System Requirment Specifications For Electronic Banking: Further Drawbacks of The Existing System
System Requirment Specifications For Electronic Banking: Further Drawbacks of The Existing System
System Requirment Specifications For Electronic Banking: Further Drawbacks of The Existing System
The objective of the project is to design and develop Secure online Banking Application
using Antiphishing concept
Some customers avoid online banking as they perceive it as being too vulnerable
to fraud. The security measures employed by most banks are never 100% safe, but in
practice the number of fraud victims due to online banking is very small. Indeed,
conventional banking practices may be more prone to abuse by fraudsters than online
banking. Credit card fraud, signature forgery and identity theft are far more widespread
"offline" crimes than malicious hacking. Bank transactions are generally traceable and
criminal penalties for bank fraud are high. Online banking can be more insecure if users
are careless, gullible or computer illiterate. An increasingly popular criminal practice to
gain access to a user's finances is phishing, whereby the user is in some way persuaded
to hand over their password(s) to the fraudster.
Time Delay: In the existing system, information related to all transactions is stored in
different registers. Since all the transactions are stored in different registers it takes lot
of time to prepare different reports.
Redundancy: As the information passes through different registers, each register is
consolidated and sent to next register. So the same information is being tabulated at
each register, which involves lot of complication and duplication in work, thus it causes
redundancy.
Accuracy: Since the same data is compiled at different sections, the possibility of
tabulating data wrongly increases. Also if the data is more, validations become difficult.
This may result in loss of accuracy of data.
Storage Media: In the existing system, data transaction being stored on too long
registers it is very difficult to refer after some time.
Reports: At the various reports are tabulated manually. They are not such
Attractive and require more time. They do not provide adequate help in maintaining the
accounts.
PROPOSED SYSTEM
1) Developing the system, which meets the SRS and solving all the requirements of the
system?
2) Demonstrating the system and installing the system at client's location after the
acceptance testing is successful.
3) Submitting the required user manual describing the system interfaces to work on it
and also the documents of the system.
4) Conducting any user training that might be needed for using the system.
Functional Requirements:
Inputs: The major inputs for “Anti Phishing— The Fraud Detection in Online Banking”
can be categorized module -wise. Basically all the information is managed by the
software and in order to access the information one has to produce one's identity by
entering the user-id and password. Every user has their own domain of access beyond
which the access is dynamically refrained rather denied.
Output: The major outputs of the system are tables and reports. Tables are created
dynamically to meet the requirements on demand. Reports, as it is obvious, carry the
gist of the whole information that flows across the institution.
This application must be able to produce output at different modules for different
inputs.
Performance Requirements:
Hardware:
Cache : 512 KB
Software:
What is AntiPhishing?
Phishing attacks use both social engineering and technical subterfuge to steal
consumers' personal identity data and financial account credentials. Social-engineering
schemes use 'spoofed' e-mails to lead consumers to counterfeit websites designed to
trick recipients into divulging financial data such as credit card numbers, account
usernames, passwords and social security numbers. Hijacking brand names of banks, e-
retailers and credit card companies, phishers often convince recipients to respond.
Technical subterfuge schemes plant crime ware onto PCs to steal credentials directly,
often using Trojan keylogger spyware.
Phishing Attacks in January Rise to New Peak, 5% More Than Previous High
Last June
Time Delay: In the existing system, information related to all transactions is stored in
different registers. Since all the transactions are stored in different registers it takes lot
of time to prepare different reports.
Accuracy: Since the same data is compiled at different sections, the possibility of
tabulating data wrongly increases. Also if the data is more, validations become difficult.
This may result in loss of accuracy of data.
Information Retrieval: As the information is stored in the particular Format, it can
only be retrieved in the same format. But if it is to be retrieve in different format, it is
not possible.
Storage Media: In the existing system, data transaction being stored on too long
registers it is very difficult to refer after some time.
Reports: At the various reports are tabulated manually. They are not such
Attractive and require more time. They do not provide adequate help in maintaining the
accounts.
SDLC METHODOLOGIES
This Document plays a vital role in the development life cycle (SDLC) as it describes the
complete requirement of the system. It is meant for use by the developers and will be
the basic during testing phase. Any changes made to the requirements in the future will
have to go through formal change approval process.
WATER FALL MODEL was being chosen because all requirements were known beforehand
and the objective of our software development is the computerization/automation of an
already existing manual working system.
The developer is responsible for:
Developing the system, which meets the SRS and solving all the requirements of the
system?
Demonstrating the system and installing the system at client's location after the
acceptance testing is successful.
Submitting the required user manual describing the system interfaces to work on it
and also the documents of the system.
Conducting any user training that might be needed for using the system.
Maintaining the system for a period of one year after installation.
Advantages
Testing is inherent to every phase of the waterfall model
It is an enforced disciplined approach
It is documentation driven, that is, documentation is produced at every
stage
INPUT DESIGN
Input design is a part of overall system design. The main objective during the input
design is as given below:
To produce a cost-effective method of input.
To achive the highest possible level of accuracy.
To ensure that the input is acceptable and understood by the user.
INPUT STAGES:
The main input stages can be listed as below:
Data recording
Data transcription
Data conversion
Data verification
Data control
Data transmission
Data validation
Data correction
INPUT TYPES:
It is necessary to determine the various types of inputs. Inputs can be categorized as
follows:
External inputs, which are prime inputs for the system.
Internal inputs, which are user communications with the system.
Operational, which are computer department’s communications to the system?
Interactive, which are inputs entered during a dialogue.
