight of laymen he/she may can losses is money frauds uses
different technology application to hack pc or computer gain access to personal id. Malware
and virus are inject through online and they gain access to our devices and stole our money.

Today’s world online transaction become more essential and common to people. Growth of E-
Commerce rapidly increases day to day life so transactions is done through online. So it’s easy
for frauds.

Thus always uses protected site and don’t click and link without knowing about that.

3
BACKGROUND
This project is based on online transactions on “Frauds on online banking”. This topic provides
explanation of online banking and frauds happen in that, it also provides how to protect from
frauds and secure yourself.
 This project talks about frauds on online banking.
 Provides messages and other related information to know about what happen while online
transaction.
 Frauds techniques and method of gain access our devices.
 Graphs that tells about cases of online frauds, and pending cases about past years.
 Risk Management and other protected agents who protect data.
 Safe way to do online banking and protect yourself from attack.
 Different types of online banking frauds and solution how to protect.
 How people became victim through different frauds technique
 Prevention of online banking frauds.

This project is researched for a person gets information about online frauds and prevention
of attack, there methods and details.

4
OBJECTIVES OF THE PROJECT
The objectives behind the report of “Frauds on online banking” are as follows:

 To understand the Online Banking Scope

The topic provides information about online frauds happen and there scope of stealing money,
and overcome them in internet banking, services offered by internet banking.

 Types of attack in online transaction

Different online method and techniques of stealing money and accessing your personal
information.

 To highlights the various ways of Online banking frauds done by fraudsters

Fraudster’s ways of attacking person and gaining access, different technique’s purpose of
stealing money, assists and property.

 To understand and study the ways of Online banking Risk management

Action taken by government on protecting data and managing risk, all banks also building good
framework and secure environment.

 Report about online frauds cases happened

Cases happened past years and graphs about frauds on online banking and details about how
much money stolen.

 To study about the future perspective and awareness

Awareness of internet banking among the Indian customers and ways to increases awareness
among the customers. Protect one’s from being attack.

5
SCOPE OF THE PROJECT

Project scope is “The focus of this study is mainly based in the online banking frauds and give

perspective awareness about attack.

 There is no need for involvement of staff other than admin. There is no need of paper
work.
 This system has been designed keeping in mind the laymen’s necessity.
 This application can be used by the layman.
 This software provides various options to choose an appropriate one from many resorts
given.
 This system provides maps for finding the location of the resorts.
 The system has video link of resort so that a user can have detailed information about
resort.
 This system can provide the details of availability of tickets for the resort.
 For a feasible solution Resort Booking System is introduced.

6
APPLICABILITY
 Resort system applicable in varies place like schools, college, company etc.
 This system used for many people like family tour, friend’s zone.
 This online resort system used by all people for enjoyment.

ACHIEVEMENT
 Creating this project I learn ASP.NET, HTML and SQL Server. Through project I have learnt
good communication skills, leadership quality has been developed.
 Learn to operate different types of software and language
 Learn to build documents..

ORGANISATION OF RESORT
 Survey of technology: it is a language you use to build your website.
In this project I used Asp.Net with html below Small description is there about Asp.Net.
 Next, chapter Requirement Analysis in this draw back of the Existing project and feasibility
study, which platform you used and software hardware requirements.
 Chapter 4: Models of your system, Testing Methodology, Schema design and reference.

7
CHAPTER 2

8
SURVEY OF ONLINE FRAUDS
C# is a modern object-oriented programming language developed in 2000 by Anders
Hejlsberg at Microsoft as a rival to Java (which it is quite similar to). It was created because Sun,
(later bought by Oracle) did not want Microsoft to make changes to Java, so Microsoft chose to
create their own language instead. C# has grown quickly since it was first created, with extensive
support from Microsoft helping it to gain a large following; it is now one of the most popular
programming languages in the world.

Easy to Maintain

C# is a statically-typed language, which means your code will be checked for errors before it gets
built into an app. Errors will be easier to track down, and since statically-typed languages are also
more strict with how you code something, the codebase in general will be more consistent and
thus easier to maintain as it grows in size and complexity

The framework technology reduces coding time

If you are building large web applications, you’re definitely going to appreciate this framework
technology because it has the ability to reduce the amount of time needed to code. And why is
the amount of time needed reduced? It’s reduced because you’ll have to do less coding with this
web development model.

