67576548 e-banking

48
E- Banking

Upload: kristanto-yoz

Post on 06-May-2015

1.157 views

Category:

Technology


2 download

DESCRIPTION

e-banking policy

TRANSCRIPT

Page 1: 67576548 e-banking

E- Banking

Page 2: 67576548 e-banking

ABSTRACT

Page 3: 67576548 e-banking

“Internet banking” refers to systems that enable bank customers to access

accounts and general information on bank products and services through a

personal computer (PC) or other intelligent device.

Internet banking products and services can include wholesale products for

Corporate customers as well as retail and fiduciary products for consumers.

Ultimately, the products and services obtained through Internet banking may

mirror products and services offered through other bank delivery channels.

Some examples of wholesale products and services include:

* Cash management.

* Wire transfer.

* Automated clearinghouse (ACH) transactions.

* Bill presentment and payment

Examples of retail and fiduciary products and services include:

* Balance inquiry.

* Funds transfer.

* Downloading transaction information.

* Loan applications.

* Investment activity.

* Other value-added services.

Other Internet banking services may include providing Internet access as an

Internet Service Provider (ISP). The OCC has determined that a national bank

subsidiary may provide home banking services through an Internet connection

to the bank’s home banking system and, incidental to that service, may also

provide Internet access to bank customers using that service. Historically, banks

have used information systems technology to process checks (item processing), drive

ATM machines (transaction processing), and produce reports (managements In the past,

the computer systems that made the information systems operate were rarely noticed by

Page 4: 67576548 e-banking

customers. Today, Web sites, electronic mail, and electronic bill presentment and

payment systems are an important way for banks to reach their customers.

National banks have experimented with various forms of online banking for

many years. Some of the early experiments involved closed systems where the

customers accessed banks through a dial-in or cable TV connection. These

systems limited a bank’s potential customer base because they required out-ofarea

customers to either incur long-distance charges on their phone bills or

subscribe to a particular cable TV service to access the bank. With the

widespread growth of the Internet, customers can use this technology anywhere

in the world to access a bank’s network. The Internet, as an enabling

technology, has made banking products and services available to more

customers and eliminated geographic and proprietary systems barriers. With

an expanded market, banks also may have opportunities to expand or change

their product and service offerings.

Page 5: 67576548 e-banking

Manual Process

Why the New System

The development of the new system contains the following activities which try to

automate the entire process keeping in view of the database integration approach.

1. The administrators have grates accessibility in collecting the consistent

information that is very much necessary for the system to exist and coordinate.

Inquires for an existing service or some specific information

Customer physically visits the bank

The incharge clerk checks the specification and answers the query

Associated and integrates the information as needed

Leaves the bank

Raises a request for new checkbook by filling in the prescribed form

Customer physically visits the bank

The incharge clerk accepts the request and prepares the cheque book with respect to given specification

The cheque book is sent for manages initials

Customer makes a counter sign and receives the checkbook

Page 6: 67576548 e-banking

2. The system at any point of time can give the customers information related to

their

Accounts and accounts status

The balance enquiry

The fund transfer standards

The cheque book request

3.The system can provide information related to the different types of accounts that

are existing within the bank.

4.The system can provide the bank administration with information on the number of

customers who are existing in the system.

5.The system at any point of time can provide the information related to the executed

transactions by the customer.

6.The system with respect to the necessities can identify all the history details of the

trial participants along with their outcome of the results.

7.The system with respect to the necessities can provide the status of research and

development process that is under schedule within the organization currently.

8.With proper storage of the data in a relational environment the system can

Applegate itself to cater to the standards of providing a clear and easy path for future

research standards that may arise due to organizational policies.

Page 7: 67576548 e-banking

Growth in Internet Banking

Numerous factors — including competitive cost, customer service, and

Demographic considerations — are motivating banks to evaluate their

technology and assess their electronic commerce and Internet banking

strategies. Many researchers expect rapid growth in customers using online

banking products and services. The challenge for national banks is to make

sure the savings from Internet banking technology more than offset the costs

and risks associated with conducting business in cyberspace.

Marketing strategies will vary as national banks seek to expand their markets

and employ lower cost delivery channels. Examiners will need to understand

the strategies used and technologies employed on a bank-by-bank basis to

assess the risk. Evaluating a bank’s data on the use of their Web sites, may

help examiners determine the bank’s strategic objectives, how well the bank is

meeting its Internet banking product plan, and whether the business is expected

to be profitable.

Some of the market factors that may drive a bank’s strategy include the

following:

Competition — Studies show that competitive pressure is the chief driving

force behind increasing use of Internet banking technology, ranking ahead of

cost reduction and revenue enhancement, in second and third place

respectively. Banks see Internet banking as a way to keep existing customers

and attract new ones to the bank.