INPUT MEDIA:
At this stage choice has to be made about the input media. To conclude about the
input media consideration has to be given to;
Type of input
Flexibility of format
Speed
Accuracy
Verification methods
Rejection rates
Ease of correction
Storage and handling requirements
Security
Easy to use
Portabilility
Keeping in view the above description of the input types and input media, it can be said
that most of the inputs are of the form of internal and interactive. As
Input data is to be the directly keyed in by the user, the keyboard can be considered to
be the most suitable input device.
OUTPUT DESIGN
Outputs from computer systems are required primarily to communicate the results of
processing to users. They are also used to provide a permanent copy of the results for
later consultation. The various types of outputs in general are:
External Outputs, whose destination is outside the organization.
Internal Outputs whose destination is with in organization and they are the
User’s main interface with the computer.
Operational outputs whose use is purely with in the computer department.
Interface outputs, which involve the user in communicating directly with
OUTPUT DEFINITION
The outputs should be defined in terms of the following points:
Type of the output
Content of the output
Format of the output
Location of the output
Frequency of the output
Volume of the output
Sequence of the output
Keeping in view the above description the project is to have outputs mainly
coming under the category of internal outputs. The main outputs desired according to
the requirement specification are:
The outputs were needed to be generated as a hot copy and as well as queries to
be viewed on the screen. Keeping in view these outputs, the format for the output is
taken from the outputs, which are currently being obtained after manual processing.
The standard printer is to be used as output media for hard copies.
FEASIBILITY STUDY
TECHINICAL FEASIBILITY:
Evaluating the technical feasibility is the trickiest part of a feasibility study. This is because, at this
point in time, not too many-detailed design of the system, making it difficult to access issues like
performance, costs on (on account of the kind of technology to be deployed) etc.
Technologies that are to be required for the development of the new system.
ii) Find out whether the organization currently possesses the required technologies:
Is the required technology available with the organization?
For instance –
“Will the current printer be able to handle the new reports and forms required for the new system?”
OPERATIONAL FEASIBILITY:
Proposed projects are beneficial only if they can be turned into information systems that will meet the
organizations operating requirements. Simply stated, this test of feasibility asks if the system will work
when it is developed and installed. Are there major barriers to Implementation? Here are questions that
will help test the operational feasibility of a project:
Is there sufficient support for the project from management from users? If
the current system is well liked and used to the extent that persons will not be
Are the current business methods acceptable to the user? If they are not,
Users may welcome a change that will bring about a more operational and useful systems.
Have the user been involved in the planning and development of the project?
Early involvement reduces the chances of resistance to the system and in
Since the proposed system was to help reduce the hardships encountered
In the existing manual system, the new system was considered to be operational feasible.
ECONOMIC FEASIBILITY:
Economic feasibility attempts 2 weigh the costs of developing and implementing a new system,
against the benefits that would accrue from having the new system in place. This feasibility study gives
the top management the economic justification for the new system.
A simple economic analysis which gives the actual comparison of costs and benefits are much
more meaningful in this case. In addition, this proves to be a useful point of reference to compare actual
costs as the project progresses. There could be various types of intangible benefits on account of
automation. These could include increased customer satisfaction, improvement in product quality better
decision making timeliness of information, expediting activities, improved accuracy of operations, better
documentation and record keeping, faster retrieval of information, better employee morale.
REQUIREMENT SPECIFICATION:
The Project “Anti Phishing— The Fraud Detection in Online Banking” is mainly designed to
maintain the security for the user accounts by encrypting and decrypting the passwords using
antiphishing concept
Now, the Hacker sends an e-mail to a user (here, a bank customer) giving a link
and saying that his account needs to be updated or his account has been locked
and asking him to send his account details immediately.
Now, the customer may fall for his trick and clicks the link, because the link would
look similar to the genuine bank’s link (under which, the hacker’s URL is hidden in
that). Now, when the link is clicked, the customer is re-directed to that fake
website (created by hacker).
Customer thinks that he has reached a genuine website and gives his account
details and personal details thinking that the e-mail is from genuine website.
The account details are now re-directed to the Hacker. Thus, the Hacker is
successful in cheating the customer.
ANTI – PHISHING is the solution to get rid of this problem. This Anti-Phishing is
nothing but “preventing the phishing”.
Creating a cipher key (an encrypted code) in the customer’s username, password
or in a/c no., which is not recognized in the hacker’s fake website, is considered as
one of the best solutions.
INTRODUCTION
Purpose: The main purpose for preparing this document is to give a general insight into
the analysis and requirements of the existing system or situation and for determining
the operating characteristics of the system.
Scope: This Document plays a vital role in the development life cycle (SDLC)
As it describes the complete requirement of the system. It is meant for use by the
developers and will be the basic during testing phase. Any changes made to the
requirements in the future will have to go through formal change approval process.
1) Developing the system, which meets the SRS and solving all the requirements of the
system?
2) Demonstrating the system and installing the system at client's location after the
acceptance testing is successful.
3) Submitting the required user manual describing the system interfaces to work on it
and also the documents of the system.
4) Conducting any user training that might be needed for using the system.
Functional Requirements:
Inputs: The major inputs for “Anti Phishing— The Fraud Detection in Online Banking”
can be categorized module -wise. Basically all the information is managed by the
software and in order to access the information one has to produce one's identity by
entering the user-id and password. Every user has their own domain of access beyond
which the access is dynamically refrained rather denied.
Output: The major outputs of the system are tables and reports. Tables are created
dynamically to meet the requirements on demand. Reports, as it is obvious, carry the
gist of the whole information that flows across the institution.
This application must be able to produce output at different modules for different inputs.
Performance Requirements: