7/28/2019 Icici Bank Project 11 (1)
1/48
ACKNOWLEDGEMENT
This is to acknowledge the support of all the people who helped me out
in completion of this project. First of all I would like to convey myregards to PROF. who provided me all the necessary inputs and
guidelines.
Our head of department, PROF. who gave me thisopportunity to work on this project.
My special thanks to SBI TRAINING OFFICERS, MR. SAURAV
MISHRA, MR.UMESH THAKUR, MR.AMLESH KUMAR, MR.SANJEEV KUMAR SINHA, MR. M.ANAND, MR. PRASHANTKUMAR, who imparted me the knowledge about the functioningstructure of state bank of India, which helped me out to give final
presentation of my project.
I would like to thanks to the branch manager of ICICI BANK , namely
MR. RAJEEV RANJAN, A.G. OFFICE DORANDA BRANCH, whogave me all the required information and inputs required for the project.
I would also like to thank my parents who helped me morally andfinancially to carry out this project and also my friends who kept meencouraging throughout the completion of this project.
7/28/2019 Icici Bank Project 11 (1)
2/48
CERTIFICATE
This is to certify that SUSHMA KUMARI of B.com (Accounts Group)
Sem. VI Roll No 88 session 2010-13 has successfully complete a
project on the given topic the ON Line Banking In Commercial Bank
(ICICI BANK)
I appreciate his skill, diligence and sense of commitment in
preparation of the project. The Project Work has been submitted as
partial fulfillment of the degree of B.Com (Accounts Group) ofMarwari College Ranchi. This project has been prepared exclusively for
academic purpose hence it shall not be used for any kind of non-
academic purpose whatsoever.
7/28/2019 Icici Bank Project 11 (1)
3/48
Objectives
The main objectives of the study are:
To understand the concept of Internet banking and
importance, to bank as well as customers.
To get aware of various aspects of net banking
To build up SWOC analysis of Internet banking of ICICI BANK
To build up various solutions for drawbacks in net banking
7/28/2019 Icici Bank Project 11 (1)
4/48
PROJECT ON
ORGANISATION: - ICICI BANK
SUBMITTED BY:-
NAME: SANA PERWEEN
CLASS: - B.Com PART III (Acc.)
CLASS ROLL NO. :-650
EXAM ROLL NO:-
10CACT015539
SESSION :- 2010-13
7/28/2019 Icici Bank Project 11 (1)
5/48
1
INTRODUCTION
ONLINE BANKING
The project entitled "OnlineBanking " is a computerized telecommunications device that provides the customers of afinancial institution with access to financial transactions in a p ublic space without the need fora human clerk or bank teller. On most modern ATMs, the customer is identified by inserting aplastic ATM card with a magnetic stripe or a plastic smartcard with a chip, that contains a uniquecard number and some security information, such as an expiration date or CVC (CVV). Securityis provided by the customer entering a personal identification number (PIN).
Using an ATM, customers can access their bank accounts in order to make cash withdrawals (orcredit card cash advances) and check their account balances as well as purchasing mobile cellphone prepaid credit. ATMs are known by various other names including automated banking
machine, money machine, bank machine, cash machine, hole-in-the-wall, cashpoint, Bancomat(in various countries in Europe and Russia), Multibanco (after a registered trade mark, inPortugal), and Any Time Money (in India)..
SYNOPSIS
"Online Banking " is a computerized telecommunications device that provides the customers of afinancial institution with access to financial transactions in a public space without the need for a
human clerk or bank teller. On most modern ATMs, the customer is identified by inserting aplastic ATM card with a magnetic stripe or a plastic smartcard with a chip, that contains a uniquecard number and some security information, such as an expiration date or CVC (CVV). Securityis provided by the customer entering a personal identification number (PIN).
ICICI BANK
ICICI Bank is the most valuable bank in India in terms of market capitalization and is ranked secondamongst all the companies listed on the Indi an stock exchanges.In terms of free float market capitalization*.The Bank has a network of about 1308Branches and 3,950 ATMs in India and presence in 18 countries. ICICI Bank offers a wide rangeof banking products and f inan cial servi ces t o co rpor ate and retai l cu stomer th rough avari ety of delivery channels and through its specialized subsidiaries and affiliates in the a re asof investmen t banking, life a nd non -life insurance, venture capit al and assetmanagement. The Bank currently has subsidiaries in the United Kingdom, Russia and Canada,branches in Singapore, Bahrain, Hong Kong, Sri Lanka and Dubai In ternational Fi nance Center andrepresentative offices in theUnitedStates, United Arab Emirates, China, South Africa, Bangladesh, Thailand,Malaysia and Indonesia. UK subsidiary has established a branch in Belgium. ICICI Bank's
7/28/2019 Icici Bank Project 11 (1)
6/48
equity shares are l isted in India on Bombay Stock Exchange( BS E) an d th eN a t i o n a l S t o c k E x c h a n g e ( N S E ) o f I n d i a L i m i t e d a n d i t s AmericanDepositary Receipts (ADRs) are listed on the New York Stock Exchange (NYSE).
OBJECTIVE
In the existing system the transactions are done only manually but in proposed system we have tocomputerize all the banking transaction using the software Online Banking. They are: UserModule
ADMINISTRATIVE MODULE
This module is the main module which performs all the main operations in the system. Themajor operations in the system are: Cash Withdrawal(Saving/Current withdrawal) Inquery Statement report Cash transformation Pin change
SIGNIFICANCE OF THE SYUDY
Though there are many online systems available on internet but this can compete with them with
some advancement in its functionality and can be used by any bank organization to maintain
their customers account and online transaction process.
The basic functionalities of the system are:
Create Account
Login
Update Profile
Password Recovery
View Profile
ATM and Bank finder
Contact Form
Amount Transaction
7/28/2019 Icici Bank Project 11 (1)
7/48
EMI and Loan Calculator
Delete account
Logout
4.2 Database design:
Database design is required to manage the large bodies of information. The management of data
involves both the definition of structure of the storage of information and provisions of
mechanism for the manipulation of information. in addition to the database system must provide
for the safety of information handled, despite the system crashes due to attempts art unauthorized
access. for developing an efficient data base , we will have to full fill certain condition such as:
Control Redundancy
Ease of use
Accuracy and integrity
Avoiding inordinate delays
Recovery from failure
Privacy and security
Performance
There are 6 major steps in design process. The first 5 steps are usually done on paper and finally
the design is implemented.
