Online Banking System .Net Project Abstract, Report and Source Code

ABSTRACT

Online Banking is one of the most important financial activities which will be carried out by any person who holds a bank account. There are various activities that can be carried out once you log in to your bank account. Once a user logs in he or she can check the bank balance, check bank account transaction history or account summary, add beneficiary accounts, transfer funds to another account, download account summary. Whenever we deal with a banking system main concern should be the security related to banking transactions and account login activity.

Existing System:

The Online Banking System as of now deals with a single sign-in log on and it will not be secure as expected. If a customer logs on from an unknown system outside the usual access device there are chances that it can be hacked easily and this might end up with a lot of issues. There are chances that if the user forgets the password and supposedly changes it and writes down the same somewhere and forgets to erase it or scramble it, there are chances that anyone can misuse the login.

Proposed System:

Once a customer logs in he or she has to generate a transaction password for online banking transactions. It will be an additional password apart from the login username and password credentials. The third security system can be provided by adding a graphical password generator which needs to be punched in before confirming an online transaction. This will involve password strength meter also.

Authentication is an activity of linking an independent or an individual process on the basis of username and password which basically consists of characters, numbers, alphanumeric values, special characters etc. Most of the authentications are complex, though they seem to be boring to the users and are very hard to remember. Every one of us, use the simple textual passwords which can be easily guessed by the attacker.

Let us try a New methodology to improve the authentication process using graphical password generation by making the user selects his/her own set of password as a series of clicks on the image which we will store it as a pattern and for each click the strength of the password is calculated and can be used to classify the password as Low/Medium/High .

Our Online Banking approach will be a click-based graphical passwords authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). For this reason, the graphical-password approach is sometimes called graphical user authentication (GUA).

A graphical password is easier than a text-based password for most people to remember. Suppose an 8-character password is necessary to gain entry into a particular computer network. Instead of w8KiJ72c, for example, a user might select images of the earth (from among a screen full of real and fictitious planets), the country of France (from a map of the world), the city of Nice (from a map of France), a white stucco house with arched doorways and red tiles on the roof, a green plastic cooler with a white lid, a package of Gouda cheese, a bottle of grape juice, and a pink paper cup with little green stars around its upper edge and three red bands around the middle.

Administrator Sequence diagram
User Sequence diagram

Approach:

We will implement the strength indicator in a web environment using Html, CSS, Javascript, and Java to run my application. Like unlocking methodologies currently present in Smartphones, graphical passwords may act as a next-generation locking mechanism in which my design of the graphical password strength meter can be induced to suggest the strength of the graphical password which is being set.

In our assumption, we have noted the following two points:

1. The segment size of specific smaller objects (like the eyeballs of a selfie) is small which gives any attacker a clue on where the click might be.

2. The segment size of large spaces in the image (like the sky in the background) gives minimal clue on where the click mostly be.

3. Every pixel in the image belongs to a segment, so choosing a pixel anywhere in the image can give strength to the password.

Based on these two points we will give less weight to smaller/specific objects and more weight to larger objects.

Output Screenshot

Number of Modules:

We will go with below modules:

1. Customer
2. Registration module
3. Security and Authentication
4. Accounts summary
5. Transfer Funds
6. Profile
7. Admin

Specification requirements:

Software requirements:

● Front End : HTML, Css, Javascript
● Data Base : SQL Server 2005 / MySQL
● Technology : Java and Framework

Hardware Requirements:

● Hard disk : 80GB Min.
● RAM : 2 GB Min. & Above
● Processor : Intel Pentium-IV and above

Banking Network Design MCA Project Report

OBJECTIVES & GOALS

  • It provides support to various applications of banking
  • This Network will let various users of the bank and their employees connect to the main Server.
  • The objective only authorized user to access Network including all servers and network devices.
  • Provide greater speed & reduce time consumption.
  • It provides 99.99% of uptime of Network.
  • Allocate bandwidth to servers accordingly by using QoS.
  • The proposed Network will be user-friendly so that even a beginner can troubleshoot any issue easily.

The H/W used for developing this Network entitled Banking Network Design is as follows:-

  • HUBs
  • L2 and L3 Switches
  • Routers
  • Modems
  • WIC Cards, S/T Cards and various modules for routers and switches.
  • Firewalls
  • Very small aperture terminal(VSAT)
  • Various types of cables for interconnecting Network Devices.
  • Servers according to Customers requirements.

Network Overview

The Network design starts from the point of topology. This will include defining the layers and defining the functionality of each layer. The main aspect of dividing the network into layers is to incorporate the functions based on the layered structure and design the connectivity methods and high availability techniques at each layer. It also helps in distribution and control of network functionality.

The aim of the network is to provide highly available and scalable environment for collocation of Internet, Intranet and Extranet services, and applications. It providing high-speed access to data, voice and internet-based applications. The network is planned such that it will provide the necessary backbone connectivity between the different offices to ensure that the network becomes an enabler for business plans.

The design should be in such a way that there will be no single points of failure and should be capable of achieving fast and predictable convergence times. The design should also address the ease of scalability by increasing the port density in the switches. This Low-Level Design has been made in accordance with Cisco’s existing best-practice recommendations. The foundation of the design stems from Cisco’s standard ‘Multilayer Network Design’ model.