Page 8: 67576548 e-banking

Cost Efficiencies — National banks can deliver banking services on the Internet

at transaction costs far lower than traditional brick-and-mortar branches. The

actual costs to execute a transaction will vary depending on the delivery

channel used. For example, according to Booz, Allen & Hamilton, as of mid-

1999, the cost to deliver manual transactions at a branch was typically more

than a dollar, ATM and call center transactions cost about 25 cents, and

Internet transactions cost about a penny. These costs are expected to continue

to decline.

National banks have significant reasons to develop the technologies that will

help them deliver banking products and services by the most cost-effective

channels. Many bankers believe that shifting only a small portion of the

estimated 19-billion payments mailed annually in the U.S. to electronic

delivery channels could save banks and other businesses substantial sums of

money. However, national banks should use care in making product decisions.

Management should include in their decision making the development and

ongoing costs associated with a new product or service, including the

technology, marketing, maintenance, and customer support functions. This

will help management exercise due diligence, make more informed decisions,

and measure the success of their business venture.

Geographical Reach — Internet banking allows expanded customer contact

through increased geographical reach and lower cost delivery channels.

In fact some banks are doing business exclusively via the Internet — they do

not have traditional banking offices and only reach their customers online.

Other financial institutions are using the Internet as an alternative delivery

channel to reach existing customers and attract new customers.

Page 9: 67576548 e-banking

Branding — Relationship building is a strategic priority for many national

banks. Internet banking technology and products can provide a means for

national banks to develop and maintain an ongoing relationship with their

customers by offering easy access to a broad array of products and services.

By capitalizing on brand identification and by providing a broad array of

financial services, banks hope to build customer loyalty, cross-sell, and

enhance repeat business.

Customer Demographics — Internet banking allows national banks to offer a

wide array of options to their banking customers. Some customers will rely on

traditional branches to conduct their banking business. For many, this is the

most comfortable way for them to transact their banking business. Those

customers place a premium on person-to-person contact. Other customers are

early adopters of new technologies that arrive in the marketplace. These

customers were the first to obtain PCs and the first to employ them in

conducting their banking business. The demographics of banking customers

will continue to change. The challenge to national banks is to understand their

customer base and find the right mix of delivery channels to deliver products

and services profitably to their various market segments.

Page 10: 67576548 e-banking

Possible Consequence:

After Possible ways of gaining unauthorized access to e banking fat client locally stored

data are explained possible consequence of this access are presented.

Consequence will be explained as violations of combination information and

cryptographic security.Information security can be usally expressed through sop called

CIA triad of confidentiality , integrity, availability.Cryptographic security includes

Confidendiality, data integrity authentication and non repudiation.

Confidentiality:

Confidentiality is a service used to keep the content of information from all but those

authorized to have it.Financial data should to private and ebanking application should

enforce privacy.Authorized access to that local storage where E-banking data is stored

would enable the intruder to read the data. This clearly violates confidentiality.

Data Integrity:

Data Integrity is a service which addresses the unauthorized alteration of data.

E-banking clients must be sure that the data they enter or get through fat client

application were not changed in any way on the way to or from the bank. Intruders

that gain unauthorized access to local e-banking data storage that might be able

to change the data in that storage. In this way data entered through fat client

application could be altered before it is sent to the bank.

Page 11: 67576548 e-banking

Availability:

Availability is a service that ensures the information system and necessary datas

are available for use.When they are needed. Malicious users that gains access to

e-banking local storage could make data unavailable without need for any

knowledge about data meaning or structure. Simple deletion or alteration of

records or even the whole storage could render the data and application useless.

Authentication:

Authentication is a service related to identification. This function applies to both

entities and information itself. Only authenticated users should be able to view

financial view financial data and monetary transactions. E-banking clients require

authentication before they can start.

Non Repudiation:

Non Repudiation is a service which prevents an entity from denying previous

commitments or actions. Banks and its clients should not be able deny transactions

executed through an e-banking application. Without proper authentication ensured

data integrity it would be very difficult to prove if bank client actually created

and authorized transaction and even if he did if the transaction data are the same

data that client entered.

Page 12: 67576548 e-banking

Types of Internet Banking

Understanding the various types of Internet banking products will help

examiners assess the risks involved. Currently, the following three basic kinds

of Internet banking are being employed in the marketplace:

C Informational — This is the basic level of Internet banking. Typically,

the bank has marketing information about the bank’s products and

services on a stand-alone server. The risk is relatively low, as

informational systems typically have no path between the server and the

bank’s internal network. This level of Internet banking can be provided

by the bank or outsourced. While the risk to a bank is relatively low,

the server or Web site may be vulnerable to alteration. Appropriate

controls therefore must be in place to prevent unauthorized alterations to

the bank’s server or Web site.