Identify the tables and relationship
Identify the data that is needed for each table and relationship
Resolve the relationship
Verify the design
Implement the design
7/28/2019 Icici Bank Project 11 (1)
8/48
NORMALIZATION
Normalization is a technique that is more applicable to record based data models. Each of the
process can be carried out independently to arrive at normalized tables. Normalization refines the
data structure and data are group in simple way as possible. So later changes can be bring about
the least impact on database structure and eliminates data redundancy.
DATA INTEGRITY
Data integrity refers to the procedure that ensures correctness of the data entered in the database.
Functions have been provided in the software, which check data while being entered. Integrity
problems are occurred due to hardware or software malfunctions such as power failure and disk
crashes. Side effect from the program development may also be the reason.
DATA CONSISTENCY
Problem with data consistency occur when adding records without first checking for records with
same key or deleting records without deleting other related records. Likewise the software is
coded such that primary keys cant be duplicated. For developing an efficient database, we have
to fulfill certain conditions such as :
Control redundancy
Ease of use
Data independence
Privacy and security
Performance
For achieving the above criterias we have to make use of various features that are available with
DBMS such as:
Enforcing integrity constraints to ensure data integrity and to reduce data inconsistency.
Recovery from failures using backup facility.
7/28/2019 Icici Bank Project 11 (1)
9/48
2
ORGANISATIONL PROFILE
HISTORY
ICICI Bank was originally promoted in1 9 9 4 b y I C I C I L i m i t e d , a n I n d i a n financial institution, and was its wholly ownedsubsidiary. ICICI's shareholdingin ICICI Bank was reduced to 46% through a public offering ofshares in Indiain fiscal 1998, an equity offering in the form of ADRs listed on theNYSE infiscal 2000, ICICI Bank's acquisition of Bank of Madura Limited in an all-stock a m a l g a m a t i o n i n f i s c a l 2 0 0 1 , a n d s e c o n d a r y m a r k e t sa l e s b y I C I C I t o institutional investors in fiscal 2001 and fiscal 2002. ICICIwas formed in 1955at the initiative of the World Bank, the Government of India andrepresentativeso f I n d i a n i n d u s t r y . T h e p r i n c i p a l o b j e c t i v e w a s t o c r e at e a d e v e l o p m e n t financial institution for providing medium-term and long-term projectf inancingto Indian bus inesses . In the 1990s , ICICI t r ans formed i t s bus iness f r o m a development financial institution offering only project finance to adiversifiedfinancial services group offering a wide variety of products and services, bothdirectlyand through a number of subsidiaries and affiliates like ICICI Bank. In1999, ICICI becomethe first Indian company and the first bank or financialinstitution from non-Japan Asia to belisted on the NYSE.After consideration of various corporate structuring alternatives in the contextofthe emerging competitive scenario in the Indian banking industry, and themovetowards universal banking, the managements of ICICI and ICICI Bank formed theview that the merger of ICICI with ICICI Bank would be the
optimals t r a t e g i c a l t e r n a t i ve f o r bo t h en t i t i e s , an d wo u l d c r e a t e t he op t i mal l e g a l structure for the ICICI group's universal banking strategy. The merger wouldenhancevalue for ICICI shareholders through the merged entity's access to low-cost deposits, greater opportunitiesfor earning fee-based income and the abilityto participate in the payments system and providetransaction-banking services.The merger would enhance value for ICICI Bank shareholdersthrough a largecapital base and scale of operations, seamless access to ICICI's strong corporaterelationshipsbuilt up over five decades, entry into new busi nesss e g m e n t s , h i g h e r m a r k e t s h a r e i n v a r i o u s b u s i n e s s s e g m e n t s , p a r t i c u l a r l yfee-basedservices, and access to the vast talent pool of ICICI and i ts
subsidiaries. In10
October 2001, the Boards of Directors of ICICI and ICICI Bank approved themerger of ICICIand two of its wholly-owned retail finance subsidiaries, ICICIPersonal Financial ServicesLimited and ICICI Capital Services Limited, withICICI Bank. The merger was approvedby shareholders of ICIC I and IC IC IB ank in January 2002, by the Hi gh Citst ofGujarat at Ahmedabad in March2002, and by the High Citst of Judicature at Mumbai andthe Reserve Bank of India in April 2002. Consequent to the merger, the ICICI group's financingand banking operations, both wholesale and retail, have been integrated in a singleentity. ICICIBank has formulated a Code of Business Conduct and Ethics for its directors and employees
7/28/2019 Icici Bank Project 11 (1)
10/48
ORGANISATIONAL STRUCTURE
ICICI Bank was established by the Industrial Credit and Investment Corporation of India, an
Indian financial institution, as a wholly owned subsidiary in 1994. The parent company was
formed in 1955 as a joint-venture of the World Bank, India's public-sector banks and public-sector insurance companies to provide project financing to Indian industry.[8][9]The bank was
initially known as theIndustrial Credit and Investment Corporation of India Bank, before it
changed its name to the abbreviatedICICI Bank. The parent company was later merged with the
bank.
ICICI Bank launched internet banking operations in 1998.[10]
ICICI's shareholding in ICICI Bank was reduced to 46 percent, through a public offering of
shares in India in 1998, followed by an equity offering in the form ofAmerican Depositary
Receipts on the NYSE in 2000. ICICI Bank acquired theBank of Madura Limitedin an all-stock
deal in 2001 and sold additional stakes to institutional investors during 2001-02.
In the 1990s, ICICI transformed its business from a development financial institution offering
only project finance to a diversified financial services group, offering a wide variety of products
and services, both directly and through a number of subsidiaries and affiliates like ICICI Bank.
In 1999, ICICI become the first Indian company and the first bank or financial institution from
non-Japan Asia to be listed on the NYSE.[11]
In 2000, ICICI Bank became the first Indian bank to list on the New York Stock Exchange with
its five million American depository shares issue generating a demand book 13 times the offer
size.
In October 2001, the Boards of Directors of ICICI and ICICI Bank approved the merger of ICICI
and two of its wholly owned retail finance subsidiaries, ICICI Personal Financial Services
Limited and ICICI Capital Services Limited, with ICICI Bank. The merger was approved by
shareholders of ICICI and ICICI Bank in January 2002, by the High Court of Gujarat at
Ahmedabad in March 2002 and by the High Court of Judicature at Mumbai and the Reserve
Bank of India in April 2002.[12]
In 2008, following the 2008 financial crisis, customers rushed to ICICI ATMs and branches in
some locations due to rumors of adverse financial position of ICICI Bank. The Reserve Bank ofIndia issued a clarification on the financial strength of ICICI Bank to dispel the rumors.[13]NEW
UPDATES FROM THE SITE ICICI Bank is India's second-largest bank with total assets of Rs.
4,736.47 billion (US$ 93 billion) at March 31, 2012 and profit after tax Rs. 64.65 billion (US$
1,271 million) for the year ended March 31, 2012. The Bank has a network of 3,100 branches
and 10,486 ATMs in India, and has a presence in 19 countries, including India.
http://en.wikipedia.org/wiki/World_Bankhttp://en.wikipedia.org/wiki/ICICI_Bank#cite_note-8http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-8http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-8http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-10http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-10http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-10http://en.wikipedia.org/wiki/American_Depositary_Receipthttp://en.wikipedia.org/wiki/American_Depositary_Receipthttp://en.wikipedia.org/wiki/NYSEhttp://en.wikipedia.org/wiki/ICICI_Bank#cite_note-11http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-11http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-11http://en.wikipedia.org/wiki/Gujarat_High_Courthttp://en.wikipedia.org/wiki/ICICI_Bank#cite_note-12http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-12http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-12http://en.wikipedia.org/wiki/2008_financial_crisishttp://en.wikipedia.org/wiki/ICICI_Bank#cite_note-13http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-13http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-13http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-13http://en.wikipedia.org/wiki/2008_financial_crisishttp://en.wikipedia.org/wiki/ICICI_Bank#cite_note-12http://en.wikipedia.org/wiki/Gujarat_High_Courthttp://en.wikipedia.org/wiki/ICICI_Bank#cite_note-11http://en.wikipedia.org/wiki/NYSEhttp://en.wikipedia.org/wiki/American_Depositary_Receipthttp://en.wikipedia.org/wiki/American_Depositary_Receipthttp://en.wikipedia.org/wiki/ICICI_Bank#cite_note-10http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-8http://en.wikipedia.org/wiki/ICICI_Bank#cite_note-8http://en.wikipedia.org/wiki/World_Bank7/28/2019 Icici Bank Project 11 (1)
11/48
ICICI Bank offers a wide range of banking products and financial services to corporate and retail
customers through a variety of delivery channels and through its specialised subsidiaries in the
areas of investment banking, life and non-life insurance, venture capital and asset management.
The Bank currently has subsidiaries in the United Kingdom, Russia and Canada, branches in
United States, Singapore, Bahrain, Hong Kong, Sri Lanka, Qatar and Dubai International
Finance Centre and representative offices in United Arab Emirates, China, South Africa,Bangladesh, Thailand, Malaysia and Indonesia. Our UK subsidiary has established branches in
Belgium and Germany.
ICICI Bank's equity shares are listed in India on Bombay Stock Exchange and the National Stock
Exchange of India Limited and its American Depositary Receipts (ADRs) are listed on the New
York Stock Exchange (NYSE)
3.1.2 BOARD OF DIRECTORS
MR. N.Vaghul (CHAIRMAN)
MR. Sridar Iyengar
MR. Lakshmi N. Mittal
MR. Narendra Murkumbi
MR. Anupam Puri
Mr. Arun Ramanathan
MR. M. K. Sharma
MR. P.M. Sinha
Prof. Marti G. Subrahmanyam
MR. T. S. Vijayan
MR. V. Prem Wasta
MR. K. V. Kamath (MANAGING DIRECTOR & CEO)
MR. Chanda Kochhar (JOINT MANAGING DIRECTOR)
MR. V. Vaidyanathan, (EXECUTIVE DIRECTOR)
Ms. Madhabi Puri-Buch, Executive Director
MR. Sonjoy Chatterjee (EXECUTIVE DIRECTOR)
7/28/2019 Icici Bank Project 11 (1)
12/48
Mr. Sridar Iyengar Mr. Narendra MurkumbiMr. M. K. Sharma Mr. N. VaghulMr. AnupamPuriMr. M. K. SharmaMr. P. M. SinhaProf. Marti G. SubrahmanyamCustomer Service CommitteeCredit Committee.
Area of OperationThe Bank has a network of 2,883 branches and 10021 ATM's in India, and has apresence in 19 countries, including India.
The bank has subsidiaries in the United Kingdom, Russia, and Canada; branches inUnited States, Singapore, Bahrain, Hong Kong, Sri Lanka, Qatar and DubaiInternational Finance Centre; and representative offices in United Arab Emirates, China,South Africa, Bangladesh, Thailand, Malaysia and Indonesia. The company's UKsubsidiary has established branches in Belgium and Germany.
No. of companies: 7 major ones including ICICI Bank, the parent firm International.
Employees Strength
Considered to be the most aggressive player in the financial services industry, ICICIBank seeks passion, commitment and the ability to think on one's feet, in a fresh recruit.
Chanda D. Kochhar, managing director and chief executive officer, ICICI Bank, is veryoptimistic about the growth opportunities that India will offer in the coming decade. In aninterview with Govindraj Ethiraj, Editor-in-Chief, Bloomberg UTV, Kochar says growthwill ensure that Indian banks join the big league of global banks.
On Campus Hiring
The company with its diverse interests does not restrict itself to ChartedAccountants and fresh MBAs, though they do form a sizable section of its fresherrecruitment. According to Saurabh the company operates in three salary brackets -High bracket, Second bracket and third bracket depending on the quality of the institute.Though for reasons of confidentiality, the company refused to mention where theindividual institutions stood, from our experience in B-School rankings, we could safelyassume that those institutions in the Top 20-25 rankings would form the high bracket,the next 25 in the second bracket and the rest in the third bracket.
So depending on how your institute is ranked, by different agencies, you can make anintelligent guess (to know where your institute stands see the B-School Almanac thatCareers360 has published where we presented the past 5 years ranking of schools byfive major publications). The company recruits about 2500-3500 fresh talent every yearacross ICAI, B-Schools and select Agriculture and Law colleges, though the bulk of therecruitment would be from B-Schools. Salaries at MBA-level would range from Rs. 3lakhs to 12 lakhs depending on the institute and the candidates profile.
The firm is quite upfront about the opportunities and presents a clear picture of what isin store. Banking is not exactly a glamorous job, says Ram Kumar, Exectuive Director. It
http://www.careers360.com/news/4162-course-review-how-to-become-a-chartered-accountanthttp://www.careers360.com/news/4162-course-review-how-to-become-a-chartered-accountanthttp://www.careers360.com/news/7467-Industry-relevant-MBA-programmeshttp://www.careers360.com/news/7452-India-s-Top-B-Schools_Public-Privatehttp://www.careers360.com/news/4972-Interview-Amarjit-chopra-President-of-ICAIhttp://www.careers360.com/news/7615-after-10-2-legal-studyhttp://www.careers360.com/news/7537-how-to-select-a-bschoolhttp://www.careers360.com/news/4888-Make-a-career-in-Bankinghttp://www.careers360.com/news/4888-Make-a-career-in-Bankinghttp://www.careers360.com/news/7537-how-to-select-a-bschoolhttp://www.careers360.com/news/7615-after-10-2-legal-studyhttp://www.careers360.com/news/4972-Interview-Amarjit-chopra-President-of-ICAIhttp://www.careers360.com/news/7452-India-s-Top-B-Schools_Public-Privatehttp://www.careers360.com/news/7467-Industry-relevant-MBA-programmeshttp://www.careers360.com/news/4162-course-review-how-to-become-a-chartered-accountanthttp://www.careers360.com/news/4162-course-review-how-to-become-a-chartered-accountant7/28/2019 Icici Bank Project 11 (1)
13/48
demands meticulousness and demands in depth knowledge. So the company seeks outstudents who show the hunger for performance and are team players. The recruitmentprocess consists of an aptitude test, a group discussion, psychometric tests (which isoutsourced to SH, which is a UK-based business) and invariably several rounds ofinterviews. When we are selecting fresh talent passion shou ld be there, customer-orientation, conscience should be there. Dynamism, passion come first, compliance issecond, says Saurab Singh
Off-campus hiring/ direct hiring
The company also recruits people off- campus. Positions in middle management andspecialized functions like Law, Foreign Exchange and Technology Assessment arerecruited directly throughadvertisements, referrals and through Head Hunters. Massrecruitment at front office, executivesand Sales functions are done at national level.
Capital Strenght
ICICI Bank is India's second-largest bank with total assets of Rs. 4,736.47 billion (US$93 billion) at March 31, 2012 and profit after tax Rs. 64.65 billion (US$ 1,271 million) for
the year ended March 31, 2012. The Bank has a network of 3,100 branches and 10,486
ATMs in India, and has a presence in 19 countries, including India. . It is the second
largest bank in India by assets and third largest by market capitalization.
http://www.careers360.com/news/4885-Advisory-Student-exchange-programmeshttp://www.careers360.com/news/7774-career-advertisinghttp://www.careers360.com/news/3761-Front-Office-At-your-servicehttp://www.careers360.com/news/newsdetails.aspx?category=251&news_id=7111http://en.wikipedia.org/wiki/Market_capitalizationhttp://en.wikipedia.org/wiki/Market_capitalizationhttp://www.careers360.com/news/newsdetails.aspx?category=251&news_id=7111http://www.careers360.com/news/3761-Front-Office-At-your-servicehttp://www.careers360.com/news/7774-career-advertisinghttp://www.careers360.com/news/4885-Advisory-Student-exchange-programmes7/28/2019 Icici Bank Project 11 (1)
14/48
3
CONCEPTUAL ANALYSIS
2.3.1 CREATE ACCOUNTThis module is used by the user to create a new account to join services of online banking.
The user is required to fill in a few details and is automatically assigned as an user at the end
of process.
2.3.2 LOGIN
This module is used by all the users to log into the account. The user is required enter his/her
user name and password. After login user will be redirected to the users home page.
2.3.3 UPDATE PROFILE
Update profile module will be used to update or change any detail of user such as address,
phone number, city, state, etc.
2.3.4 PASSWORD RECOVERY
This module is used to recover the lost password by the user by entering his/her valid email
address. This email address will be matched from database and automatically generated
email will be sent to the user containing his/her user name and password.
2.3.5 VIEW PROFILE
This module is the automatically generated page when user clicks the view profile button.
This contain the user account detail such as name, account balance, email id, address, city.
2.3.6 ATM AND BANK LOCATOR
This module is used to find the address and location of ATM and banks in the selected city.
7/28/2019 Icici Bank Project 11 (1)
15/48
2.3.7 AMOUNT TRANSACTION
This module is the user view page after login where he/she can transfer the amount to other
account by providing the amount to be transferred and the account number where to be
transferred.
2.3.8 CONTACT FORM
This module is used by both registered and non-registered user to contact bank or to give any
feedback trough message. His/her message will be saved into the database and further bank
can contact him/her.
2.3.9 EMI AND LOAD INTEREST CALCULATOR
This module is used to calculate the interest amount of EMI and load by proving the interest
rate, total amount and duration.
2.3.10 DELETE ACCOUNT
This module is used to delete the users account by the confirmation of user.
2.3.11 LOGOUT
This module is used to logout from the users session and redirected to the home page of
website.
7/28/2019 Icici Bank Project 11 (1)
16/48
3. SYSTEM ANALYSIS
3.1 Functional requirement
3.1.1 System requirement:
3.1.2 Program requirement
The following are the most essential requirements for developing and hosting web applications:
(ii) Server-side Runtime Support - This includes support for network services and a runtime for
executing the applications.
(iii) Deployment SupportDeployment is the process of installing the application on the server.
Deployment could also include customizing the application.
3.1.3 Stability & speed
SPEED delivers unparalleled analysis into the latest developments in payments systems, realtime gross settlement, straight-through-processing, securities trading, risk management andbanking technology.
It is the essential source of information policymakers and market participants like you read tostay informed about the policy issues shaping settlements, payments, e-money and e-trading.
Few sources of information set out to analyse changes in the financial infrastructure as a whole.They stay in their silo. Yet increasingly what happens in one area has far reaching implicationsfor all others.
SPEED aims to help you track these developments not just at a national or global level, but as anintegrated whole.
3.2 Feasibility study
3.2.1 Operational
Now almost all Banks branches are connected through the online banking facilities. Thetransactions of a particular bank are transmitted through the Micro-Bank software from INFLEX
7/28/2019 Icici Bank Project 11 (1)
17/48
Solutions to the Head Office, where every data is stored in the database.Real-time On-line any branch banking for the clients is used to facilitate the clients to deposit /draw or remit funds to and from their accounts, from one bank to another.Meanwhile, for the Smooth operation and efficient functioning of the system they havecompleted the proper training to the related personnel
3.2.2 Technical
.NET Programming Framework
The .NET framework is a cluster of different technologies. It includes:
The .NET languages, which include C# and Visual Basic .NET, the object-oriented and
modernized successor to Visual Basic 6.0.
The Common Language Runtime (CLR), the .NET runtime engine that executes all .NETprograms, and provides modern services such as automatic memory management, security,
optimization, and garbage collection etc.