Future Scope

There is a vast future scope of this Network. This Design can be improved and can be used by various banks. If the limitations present in this Design are removed then, this Network will become very reliable and provide 100% uptime.

We can easily implement any changes to the Network Design as we are using the latest protocol like Border Gateway Protocol (BGP) in our network which is having attributes to easily divert or control the flow of data and QOS which can be used to allocate bandwidth to servers accordingly.

LIMITATIONS

  • We will not be able to resolve issues from any of the following by using this Network:
    • Any unreported/ undetected Bugs in standard software’s, or tools
    • Any changes in Application Software features
    • Older versions are incompatible with current features
  • Lease line uptime depends on a particular Service Provider.
  • This Network is limited by the state of technology and functionality of software tools or products deployed.
  • Third-party IOS integration will be carried out on the best-effort basis.
  • All hardware devices upgrades, hardware re-deployments, and policy changes shall be done after the mutual consent of the customer, based on the impact it would have on the overall security situation and performance of the network.
  • Security can be implemented in a better way.

Online Job Portal Java Project Report & Source Code

Objectives of the project:

  • Registration
  • Login
  • Authenticating
  • Updating Profile
  • Posting a job and removing or modifying job
  • Searching for a job
  • Taking online exam
  • Feedback

LITERATURE SURVEY

There are many applications developed related to this Online Job Portal, but, however, these systems are very complex for their own purpose. Most of them do not have the centralized database and easy access to users. So in this project, we are implementing this application through a centralized database and easy-to-use access for job seekers and job providers. The administrator is the primary actor to maintain the database, and also accepts comments from job providers and job seekers to improve and develop the application’s graphical user interface. Registered job seekers can also take the company online exam. In addition, qualified applicants can be classified according to this system based on their qualifications and company requirements.

Limitations

• The current Online Job Portal system is not a fully computerized and manual system for entering job candidates and job provider data and managing it.
• There is no centralized database maintenance
• There is no easy access to records of people seeking work in particular
• Job seekers can not easily navigate through the database

Benefits

• It is a fully automated system for managing the Online Job Portal database
• This system provides centralized database maintenance
• This system provides easy access to certain job seekers or their complete details
This system gives job seekers easy to navigate through the application to get more information in the most secure way.

IMPLEMENTATION

5.1. MODULES

The system is divided into three major parts depending upon the requirement they are.

  • 1) Administrator
  • 2) Job Provider
  • 3) Job Seeker

Administrator

All the users are controlled by admin. Administrator services are

  1. view job providers
  2. view job seekers
  3. view feedback

Examination

The job providers prepared questions and update the providers and conduct examinations to the job seekers and also send the particular examination results.

And the job seeker searches the particular job then attends the exam and also views his results after completion of the exam.

Software Requirements: 

Operating System: Windows XP/2003 or Linux/Solaris

User Interface: HTML, CSS

Client-side Scripting: JavaScript

Programming Language: Java

Web Applications: JDBC, JSP

IDE/ Workbench: Eclipse with My Eclipse Plug-in

Database: Oracle

Server Deployment: Apache Tomcat 6.0

Screen Shots:

  • HOME PAGE
  • LOG-IN PAGE
  • ADMIN PAGE
  • JOB PROVIDERS IN DB
  • JOB SEEKERS IN DB
  • FEEDBACK PAGE
  • JOB PROVIDER PAGE
  • UPDATE PROFILE PAGE
  • ADD NEW VACANCY PAGE
  • SEARCH JOB SEEKER PAGE
  • RESULT PAGE FOR SEARCH JOB SEEKERS
  • EXAM MANAGEMENT PAGE
  • PREPARE EXAM PAPER PAGE
  • PREPARING QUESTIONS PAGE
  • ADDING QUESTIONS PAGE
  • RESULT PAGE FOR SEARCH JOBS
  • EXAM MANAGEMENT PAGE
  • TAKING EXAM PAGE

TEST CASE REPORTS 

Name of the page: Admin Login

Sno TEST CASE Expected Result Actual Output Remarks
 1 New Admin logged on without sign in. Should return a message sign in  before log in. Sign in First Success
2. Invalid password Enter correct password Wrong password Success
3. Invalid username Invalid User Enter valid name Success
4. Special character entered in password field. Verify your password You Entered Invalid password Success

Name of the page: Job provider Login 

Sno TEST CASE Expected Result Actual Output Remarks
 1 New provider tried to log on without sign up. Should return a message sign up  before log in. Failure
2. Invalid password Enter correct password Wrong password Success
3. Invalid username Invalid User Enter valid name Success
4. Special character entered in password field. Verify your password You Entered Invalid password Failure

 Job Seeker Login 

Sno TEST CASE Expected Result Actual Output Remarks
 1 New seeker tried to log on without sign up. Should return a message sign up  before log in. Failure
2. Invalid password Enter correct password Wrong password Success
3. Invalid username Invalid User Enter valid name Success
4. Special character entered in password field. Verify your password You Entered Invalid password Failure

Name of the page: Exam Management 

Sno TEST CASE Expected Result Actual Output Remarks
 1 Provider tried to add exam paper without scheduling Schedule first NULL Failure
2. Seeker tried to write same exam again exam already taken Can Write Failure
3. Displaying a message after time up in exam Time up Time up Success
4. Selecting exam before scheduling date Invalid test NULL Failure