The applications that you build on this framework are secure

In truth, because of the per-application configuration and built-in Windows authentication, your
programs have never been more safe and secure. And this is a huge advantage if you’re worried
about potential security issues in the future.

This application is fast

As a statically typed language, C# is faster than dynamically typed languages because things are
more clearly defined. Thus, when the app is running, your machine's resources will not be wasted
on checking the definition of something in your code.

1: Keep you Asp.net applications secured with the built-in Windows authentication and per-
application configuration.
2: Asp.Net has reduced the long lines of code required to develop large applications.
3: Asp.Net and Html, together generate dynamic web pages smoothly.

9
4: Being an ideal server-side scripting technology, Asp.Net code first runs on Windows server
before displaying on the web browser.
5: Asp.Net framework is language independent, means you can choose any programming
language which best suited to you application.
6: With the built-in configuration information, Asp.Net is easy to deploy.
7: The windows web server thoroughly monitors the web pages, multiple components, and
applications running over it.
8: The Dot Net Framework quickly gives an alert for memory leaks, unbounded loops, and
other wrong behaviors, immediately killing them and restart them over again.
9: Asp.Net features like early binding, JIT compilation, caching services and native
optimization supports gives your application the high level of performance.
10: All the Asp.Net applications are highly monitored and managed to help application
available to handle requests.
11: The best part of Dot Net Framework is it has its own built-in caching features.
12: The content and the program logic are separated in the .Net Framework, thus reducing the
program inconveniences.
13: Common tasks are easy to perform on this framework.
14: ASP.NET runtime closely manages and monitors all processes.

SQL Server
SQL comprises one of the fundamental building blocks of modern database architecture. SQL
defines methods using which user can create and manipulate databases on all major
platforms.SQL is a set based declarative programming language and not an imperative
programming language like C or BASIC.SQL is an ANSI and ISO standard computer
language for creating and manipulating databases.

Installation Is Streamlined

It can be installed via a setup wizard and the prerequisite updates are detected and downloaded
by the installer automatically. The complexity of installing the software is minimized
significantly because of automatic installation of updates. Other components such as analytical
and database services can be installed separately afterward. Automatic updating also reduces
maintenance costs quite significantly.

10
Security Features Are Better

SQL Server 2008 uses Policy-Based Management to detect security policies that are non-
compliant. This feature allows only authorized personnel access to the database. Security audits
and events can be written automatically to log files.

Enhanced Performance

The MS SQL server has built-in transparent data compression feature along with encryption.
Users don’t need to modify programs in order to encrypt the data. The MS SQL server has
access control coupled with efficient permission management tools. Further, it offers an
enhanced performance when it comes to data collection.

Lower Cost of Ownership

SQL server includes effective data management and data mining tools along with disk
partitioning. Your server’s optimum maintenance can be ensured by following effective data
management practices. These practices also help you ensure the availability and recoverability
of data.

11
CHAPTER 3:

REQUIREMENT AND ANALYSIS

12
PROBLEM DEFINATION

 The current system is not user friendly and does not provide the facility of selecting a

resort from the given options.

 We have to wait in queue for booking which results in waste of time.

 Lots of paper work is done to maintain the record.

 The paper work may or may not be perfect and accurate.

 The existing systems provides only detailed information about particular resort, there is

no option of choosing a resort.

 The existing system does not provide maps for finding the location of the resorts.

 The system does not provide the details about availability of tickets of the resorts.

 Booking Facility for a resort through website is not yet made applicable for many

resorts.

PROPOSED SYSTEM
 Organization and systematic resort management system.
 Easy to use GUI and Textbox it is user friendly.
 Different packages display and description.
 User can book resort online and doesn’t need to travel to book.
 It also provides location.

13
REQUIREMENTS SPECIFICATION
A Feasibility Study is a high-level capsule version of the entire System analysis and
Design Process. The study begins by classifying the problem definition. Feasibility is to
determine if it’s worth doing. Once an acceptance problem definition has been generated, the
analyst develops a logical model of the system. A search for alternatives is analyzed carefully.

There are parts in Feasibility Study:

 Technical Feasibility:

In Technical Feasibility study, one has to test whether the proposed system can be developed
using existing technology or not.

It is planned to implement the proposed system using .NET technology. The license for
Microsoft visual studio is available for the people, so it’s feasible to use this .NET by the
Laymen.

 Behavioural Feasibility:

System will require simple desktop computers. The system is very user-friendly so any
laymen has knowledge about the computer can use it. This makes it behaviour feasible.

 Economic Feasibility:

Hardware requirement for the system are desktop computer. It is available at


economically cheap price and hence can easily be produced. Also the software requirement for
the system are available at economically cheap prices.

 Operational Feasibility:

The operational feasibility of the system lies in the fact that it is user friendly, easy to
use and has a simple user interface. The proposed system has worked successfully thereby
achieving the intended functionalities and resulting in consistent performance and better out.

14
PLANNING AND SCHEDULING

 A Gantt chart is a type of bar chart that illustrates a project schedule.

 This chart lists the tasks to be performed on the vertical axis, and time intervals on the
horizontal axis. The width of the horizontal bars in the graph shows the duration of each
activity.

 Gantt chart illustrates the start and finish dates of the terminals element and summary of a
project.

15
SOFTWARE REQUIREMENT
The software specifications for the system are listed below:

.NET PLATFORM / FRONTEND ASP.NET

DATABASE / BACKEND SQL Server 2012

OPERATING SYSTEM MICROSOFT WINDOW 8

HARDWARE REQUIREMENT
PROCESSOR INTEL CORE

RAM MINIMUM 2 GB

HDD 1TB

MONITOR LCD

KEYBOARD 101 KEYS

MOUSE USB/PS2

INTERNET CONNECTION DIAL-UP CONNECTION/WIRELESS

16
CONCEPTUAL MODELS
ENTITY RELATIONSHIP DIAGRAM

 An entity-relationship model describes interrelated things of interest in a specific domain


of knowledge. This ER Model represents flow of resort login and booking system.
 This entities and attribute store in relational databases.
 After user select resort from option he/she can fill booking form by providing details.
 Users fill all details given in resort form and submit.
 Resort Admin just verify details and confirm it by sending message.

17
DATAFLOW DIAGRAM(Level 0)

 A data flow diagram (DFD) maps out the flow of information for any process or system.
DFD Level 0 is also called a Context Diagram.
 It’s a basic overview of resort system after user select resorts he need fill resort form and
booked order that data flow from entity to resort system.
 From other end resort admin verify that and confirm it.
 Admin verify the order and confirm it by providing acknowledgement.

18
DATAFOW DIAGRAM(Level 1)

A data flow diagram (DFD) maps out the flow of information for any process or system.
Level 1 DFD is more detailed than level 0.

 It show the participants who will interact with the system, called external entities.
 All types of user interact with system.
 Entity box of user select resort and fill the details of resort form and submit it.
 Data flow arrow show flow from entity to another entity after submits.
 Transaction it done through online and confirm by admin side.

19
ACTIVITY DIAGRAM

 Activity diagram is another important diagram in UML to describe the dynamic aspects of
the system. Activity diagram is basically a flowchart to represent the flow from one
activity to another activity. The activity can be described as an operation of the system.
 This flow can be sequential, branched, or concurrent.
 Initial stage user select resorts and fill detail then it passes to admin system.
 System verifies data and grant access to further details.
 Entered details and booked order with transaction.
 Resort admin verify transaction and confirm it.

20
CLASS DIAGRAM

 A class diagram is an illustration of the relationships and source code dependencies among
classes in the Unified Modelling Language.
 They are used to show the different objects in a system, their attributes, their
operations and the relationships among them.

 The top partition contains the name of the class.


 The middle part contains the class’s attributes.
 The bottom partition shows the possible operations that are associated with the class.
 Resort system show flow of the system with attributes and relationships.
 Initial stage user select resort the fill details then submit it passes to system.
 System verifies data and grant access to further details.
 Entered details and booked order with transaction.

21
SEQUENCEDIAGRAM

 A sequence diagram is an interaction diagram that shows how entities operate with one
another and in what order. In this sample, we show the interaction between different
stages in a system.
 Sequence diagrams are typically associated with use case realizations in the Logical View
of the system under development.
 Resort system show flow of the system with attributes and relationships.
 Initial stage user select resort and fill details and submit it passes to system.
 System verifies data and grant access to further details.
 Entered details and booked order with transaction.