C Communicative — This type of Internet banking system allows

some interaction between the bank’s systems and the customer. The

interaction may be limited to electronic mail, account inquiry, loan

applications, or static file updates (name and address changes). Because

these servers may have a path to the bank’s internal networks, the risk is

higher with this configuration than with informational systems.

Appropriate controls need to be in place to prevent, monitor, and alert

management of any unauthorized attempt to access the bank’s internal

Comptroller’s Handbook 5 Internet

Banking

networks and computer systems. Virus controls also become much

more critical in this environment.

Page 13: 67576548 e-banking

C Transactional — This level of Internet banking allows customers to

execute transactions. Since a path typically exists between the server

and the bank’s or outsourcer’s internal network, this is the highest risk

architecture and must have the strongest controls. Customer

transactions can include accessing accounts, paying bills, transferring

funds, etc.

Number of Modules:

The system after careful analysis has been identified to be presented with the following

modules.

1. Employee information module: The module manages the information of all the

employees who practically exist for this organization. Each employee is exclusively

associated through a specific department and authorized designation. The module

manages all the transactional relations that generically arise as and when the system has

been executed, upon the requirements.

2. Banks Information module: This module specifies the integrated and

interrelation information alert the banks and their branches. The module also specifically

states the different services each bank can provide and integrates itself with customer’s

accounts information.

3. Customers accounts information module: The module maintains the actual

customers list that have availed bank accounts upon this system. The module integrates

itself with the banks and the types of services the bank can provide.

4. Customer transaction module: This module maintains the information related to

all the transaction that are executed by the customer upon the E-Banking application. The

Page 14: 67576548 e-banking

module integrates itself with entities like transaction types to check the consistency of the

transaction.

5. Fund Transfer module: This module maintains the information related to the

funds that have been transferred by the customer from one of his account to another

account of his own. This module helps the customer in executing the fund transfer with

out the physical visit to the banks premises.

6. Chequebook request module: This module maintains the information related

and issues by the bank. This module facilitates the customer with requesting the

chequebook through online process eradicating the physical

Page 15: 67576548 e-banking

System Requirements:

Hardware Specification:

Processor : Pentium IV

Speed : 1.5 GHz

Main Memory : 256 MB

Hard Disk Drive : 40 GB

Floppy Drive : 1.44 inches

Monitor : SVGA Color

Keyboard : Multimedia

Software Specification:

Front-end : PHP 5.0

Back-end : MYSQL 5.2.1

Server : Appache Wampserver2.0

Operating System : windows Xp

Page 16: 67576548 e-banking

User Authentication:

Authentication is the act of establishing or confirming something (or someone) as

authentic, that is, that claims made by or about the thing are true. Authenticating an

object may mean confirming its provenance, whereas authenticating a person often

consists of verifying their identity. Authentication depends upon one or more

authentication factors.

To start a session with a system, usually by giving a {user name} and {password}

as a means of user {authentication}. The term is also used to mean the ability to access a

service (also called an account), e.g. "Have you been given a login yet?" "Log in/on" is

occasionally misused to refer to starting a session where no authorization is involved, or

to access where there is no session involved.

Upon entering the program, all users will encounter the “Login Screen”. Each

user will have a personalized profile and database that is password-protected from other

users. To begin using Connect, a user must select his/her profile. The user then enters

their personal password and left-clicks the “Go” button once with their mouse. The user

may also choose to exit the program from here by clicking “Exit”. If a user does not have

a profile, s/he must select “New User” from the menu.

Page 17: 67576548 e-banking

Advantage of Internet banking:

As per the Internet and Mobile Association of India's report on online banking 2006,

"There are many advantages of online banking. It is convenient, it isn't bound by

operational timings, there are no geographical barriers and the services can be offered at a

miniscule cost."

Through Internet banking, you can check your transactions at any time of the day, and

as many times as you want to. Where in a traditional method, you get quarterly

statements from the bank. If the fund transfer has to be made outstation, where the bank

does not have a branch, the bank would demand outstation charges. Whereas with the

help of online banking, it will be absolutely free for you.

Security Precautions:

Customers should never share personal information like PIN numbers, passwords etc

with anyone, including employees of the bank. It is important that documents that contain

confidential information are safeguarded. PIN or password mailers should not be stored,

the PIN and/or passwords should be changed immediately and memorised before

destroying the mailers.

Customers are advised not to provide sensitive account-related information over

unsecured e-mails or over the phone. Take simple precautions like changing the ATM

PIN and online login and transaction passwords on a regular basis. Also ensure that the

logged in session is properly signed out.

Page 18: 67576548 e-banking

Software configuration:

FRONT END OF SOFTWARE:

Introduction to PHP:

PHP is a language that has outgrown its name. It was originally conceived as a set of

macros to help coders maintain personal home pages, and its name grew from its purpose.

Since then, PHP's capabilities have been extended, taking it beyond a set of utilities to a

full-featured programming language, capable of managing huge database-driven online

environments.

As PHP's capabilities have grown, so too has its popularity. According to

NetCraft (http://www.netcraft.com), PHP was running on more than 1 million hosts in

November 1999. As of February 2000, that figure had already risen to 1.4 million hosts.

According to E-Soft, PHP is the most popular Apache module available, beating even

ModPerl.

PHP is now officially known as PHP: Hyper Text Preprocessor. It is a server-side

scripting language usually written in an HTML context. Unlike an ordinary HTML page,

a PHP script is not sent directly to a client by the server; instead, it is parsed by the PHP

binary or module. HTML elements in the script are left alone, but PHP code is interpreted

and executed. PHP code in a script can query databases, create images, read and write

files, talk to remote servers— the possibilities are endless.

The output from PHP code is combined with the HTML in the script and the

result sent to the user.

Page 19: 67576548 e-banking

How Did PHP Evolve?

The first version of PHP was created by Rasmus Lerdorf in 1994 as a set of Web

publishing macros. These were released as the Personal Home Page Tools and later

rewritten and extended to include a package called the Form Interpreter (PHP/FI). From a

user's perspective, PHP/FI was already an attractive proposition, and its popularity grew

steadily. It also began to attract interest from the developer community. By 1997, a team

of programmers was working on the project. The next release— PHP3— was born out of

this collaborative effort. PHP3 was an

effective rewrite of PHP, with an entirely new parser created by Zeev Suraski and Andi

Gutmans, as well as differences in syntax and new features. This release established PHP

as one of the most exciting server scripting languages available, and the growth in usage

was enormous.

PHP's support for Apache and MySQL further secured its popularity. Apache is

now the most-used Web server in the world, and PHP3 can be compiled as an Apache

module. MySQL is a powerful free SQL database, and PHP provides a comprehensive set

of functions for working with it. The combination of Apache, MySQL, and PHP is all but

unbeatable. That isn't to say that PHP is not designed to work in other environments and

with other tools. In fact, PHP supports a bewildering array of databases and servers.

The rise in popularity of PHP has coincided with a change of approach in Web

publishing. In the mid-1990s it was normal to build sites, even relatively large sites, with

hundreds of individual hard-coded HTML pages. Increasingly, though, site publishers are

harnessing the

Page 20: 67576548 e-banking

power of databases to manage their content more effectively and to personalize their sites

according to individual user preferences.

The use of databases to store content, and of a scripting language to retrieve this

data, will become further necessary as data is sent from a single source to multiple

environments, including mobile phones and PDAs, digital television, and broadband

Internet environments. In this context, it is not surprising that a tool of PHP's

sophistication and flexibility is becoming so popular.

At the time of this writing, PHP4 is in its final beta stage and is due for release

shortly. By the time you read this book, PHP4 will be making waves!

Why Choose PHP?

There are some compelling reasons to work with PHP4. For many projects you

will find that the production process is significantly faster than you might expect if you

are used to working with other scripting languages. As an open source product, PHP4 is

well supported by a talented production team and a committed user community.

Furthermore, PHP can be run on all the major operating systems with most

servers.

Speed of Development

Because PHP allows you to separate HTML code from scripted elements, you

will notice a significant decrease in development time on many projects. In many

instances, you will be able to separate the coding stage of a project from the design and

build stages. Not only can this make life easier for you as a programmer, it also can

remove obstacles that stand in the way of effective and flexible design.

Page 21: 67576548 e-banking

PHP Is Open Source

To many people, "open source" simply means free, which is, of course, a benefit

in itself. To quote from the official PHP site at http://www.php.net/: This may sound a

little foreign to all you folks coming from a non-UNIX background, but PHP doesn't cost

anything. You can use it for commercial and/or non-commercial use all you want. You

can give it to your friends, print it out and hang it on your wall or eat it for lunch.

Welcome to the world of Open Source software! Smile, be happy, the world is good. For

the full legalese, see the official license.

Well-maintained open source projects offer users additional benefits, though. You benefit

from an accessible and committed community who offer a wealth of experience in the

subject. Chances are that any problem you encounter in your coding can be answered

swiftly and easily with a little research. If that fails, a question sent to a mailing list can

yield an intelligent, authoritative response.

You also can be sure that bugs will be addressed as they are found, and that new

features will be made available as the need is defined. You will not have to wait for the

next commercial release before taking advantage of improvements. There is no vested

interest in a particular server product or operating system. You are free to make choices

that suit your needs or those of your clients, secure that your code will run whatever you

decide.

Performance

Because of the powerful Zend engine, PHP4 compares well with ASP in

benchmark tests, beating it in some tests. Compiled PHP leaves ASP far behind.

Portability

Page 22: 67576548 e-banking

PHP is designed to run on many operating systems and to cooperate with many

servers and databases. You can build for a UNIX environment and shift your work to NT

without a problem. You can test a project with Personal Web Server and install it on a

UNIX system running on PHP as an Apache module.

MySQL

History of MySQL

We started out with the intention of using MY SQL to connect to our tables using

our own fast low-level (ISAM) routines. However, after some testing, we came to the

conclusion that My SQL was not fast enough or flexible enough for our needs. This

resulted in a new SQL interface to our database but with almost the same API interface as

MY SQL. This API was designed to allow third-party code that was written for use with

MY SQL to be ported easily for use with My SQL.

The derivation of the name My SQL is not clear. Our base directory and a large

number of our libraries and tools have had the prefix “my” for well over 10 years.

However, co-founder Monty Widenius’s daughter is also named My. Which of the two

gave its name to MY SQL is still a mystery, even for us. 6 My SQL Technical Reference

for Version 5.0.1-alpha The name of the My SQL Dolphin (our logo) is “Sakila,” which

was chosen by the founders of MY SQL AB from a huge list of names suggested by users

in our “Name the Dolphin” contest. The winning name was submitted by Ambrose

Twebaze, an Open Source software developer from Swaziland, Africa. According to

Ambrose, the name Sakila has its roots in SiSwati, the local language of Swaziland.

Sakila is also the name of a town in Arusha, Tanzania, near Ambrose’s country of origin,

Uganda.

Page 23: 67576548 e-banking

The Main Features of MY SQL

The following list describes some of the important characteristics of the My SQL

Database Software.

Internals and Portability

• Written in C and C++.

• Tested with a broad range of different compilers.

• Works on many different platforms.

• Uses GNU Automake, Autoconf, and Libtool for portability.

• APIs for C, C++, Eiffel, Java, Perl, PHP, Python, Ruby, and Tcl are available.

• Fully multi-threaded using kernel threads. It can easily use multiple CPUs

• Provides transactional and non-transactional storage engines.

• Uses very fast B-tree disk tables (MyISAM) with index compression.

• Relatively easy to add another storage engine. This is useful if you want to add

an SQL interface to an in-house database.

• A very fast thread-based memory allocation system.

• Very fast joins using an optimized one-sweep multi-join.

• In-memory hash tables, which are used as temporary tables.

• SQL functions are implemented using a highly optimized class library and should

be as fast as possible. Usually there is no memory allocation at all after query

initialization.

• The MySQL code is tested with Purify (a commercial memory leakage detector)

as well as with Valgrind, a GPL tool (http://developer.kde.org/~sewardj/).

• The server is available as a separate program for use in a client/server networked

environment. It is also available as a library that can be embedded (linked) into

Page 24: 67576548 e-banking

standalone applications. Such applications can be used in isolation or in

environments where no network is available.

• Fixed-length and variable-length records.

• Statements and Functions

• Full operator and function support in the SELECT and WHERE clauses of

queries. For example:

mysql> SELECT CONCAT(first_name, ' ', last_name)

FROM citizen

WHERE income/dependents > 10000 AND age > 30;

• Full support for SQL GROUP BY and ORDER BY clauses. Support for group

functions (COUNT(), COUNT(DISTINCT ...), AVG(), STD(), SUM(), MAX(),

MIN(), and GROUP_CONCAT()).

• Support for LEFT OUTER JOIN and RIGHT OUTER JOIN with both standard

SQL and ODBC syntax.

• Support for aliases on tables and columns as required by standard SQL.

• DELETE, INSERT, REPLACE, and UPDATE return the number of rows that

were changed (affected). It is possible to return the number of rows matched

instead by setting a flag when connecting to the server.

• The MySQL-specific SHOW command can be used to retrieve information about

databases, tables, and indexes. The EXPLAIN command can be used to determine

how the optimizer resolves a query.

• Function names do not clash with table or column names. For example, ABS is a

valid column name. The only restriction is that for a function call, no spaces are

allowed between the function name and the ‘(’ that follows it.

• You can mix tables from different databases in the same query.

• Security

Page 25: 67576548 e-banking

• A privilege and password system that is very flexible and secure, and that allows

host-based verification. Passwords are secure because all password traffic is

encrypted when you connect to a server.

• Scalability and Limits

• Handles large databases. We use MySQL Server with databases that contain 50

million records. We also know of users who use MySQL Server with 60,000

tables and about 5,000,000,000 rows.

• Up to 64 indexes per table are allowed. Each index may consist of 1 to 16

columns or parts of columns. The maximum index width is 1000 bytes (500

before MySQL 4.1.2). An index may use a prefix of a column for CHAR,

VARCHAR, BLOB, or TEXT column types.

• Connectivity

• Clients can connect to the MySQL server using TCP/IP sockets on any platform.

On Windows systems in the NT family (NT, 2000, or XP), clients can connect

using named pipes. On Unix systems, clients can connect using Unix domain

socket files.

• MySQL Technical Reference for Version 5.0.1-alpha

• The Connector/ODBC (MyODBC) interface provides MySQL support for client

programs that use ODBC (Open Database Connectivity) connections.

• For example, you can use MS Access to connect to your MySQL server. Clients

can be run on Windows or Unix. MyODBC source is available.

• All ODBC 2.5 functions are supported, as are many others.

• The Connector/J interface provides MySQL support for Java client programs that

use JDBC connections. Clients can be run on Windows or Unix. Connector/J

source is available.

• Localization

• The server can provide error messages to clients in many languages.

• All data is saved in the chosen character set. All comparisons for normal string

columns are case-insensitive.

Page 26: 67576548 e-banking

• Sorting is done according to the chosen character set (using swedish collation by

default). It is possible to change this when the MySQL server is started. To see an

example of very advanced sorting, look at the Czech sorting code. MySQL Server

supports many different character sets that can be specified at compile time and

runtime.

• Clients and Tools

• All MySQL programs can be invoked with the --help or -? options to obtain

online assistance.

4. DESIGN ISSUE

Design is the process of translation requirements defined during analysis in to

several design activities for user consideration, designer, select equipments needed to

implement the system. In this phase, design of the database, input design, code design

and output design are considered.

SYSTEM DESIGN

The design of an information system provided the details state how a system

which meet the requirements identified during the system analysis, this stage is often

referred to as logical design in contrast to the process of developing program software,

which is referred to as physical design, and this also describes the data to input,

calculated or stored.

Requirement are translated into specification, this system design involve first

logical design than physical construction of the system.

LOGICAL DESIGN

Page 27: 67576548 e-banking

Show the major feature and how they are related to one another, it also specifies

input box and screen layout for all forms.

PHYSICAL DESIGN

Logical design produce programs, software, files and working system.

4.1 INPUT DESIGN

Input using the process of converting user – oriented handling input

specify how data are accepted for computer processing, input design can ensure the

reliability of the system output of error ones information, it determines whether the

user interact with the computer efficiently.

The input design is the link ties the information system into the world of

its users. Some aspects of the design vary, depending on whether the system is batch

oriented or online. But regardless of the system, there are general input concerns that

all analysts should have.

Input design consists of developing specifications and procedures for data

preparation those steps necessary to put data into a usable form for processing, and

data entry, the activity of putting the data into computer for processing. As obviously

data from a written or printed document or it can occur by having people key data

directly into the system. Four objectives guiding the design of input focus on:

• Controlling the amount of input required.

• Avoiding delay.

Page 28: 67576548 e-banking

• Controlling errors.

• Keeping steps simple.

4.2 OUTPUT DESIGN

Computer output is the most important and direct source of information to the

user. Designing computer output should proceed in an organized manner. The right

output element is designed so that people will find the system easy to use efficiently.

• Identify the specific output that is needed to meet the information

requirements.

• Select methods for presenting information.

• Create document, report or other formats that contain information produced by the system.

The output from an information system should accomplish one or more of the

following objective:

• Convey information about past activities, current status.

• Signal important events, opportunities and problems.

• Trigger an action.

• Confirm an action.

Output is the main reason for developing the system. The points that have to be

considered when designing an output are as follows:

• Determining what information to present.

Page 29: 67576548 e-banking

• Decide whether to display, or print and select the output medium.

• Arrange the presentation of information in an acceptable format.

• Decide how to distribute the output to intended recipients.

The arrangement of information on a display or printed document if termed as

layout. The output design is specified as layout form sheets that describe the location

characteristics and format of column heading and pagination. Output design of the

system is concerned with the convergence of information to the end user in a user-

friendly manner.

CODE DESIGN

Coding state encompasses a coding philosophy that stresses simplicity and clarity.

The coding design styled followed in the system includes,

• Using intonation. Parenthesis, blank space and boards around the block of

commands and enhance readability.

• Providing standard documentation for each program and unit

• Avoiding side effect.

• Avoiding use of an identifier for multiple purposes.

• Method of data declaration.

• Compiling and debugging.

• The debugging is very easy.

Page 30: 67576548 e-banking

4.3 DATABASE DESIGN

It is very important the files designed are capable of storing the same information

needed repetition of filed, (i.e), storing the same information should be kept minimum.

That ensures thus the database is considered.

This system is developed with some database, each having one table is being

listed here in order to explain the database.

Database design runs parallel without application design. As we called

information about what is to be done, we will obviously collect the information what data

needs to be entered, stored, messaged and printed on the reports, we have to use our data

entry screens and forward what will need to be in our database or pickup the report and

work backward.

Page 31: 67576548 e-banking

Data Flow Diagrams:

There are only five symbols that are used in the drawing of business process diagrams (data flow diagrams). These are now explained, together with the rules that apply to them.

This diagram represents a banking process, which maintains customer accounts. In this example, customers can withdraw or deposit cash, request information about their account or update their account details. The five different symbols used in this example represent the full set of symbols required to draw any business process diagram.

External Entity

An external entity is a source or destination of a data flow which is outside the area of study. Only those entities which originate or receive data are represented on a business process diagram. The symbol used is an oval containing a meaningful and unique identifier.

Page 32: 67576548 e-banking

Process

A process shows a transformation or manipulation of data flows within the system. The symbol used is a rectangular box which contains 3 descriptive elements: Firstly an identification number appears in the upper left hand corner. This is allocated arbitrarily at the top level and serves as a unique reference.Secondly, a location appears to the right of the identifier and describes where in the system the process takes place. This may, for example, be a department or a piece of hardware. Finally, a descriptive title is placed in the centre of the box. This should be a simple imperative sentence with a specific verb, for example 'maintain customer records' or 'find driver'.

Data Flow

A data flow shows the flow of information from its source to its destination. A data flow is represented by a line, with arrowheads showing the direction of flow. Information always flows to or from a process and may be written, verbal or electronic. Each data flow may be referenced by the processes or data stores at its head and tail, or by a description of its contents.

Data Store

A data store is a holding place for information within the system:It is represented by an open ended narrow rectangle. Data stores may be long-term files such as sales ledgers, or may be short-term accumulations: for example batches of documents that are waiting to be processed. Each data store should be given a reference followed by an arbitrary number.

Resource Flow

A resource flow shows the flow of any physical material from its source to its destination. For this reason they are sometimes referred to as physical flows. The physical material in question should be given a meaningful name. Resource flows are usually restricted to early, high-level diagrams and are used when a description of the physical flow of materials is considered to be important to help the analysis.

Data Flow Diagrams – The Rules

Page 33: 67576548 e-banking

SYSTEM DESIGN:

System Design transforms a logical representation of a given system into

the physical specification. The specifications are converted into a physical reality during

development. The design forms a blueprint of the system and how the components relate

to each other. The design of the system reflects the strength of the software. Better the

design; better the quality, efficiency and reliability of the software.

System design goes through two phases of development.

Logical Design

Physical Design

Logical design is concerned with reviewing the current physical system,

preparing input specification, preparing output specification, preparing edit and security

control specification, specify the implementation plan, preparing logical walkthrough of

the information flow, output, input, control and implementation plans and reviewing

benefits, cost, target date and system constraints.

Physical design is concerned with specification of input and output media,

designing database, specify the backup procedure, designing information flow throughout

the system. Physical design walkthrough preparing a conversion schedule and a target

date, determining training procedure, courses and timetable, devising a test and

implementation plan, specifying a new hardware and software and updating benefits,

cost, conversion date and system constraints.

DESIGN OF INPUT:

Input design is the process of converting user originated inputs to a

computer based format. The goal of designing input data to make the data entry as easy,

logical and free from errors as possible. The input design details to be considered.

• What data to input?

• What medium to use?

Page 34: 67576548 e-banking

• How the data should be arranged?

• The dialogue to guide user in providing input.

• Data items transaction needing a validation to detect errors.

• Methods for performing inputs validation and steps to follow when errors

occur.

The design decisions for handling input specify how data is accepted for computer

processing. The design of input also includes specifying the means by which users and

system operators direct the system in which actions to take.

DESIGN OF OUTPUT:

Computer output is the most important and direct sources of information

to the user. Efficiency, intelligible, output design should improve system’s relationship

with the user and help in decision making. When designing output, the following should

be accomplished.

• Determine what information to present.

• Decide whether to display, print or speak and select the output media.

• Arrange the presentation of information in an acceptable format.