22
USECASE DIAGRAM

 In a use case diagram, a representation of a set of events that occurs when an actor uses a
system to complete a process.
 A use case is a relatively large process, not an individual step is used to describe real-
world activities and motivations.
 Actor: specifies a role played by a user or any other system that interacts with the subject.
 This model show users Sequence of Resort system and admin Sequence.

23
CHAPTER 4

SYSTEM DESIGN

24
BASIC MODULES

Admin:

The module will be protected by admin ID and password. Mobile no is Compulsory for
all users. The module will be focusing on the maintenance like Master Data Maintenance,
Removal of old and outdated data from the software etc.

User Module:

User should read information correctly then select resort then booking and ordering is
done. User module is also fill details provided by system and resort form. User should have email
and phone no compulsory.

Resort Admin:

Collect bookings; make any changes by telling admin.

25
TESTING METHODOLOGY
As we are beginners, so we don’t have the exact knowledge of developing any project.
So Iterative Waterfall Model is the best suited methodology to be used for developing this project.
Here we are not very much clear with the requirements of the project so there is more probability
in changing the requirements and the strategies used accordingly. There will be need of going
back to the previous whenever required.

In iterative model we are building and improving the product step by step. Hence we can track
the defects at early stages. This avoids the downward flow of the defects. In iterative model we
can get the reliable user feedback. When presenting sketches and blueprints of the product to
users for their feedback, we are effectively asking them to imagine how the product will work.

In Iterative model the delivery of software is divided into increments or builds with each
increment adding new functionality to the software product. In Iterative model each subsequent
increment needs testing of the new functionality, regression testing and integration testing of
the new and existing functionality.

Requirement
Analysis

Planning

Designing

Coding

Testing

Implementation

26
SCHEMA DESIGN
For User:-

Sr.No Column name Data Type Constraint


1 unique id varchar (50) Primary key
2 fname varchar (50) Not null
3 lname varchar (50) Not null
4 mob_no varchar (50) Not null
5 adult varchar (50) Not null
6 children varchar (50) Not null
7 date_of_arrival varchar (50) Not null
8 email_id varchar (50) Not null

For Payment:-

Sr.No Column name Data Type Constraint


1 unique id varchar(50) foreign key
2 card_name varchar(50) null
3 card_no varchar(50) null
4 Expiry varchar(50) null
5 Cvv varchar(50) null

27
SYSTEM FLOWCHART

 A flowchart is a diagram that depicts a process, system or computer algorithm. They are
widely used in multiple fields to document, study, and plan, improve and communicate
often complex processes in clear, easy-to-understand diagrams.
 They can range from simple, hand-drawn charts to comprehensive computer-drawn
diagrams depicting multiple steps and routes.
 Start/End Symbol: The terminator symbol marks the starting or ending point of the
system. It usually contains the word "Start" or "End."
 User select resort then our flow start by filling details and transaction then user gets
acknowledgement.
 Other end admin just verify bookings and make changes.

28
DATA INTREGITY AND CONSTRAINTS
Table: Booking form
uk fname lname mob_no adult children date_of_arrival email_id

5346785 sathish anbu 98673626 15 9 20-03-2019 abc@gma


18 il.com

6784532 ganesh yadav 81687645 8 0 23-04-2019 sqy@gma


68 il.com

Each value in Mobile no should be Past date is in


fname and lname email should
uk should be 10 digit Indian valid
should be letters be in proper
unique number.
format
Is should contain
letters

Table: Payment
uk card_name card_no expiry cvv
5346785 Satish 4345 5678 04/2022 675
4321 5432
6784532 ganesh 4536 4532 05/2032 543
2783 5432

Card name Card no should Past year is in valid cvv should


should be in be 16 digit. and current date is have 3 digit
letters . also invalid should not be
same

Payment is insert using


primary key

 Using primary key payment is inserted.


 All textbox value should be compulsory.
 Mobile no is compulsory.
 Card details should be enter correct.

29
USER INTERFACE DESIGN

30

You might also like