Page 35: 67576548 e-banking

Database Design

Myacct:

S.no Field name Datatype

1 id int(11)

2 acct varchar(255)

3 Card varchar(255)

4 name varchar(255)

5 depo varchar(255)

6 day varchar(255)

7 address varchar(255)

8 acctype varchar(255)

9 mail varchar(255)

10 accnomini varchar(255)

11 nomadd varchar(255)

12 addproof varchar(255)

13 other varchar(255)

this project makes it project makes it easy for the patients to get their MRIs

Page 36: 67576548 e-banking

login :

doctors with an online s

S.no Field name Datatype

1 id int(11)

2 acct varchar(100)

3 card varchar(100)

4 name varchar(100)

5 pword varchar(100)

Service:

S.no Field name Datatype

1 id int(11)

2 acct varchar(100)

3 name varchar(100)

4 branch varchar(100)

5 service varchar(100)

6 ser_status varchar(100)

Page 37: 67576548 e-banking

Testing

SYSTEM TESTING:

The objective of software testing is to uncover errors. To fulfill this objective, a

series of test steps, unit, integration, validation, and system tests are conducted. At last

UAT (User Acceptance Testing) is conducted. Unit and integration tests concentrate on

functional verification of a module and incorporation of modules into a software

structure. Validation testing demonstrates trace ability to software requirements, and

system testing validates software once it has been incorporated into larger system. Then

debugging is made to clear all errors. AT is conducted in users environment, they give

feedback is system is not to their expectation. They test with the data, with which they are

working and check all the possibilities.

TESTING STRATEGIS:

•White box testing or Code testing.

•Black box testing or Behavioral testing.

WHITE BOX TESTING:

The code testing strategy checks for the correctness of every statement in the

program. To follow this testing strategy, there should be test cases that result in execution

of every instruction in the program or module; that is every path in the program is tested.

The test cases should guarantee that independent paths within a module are executed at

least once.

BLACK BOX TESTING:

To perform black box testing, the analyst examines the specifications stating what

the program or module should do and how it should perform under various conditions.

Page 38: 67576548 e-banking

Then, test cases are developed for various conditions and submitted for processing. By

examining the results, the analyst can examine whether the program performs according

the specified requirements.

Unit Testing:

Instead of testing the system as a whole, unit testing focuses on the modules that

make up the system. Each module is taken up individually and tested for corrections in

coding and logic. Errors resulting from interaction of modules are initially avoided.

The advantages of unit testing are

Size of a module is quite small that errors can be easily located.

Confusing interactions of multiple errors in widely different parts

Of the software eliminated.

Module level testing can be exhaustive.

Integration Testing:

The strategies for integrating software component product include the bottom-up

strategy, the top-down strategy and send which strategy careful planning and scheduling

are required. To ensure that modules will be available for integration into the evolving

software product when needed. The integration strategy dictates the order in which

modules must be available & thus exerts a strong influence on the order in which

modules are written, debugged and unit tested.

Validation Testing:

At the culmination of integration testing, software is completely assembled as a

package. Interfacing errors have been uncovered and corrected and a final series of

Page 39: 67576548 e-banking

software test-validation testing begins. Validation testing can be defined in many ways,

but a simple definition is that validation succeeds when the software functions in manner

that is reasonably expected by the customer. Software validation is achieved through a

series of black box tests that demonstrate conformity with requirement. After validation

test has been conducted, one of two conditions exists.

• The function or performance characteristics confirm to specifications and are

accepted.

• A validation from specification is uncovered and a deficiency created.

Deviation or errors discovered at this step in this project is corrected prior to

completion of the project with the help of the user by negotiating to establish a method

for resolving deficiencies. Thus the proposed system under consideration has been tested

by using validation testing and found to be working satisfactorily. Though there were

deficiencies in the system they were not catastrophic.

User Acceptance Testing:

User acceptance of the system is key factor for the success of any system. The

system under consideration is tested for user acceptance by constantly keeping in touch

with prospective system and user at the time of developing and making changes

whenever required. This is done in regarding to the following points.

Page 40: 67576548 e-banking

Screen Shot:

User Main Page:

Page 41: 67576548 e-banking

Login Page:

Page 42: 67576548 e-banking

Customer’s Details:

Page 43: 67576548 e-banking

Transaction Details:

Page 44: 67576548 e-banking

Service Request:

Page 45: 67576548 e-banking

Check Book Request:

Page 46: 67576548 e-banking

Admin Part:

Customer’s details:

Page 47: 67576548 e-banking

Service Request:

Page 48: 67576548 e-banking

Conclusion:

E Banking is becoming immensely popular globally, and India is no exception to it. The

declining Internet rates, falling PC prices, broad bandwidth access through cable and

digital subscriber lines

, accessing the NET through cable TV etc., would definitely encourage the boom in E

Banking in India. With the globalization of business and services, our country cannot lag

behind in niche areas of Electronic Banking. In the new global era of multi currency,

multi-legal and multi regulatory systems, with the freedom of E-Commerce, banks have

to operate like multinational corporations to grow and survive by adopting E banking.