The .NET class library which collects thousands of pieces of pre-built functionality that you
can snap in to your applications. These are sometimes organized into technology sets, such
as ADO.NET (the technology for creating database applications) and Windows Forms (th
7/28/2019 Icici Bank Project 11 (1)
18/48
technology for creating desktop user interfaces)
7/28/2019 Icici Bank Project 11 (1)
19/48
Online Banking System Requirements
Bremer Bank recommends you download the most recent version of anyof the web browsers below, each of which supports 128-bit encryptionand HTML 4.0. If using a different browser than those listed, or a lowerversion, you may have difficulty using certain tools and functions inOnline Banking. In addition to using a supported browser, you mustenable JavaScript for optimal interaction with Online Banking. Pleasenote: Bremer Bank does not support beta versions of any browser.
Our Internet Banking is a full Internet based service which doesnot require you to download any additional software. To meet
our security standards your browser must support 128-bit SSLencryption. This page lists our recommended minimum
hardware, operating system and browser requirements toaccess Internet Banking.
Internet Banking
Eligibility
This Internet banking services is available to the following type of ICICI
Bank account holders:
Savings Account holders
Credit Card holders
Demat Account holders
Loan Account holders
Joint account holders can also apply for the ICICI bank internet banking
services by submitting the filled-up Internet Banking Form at any ICICI
Bank Branch.
4
ANALYSIS OF THE PROBLEM
Existing banking system is a manual system, which leads to a number of problems in
maintaining proper records. These are:
http://www.icicibank.com/Personal-Banking/insta-banking/internet-banking/pdf/net_registration_new.pdfhttp://www.icicibank.com/Personal-Banking/insta-banking/internet-banking/pdf/net_registration_new.pdf7/28/2019 Icici Bank Project 11 (1)
20/48
1. PAPER WORK: All the activities that are performed by Management involve a lot of paper
work involving register consultations and entries. A separate file has to be maintained for each
kind of activity and for different periods of time.
2. TIME CONSUMPTION: A lot of time is consumed in referencing the registers involved for
particular activities and a lot of computation as well as report verification activity is also paper
based and time consuming.
3. COMPLEXITY: Complexity of information handling and the gathering and determination of
information is usually the most difficult problem faced.
4. REDUNDANCY: Maintaining separate files for each department can lead to duplication of
data present in files. This can lead to:
a) Inconsistencies
b) Update anomalies
c) Decentralization problems
5. HUMAN ERRORS: Human kind of errors may be generated in typing errors and slow
arithmetic calculations, fatigue and boredom.
6. ILLEGAL ACCESS: The security of a lot of documents, which are paper, based if difficult
may be in terms of illegal access or manipulation by malicious personals either intentionally or
by accident.
7/28/2019 Icici Bank Project 11 (1)
21/48
7. DYNAMIC ENVIRONMENT: As the working environment is dynamic and company policies
change time and again, changing the way of working will be difficult.
2. General Description
2.1 Product function:
Track Account Level Data: In this module, check the authentication of users.
Service Level Agreements: It contains the agreements of providing the services related tousers.
User Contact Information: It maintains all the details (Personal, Official and Contact) of theusers.
Product Access Right Details: It maintains the information that does which user have therights of using which service.
Problem statement User
A problem statement is a concise description of the issues that need to be addressed by a problem
solving team and should be presented to them (or created by them) before they try to solve theproblem. When bringing together a team to achieve a particular purpose provide them with aproblem statement. A good problem statement should answer these questions:
1. What is the problem? This should explain why the team is needed.2. Who has the problem or who is the client/customer? This should explain who needs the
solution and who will decide the problem has been solved.3. What form can the resolution be? What is the scope and limitations (in time, money,
resources, technologies) that can be used to solve the problem? Does the client want awhite paper? A web-tool? A new feature for a product? A brainstormingon a topic?
The primary purpose of a problem statement is to focus the attention of the problem solvingteam. However, if the focus of the problem is too narrow or the scope of the solution too limitedthe creativity and innovation of the solution can be stifling.
7/28/2019 Icici Bank Project 11 (1)
22/48
In project management, the problem statement is part of the project charter. It lists what'sessential about the project and enables the project manager to identify the project scope as wellas the project stakeholders.
A research-worthy problem statement is the description of an active challenge (i.e. problem)faced by researchers and/or practitioners that does not have adequate solutions availableincluding the argumentation for its viability based on solid peer-reviewed sources as well astheoretical foundation. The research-worthy problem statement should address all six questions:what, how, where, when, why, and who. On the other hand, a statement of the problem is one ortwo sentences claim that outlines the problem that the study addresses. The statement of theproblem should briefly address the question: What is the problem that the research will address?
7/28/2019 Icici Bank Project 11 (1)
23/48
PREFACE
With the rapid globalization of the Indian economy, enterprises are facing with ever changingcompetitive environment. Enterprises are adopting strategies aimed at developing competitive
advantage based on enhanced customer value in terms of product differentiation, quality, speed,
service and costs. In the post liberalization era, with the deregulation of Indian economy, the
financial service sector witnessing a complete metamorphosis and technology is playing a very
significant role in this record. Over the last decade India has been one of the fastest adopters of
information technology, particularly because of its capability to provide software solution to
organizations around the world. This capability has provided a tremendous impetuous to the
domestic banking industry in India to deploy the latest in technology, particularly in the Internet
banking and e-commerce arenas. Banks are growing in size by mergers and acquisitions, which
have been driven by communication and technology. Technology is playing a major role in
increasing the efficiency, courtesy and speed of customer service. It is said to be the age of E-
banking. An Online Banking user is expected to perform at least one of the following
transactions online:
1. Checking account balance
2. Transaction
3. Paying bills
4. Transferring funds between accounts
5. Calculate EMI and Loan interests
From a banks perspective, using the Internet is more efficient than using other distribution
mediums because banks are looking for an increased customer base. Using multiple distribution
channels increases effective market coverage by enabling different products to be targeted at
7/28/2019 Icici Bank Project 11 (1)
24/48
different demographic segments. Also Banks cannot risk losing customers to competitors within
the aggressive competition in the banking industry around the world. Moreover Internet delivery
offers customized service to suit the needs and the likes of each user. Mass customization
happens effectively through Online Banking. It reduces cost and replaces time spent on routine
errands with spending time on business errands. Online Banking means less staff members,
smaller infrastructure demands, compared with other banking channels. From the customers
perspective, Online Banking provides a convenient and effective way to manage finances that is
easily accessible 24 hours a day, seven days a week. In addition information is up to date.
Nevertheless Online Banking has disadvantages for banks like how to work the technology, set-
up cost, legal issues, and lack of personal contact with customers. And for customers there are
security and privacy issues.
SYSTEM STUDY AND ANALISYS
SYSTEM ANALYSIS
System analysis is a process of gathering and interpreting facts, diagnosing problems and the
information to recommend improvements on the system. It is a problem solving activity that
requires intensive communication between the system users and system developers. Systemanalysis or study is an important phase of any system development process. The system is
studied to the minutest detail and analyzed. The system analyst plays the role of the interrogator
and dwells deep into the working of the present system. The system is viewed as a whole and the
input to the system are identified. The outputs from the organizations are traced to the various
processes. System analysis is concerned with becoming aware of the problem, identifying the
relevant and decisional variables, analyzing and synthesizing the various factors and determining
7/28/2019 Icici Bank Project 11 (1)
25/48
an optimal or at least a satisfactory solution or program of action.
A detailed study of the process must be made by various techniques like interviews,
questionnaires etc. The data collected by these sources must be scrutinized to arrive to a
conclusion. The conclusion is an understanding of how the system functions. This system is
called the existing system. Now the existing system is subjected to close study and problem areas
are identified. The designer now functions as a problem solver and tries to sort out the
difficulties that the enterprise faces. The solutions are given as proposals. The proposal is then
weighed with the existing system analytically and the best one is selected. The proposal is
presented to the user for an endorsement by the user. The proposal is reviewed on user request
and suitable changes are made. This is loop that ends as soon as the user is satisfied with
proposal.
Preliminary study is the process of gathering and interpreting facts, using the information for
further studies on the system. Preliminary study is problem solving activity that requires
intensive communication between the system users and system developers. It does various
feasibility studies. In these studies a rough figure of the system activities can be obtained, from
which the decision about the strategies to be followed for effective system study and analysis can
be taken.
EXISTING SYSTEM
In the existing system the transactions are done only manually but in proposed system we have tocomputerize all the banking transaction using the software Online Banking.
2. 1.1 PROBLEMS WITH EXISTING SYSTEM
Lack of security of data.
More man power.
Time consuming.
Consumes large volume of pare work.
Needs manual calculations.
No direct role for the higher officials.
Damage of machines due to lack of attention.
To avoid all these limitations and make the working more accurately the system needs to be
7/28/2019 Icici Bank Project 11 (1)
26/48
computerized.
PROPOSED SYSTEM
The aim of proposed system is to develop a system of improved facilities. The proposed system
can overcome all the limitations of the existing system. The system provides proper security and
reduces the manual work.
2. 2. 1 ADVANTAGES OF THE PROPOSED SYSTEM
The system is very simple in design and to implement. The system requires very low system
resources and the system will work in almost all configurations. It has got following features
Security of data.
Ensure data accuracy's.
Proper control of the higher officials.
Reduce the damages of the machines.
Minimize manual data entry.
Minimum time needed for the various processing.
Greater efficiency.
Better service. User friendliness and interactive.
Minimum time required.
2.3. FEASIBILITY STUDY
Feasibility study is made to see if the project on completion will serve the purpose of the
organization for the amount of work, effort and the time that spend on it. Feasibility study lets
the developer foresee the future of the project and the usefulness. A feasibility study of a system
proposal is according to its workability, which is the impact on the organization, ability to meet
their user needs and effective use of resources. Thus when a new application is proposed it
normally goes through a feasibility study before it is approved for development.
The document provide the feasibility of the project that is being designed and lists various areas
that were considered very carefully during the feasibility study of this project such as Technical,
Economic and Operational feasibilities. The following are its features:
7/28/2019 Icici Bank Project 11 (1)
27/48
TECHNICAL FEASIBILITY
The system must be evaluated from the technical point of view first. The assessment of this
feasibility must be based on an outline design of the system requirement in the terms of input,
output, programs and procedures. Having identified an outline system, the investigation must go
on to suggest the type of equipment, required method developing the system, of running the
system once it has been designed.
Technical issues raised during the investigation are:
Does the existing technology sufficient for the suggested one Can the system expand if
developed
The project should be developed such that the necessary functions and performance are achieved
within the constraints. The project is developed within latest technology. Through the technology
may become obsolete after some period of time, due to the fact that never version of same
software supports older versions, the system may still be used. So there are minimal constraints
involved with this project. The system has been developed using Java the project is technically
feasible for development.
ECONOMIC FEASIBILITY
The developing system must be justified by cost and benefit. Criteria to ensure that effort isconcentrated on project, which will give best, return at the earliest. One of the factors, which
affect the development of a new system, is the cost it would require.
The following are some of the important financial questions asked during preliminary
investigation:
The costs conduct a full system investigation.
The cost of the hardware and software.
The benefits in the form of reduced costs or fewer costly errors.
Since the system is developed as part of project work, there is no manual cost to spend for the
proposed system. Also all the resources are already available, it give an indication of the system
is economically possible for development.
7/28/2019 Icici Bank Project 11 (1)
28/48
2.3.3. BEHAVIORAL FEASIBILITY
This includes the following questions:
> Is there sufficient support for the users
> Will the proposed system cause harm
The project would be beneficial because it satisfies the objectives when developed and installed.
All behavioral aspects are considered carefully and conclude that the project is behaviorally
feasible.
SYSTEM DESIGN 3.1 INTRODUCTION
Design is the first step into the development phase for any engineered product or system. Design
is a creative process. A good design is the key to effective system. The term "design" is defined
as "the process of applying various techniques and principles for the purpose of defining a
process or a system in sufficient detail to permit its physical realization". It may be defined as a
process of applying various techniques and principles for the purpose of defining a device, a
process or a system in sufficient detail to permit its physical realization. Software design sits at
the technical kernel of the software engineering process and is applied regardless of the
development paradigm that is used. The system design develops the architectural detail required
to build a system or product. As in the case of any systematic approach, this software too has
undergone the best possible design phase fine tuning all efficiency, performance and accuracy
levels. The design phase is a transition from a user oriented document to a document to theprogrammers or database personnel. System design goes through two phases of development:
Logical and Physical Design.
LOGICAL DESIGN:
The logical flow of a system and define the boundaries of a system. It includes the following
steps:
Reviews the current physical system - its data flows, file content, volumes , frequencies etc.
Prepares output specifications - that is, determines the format, content and frequency of
reports.
Prepares input specifications - format, content and most of the input functions.
Prepares edit, security and control specifications.
Specifies the implementation plan.
Prepares a logical design walk through of the information flow, output, input, controls and
7/28/2019 Icici Bank Project 11 (1)
29/48
implementation plan.
Reviews benefits, costs, target dates and system constraints.
PHYSICAL DESIGN:
Physical system produces the working systems by define the design specifications that tell the
programmers exactly what the candidate system must do. It includes the following steps.
Design the physical system.
Specify input and output media.
Design the database and specify backup procedures.
Design physical information flow through the system and a physical design Walk through.
Plan system implementation.
Prepare a conversion schedule and target date.
Determine training procedures, courses and timetable.
Devise a test and implementation plan and specify any new hardware/software.
Update benefits , costs , conversion date and system constraints
Design/Specification activities:
Concept formulation.
Problem understanding.
High level requirements proposals. Feasibility study.
Requirements engineering.
Architectural design.
MODULE DESIGN Admin
The Administrator logs in using the admin login. In this module two operations are done. During
login the Login and Password is verified with that in the database
INPUT DESIGN
The design of input focuses on controlling the amount of input required, controlling the errors,
avoiding delay, avoiding extra steps and keeping the process simple. The input is designed in
7/28/2019 Icici Bank Project 11 (1)
30/48
such a way so that it provides security and ease of use with retaining the privacy. Input Design
considered the following things:
o What data should be given as input
o How the data should be arranged or coded
o The dialog to guide the operating personnel in providing input.
o Methods for preparing input validations and steps to follow when error occur.
OBJECTIVES
Input Design is the process of converting a user-oriented description of the input into a
computer-based system. This design is important to avoid errors in the data input process and
show the correct direction to the management for getting correct information from the
computerized system.
It is achieved by creating user-friendly screens for the data entry to handle large volume of data.
The goal of designing input is to make data entry easier and to be free from errors. The data entry
screen is designed in such a way that all the data manipulates can be performed. It also provides
record viewing facilities.
When the data is entered it will check for its validity. Data can be entered with the help of
screens. Appropriate messages are provided as when needed so that the user will not be in a
maize of instant. Thus the objective of input design is to create an input layout that is easy to
follow
OUTPUT DESIGN
A quality output is one, which meets the requirements of the end user and presents the
information clearly. In output design it is determined how the information is to be displaced for
immediate need and also the hard copy output. It is the most important and direct source
information to the user. Efficient and intelligent output design improves the system's relationship
to help user decision-making.
7/28/2019 Icici Bank Project 11 (1)
31/48
Designing computer output should proceed in an organized, well thought out manner; the right
output must be developed while ensuring that each output element is designed so that people will
find the system can use easily and effectively. When analysis design computer output, they
should :
Identify the specific output that is needed to meet the requirements.
Select methods for presenting information.
Create document, report, or other formats that contain information produced by the system.
3.3 DATABASE DESIGN
A database is an organized mechanism that has the capability of storing information through
which a user can retrieve stored information in an effective and efficient manner. The data is the
purpose of any database and must be protected.
The database design is a two level process. In the first step, user requirements are gathered
together and a database is designed which will meet these requirements as clearly as possible.
This step is called Information Level Design and it is taken independent of any individual
DBMS.In the second step, this Information level design is transferred into a design for the specific
DBMS that will be used to implement the system in question. This step is called Physical Level
Design, concerned with the characteristics of the specific DBMS that will be used. A database
design runs parallel with the system design. The organization of the data in the database is aimed
to achieve the following two major objectives.
Data Integrity
Data independence
Normalization is the process of decomposing the attributes in an application, which results in a
set of tables with very simple structure. The purpose of normalization is to make tables as simple
as possible. Normalization is carried out in this system for the following reasons.
To structure the data so that there is no repetition of data , this helps in saving.
To permit simple retrieval of data in response to query and report request.
7/28/2019 Icici Bank Project 11 (1)
32/48
To simplify the maintenance of the data through updates, insertions, deletions.
To reduce the need to restructure or reorganize data which new application requirements
arise.
RELATIONAL DATABASE MANAGEMENT SYSTEM (RDBMS):
A relational model represents the database as a collection of relations. Each relation resembles a
table of values or file of records. In formal relational model terminology, a row is called a tuple,
a column header is called an attribute and the table is called a relation. A relational database
consists of a collection of tables, each of which is assigned a unique name. A row in a tale
represents a set of related values.
RELATIONS, DOMAINS & ATTRIBUTES:
A table is a relation. The rows in a table are called tuples. A tuple is an ordered set of n elements.
Columns are referred to as attributes. Relationships have been set between every table in the
database. This ensures both Referential and Entity Relationship Integrity. A domain D is a set of
atomic values. A common method of specifying a domain is to specify a data type from which
the data values forming the domain are drawn. It is also useful to specify a name for the domainto help in interpreting its values. Every value in a relation is atomic, that is not decomposable.
RELATIONSHIPS:
Table relationships are established using Key. The two main keys of prime importance are
Primary Key & Foreign Key. Entity Integrity and Referential Integrity Relationships can be
established with these keys.Entity Integrity enforces that no Primary Key can have null
values.Referential Integrity enforces that no Primary Key can have null values. Referential
Integrity for each distinct Foreign Key value, there must exist a matching Primary Key value in
the same domain. Other key are Super Key and Candidate Keys. Relationships have been set
between every table in the database. This ensures both Referential and Entity Relationship
Integrity.
NORMALIZATION:
7/28/2019 Icici Bank Project 11 (1)
33/48
As the name implies, it denoted putting things in the normal form. The application developer via
normalization tries to achieve a sensible organization of data into proper tables and columns and
where names can be easily correlated to the data by the user. Normalization eliminates repeating
groups at data and thereby avoids data redundancy which proves to be a great burden on the
computer resources. These includes:
Normalize the data.
Choose proper names for the tables and columns.
Choose the proper name for the data.
First Normal Form:
The First Normal Form states that the domain of an attribute must include only atomic values
and that the value of any attribute in a tuple must be a single value from the domain of that
attribute. In other words 1NF disallows "relations within relations" or "relations as attribute
values within tuples". The only attribute values permitted by 1NF are single atomic or indivisible
values.
The first step is to put the data into First Normal Form. This can be donor by moving data into
separate tables where the data is of similar type in each table. Each table is given a Primary Keyor Foreign Key as per requirement of the project. In this we form new relations for each
nonatomic attribute or nested relation. This eliminated repeating groups of data.
A relation is said to be in first normal form if only if it satisfies the constraints that contain the
primary key only.
Second Normal Form:
According to Second Normal Form, For relations where primary key contains multiple attributes,
no nonkey attribute should be functionally dependent on a part of the primary key.
In this we decompose and setup a new relation for each partial key with its dependent attributes.
Make sure to keep a relation with the original primary key and any attributes that are fully
7/28/2019 Icici Bank Project 11 (1)
34/48
functionally dependent on it. This step helps in taking out data that is only dependant on apart of
the key.
A relation is said to be in second normal form if and only if it satisfies all the first normal form
conditions for the primary key and every non-primary key attributes of the relation is fully
dependent on its primary key alone. Third Normal Form:
According to Third Normal Form, Relation should not have a nonkey attribute functionally
determined by another nonkey attribute or by a set of nonkey attributes. That is, there should be
no transitive dependency on the primary key.
In this we decompose and set up relation that includes the nonkey attributes that functionally
determines other nonkey attributes. This step is taken to get rid of anything that does not depend
entirely on the Primary Key.
A relation is said to be in third normal form if only if it is in second normal form and more over
the non key attributes of the relation should not be depend on other non key attribute.
5.2 SYSTEM IMPLEMENTATION AND TESTING
Implementation is the stage of the project where the theoretical design is turned into a working
system. It can be considered to be the most crucial stage in achieving a successful new system
gaining the users confidence that the new system will work and will be effective and accurate. It
is primarily concerned with user training and documentation. Conversion usually takes place
about the same time the user is being trained or later. Implementation simply means convening a
new system design into operation, which is the process of converting a new revised system
design into an operational one.
INTEGRATION TESTING
Integration testing is systematic technique for constructing the program structure while at the
7/28/2019 Icici Bank Project 11 (1)
35/48
same time conducting tests to uncover errors associated with interfacing. The objective is to take
unit tested components and build a program structure that has been dictated by design. The entire
program is tested as whole. Correction is difficult because isolation of causes is complicated by
vast expanse of entire program. Once these errors are corrected, new ones appear and the process
continues in a seemingly endless loop.
After unit testing in Sell-Soft System all the modules were integrated to test for any
inconsistencies in the interfaces. Moreover differences in program structures were removed and a
unique program structure was evolved.
VALIDATION TESTING OR SYSTEM TESTING
This is the final step in testing. In this the entire system was tested as a whole with all forms,
code, modules and class modules. This form of testing is popularly known as Black Box testing
or System testing.
Black Box testing method focuses on the functional requirements of the software. That is, Black
Box testing enables the software engineer to derive sets of input conditions that will fully
exercise all functional requirements for a program.
Black Box testing attempts to find errors in the following categories; incorrect or missingfunctions, interface errors, errors in data structures or external data access, performance errors
and initialization errors and termination errors.
OUTPUT TESTING OR USER ACCEPTANCE TESTING
The system considered is tested for user acceptance; here it should satisfy the firm's need. The
software should keep in touch with perspective system; user at the time of developing and
making changes whenever required. This done with respect to the following points
Input Screen Designs,
Output Screen Designs,
Online message to guide the user and the like.
The above testing is done taking various kinds of test data. Preparation of test data plays a vital
7/28/2019 Icici Bank Project 11 (1)
36/48
role in the system testing. After preparing the test data, the system under study is tested using
that test data. While testing the system by which test data errors are again uncovered and
corrected by using above testing steps and corrections are also noted for future use.
5.3. TRAINING
Once the system is successfully developed the next important step is to ensure that the
administrators are well trained to handle the system. This is because the success of a system
invariably depends on how they are operated and used. The implementation depends upon the
right people being at the right place at the right time. Education involves creating the right
atmosphere and motivating the user. The administrators are familiarized with the run procedures
of the system, working through the sequence of activities on an ongoing basis.
Implementation is the state in the project where the theoretical design is turned into a working
system. By this, the users get the confidence that the system will work effectively. The system
can be implemented only after through testing.
The systems personnel check the feasibility of the system. The actual data were inputted to the
system and the working of the system was closely monitored. The master option was selected
from the main menu and the actual data were input through the corresponding input screens. Thedata movement was studied and found to be correct queries option was then selected and this
contains various reports. Utilities provide various data needed for inventory was input and the
module was test run. Satisfactory results were obtained. Reports related to these processes were
also successfully generated. Various input screen formats are listed in the appendix.
Implementation walkthroughs ensure that the completed system actually solves the original
problem. This walkthrough occurs just before the system goes into use, and it should include
careful review of all manuals, training materials and system documentation. Again, users, the
analyst and the members of the computer services staff may attend this meeting.
CONCLUSION
Using "Online Banking " , customers can access their bank accounts in order to make cash
withdrawals (or credit card cash advances) and check their account balances as well as
7/28/2019 Icici Bank Project 11 (1)
37/48
purchasing mobile cell phone prepaid credit. In this the customer is identified by inserting a
plastic ATM card with a magnetic stripe or a plastic smartcard with a chip, that contains a unique
card number and some security information, such as an expiration date or CVC (CVV). Security
is provided by the customer entering a personal identification number (PIN).
6
BIBLIOGRAPHY
BOOKS:
1. Charles Hampfed (2000) 'Visual Basic' University of Toronto
2. Herbert Schildt (2000) 'Visual Basic 6.0' Tata McGraw Hill3. John Zukowski (2000) 'Visual Basic 6.0' 'BPB Publications
4. Jamie Jaworsky 'Visual Basic 6.0'Techmedia
5. Stefen Denninger 'Visual Basic 6.0'Author's Press
6. Ian Somerville 'Software engineering'
7. Rajeev mall 'Software engineering'
8. Elmasri Navathe 'Fundamentals of database systems'
Internet banking is a product of e-commerce in the field of banking and financial services. In
what can be described as business to customer domain for banking industry, Internet banking
offers different online services like balance enquiry, balance transfer, opening account, calculate
EMIs etc. Mostly, these are traditional services offered through internet as a new delivery
channel. Banks are also offering payment services on the behalf of their customers who shop in
different e-shops, e-malls etc. Further, different banks have different levels of such services
offered, starting from level-1 where only information is disseminated through internet to level-3
where online transactions are put through.
1.1 PURPOSE OF THE SYSTEM
7/28/2019 Icici Bank Project 11 (1)
38/48
1. SECURITY: There is a lot of security of data on this content management system. One
cannot open our system without knowing the password. Immediately after opening login screen
will appear on screen. Only after entering the correct username and password user can operate
our system.
2. REFERENTIAL INTEGRITY: User cannot change the date in the transaction files.
Addition of data can be done only on the master files date in transaction files cannot be entered
until addition is done on the master files.
3. EASY RETRIEVAL OF DATA: Data is retrieved easily and quick using sql commands. On
line commands are used to retrieve huge amount of data.
4. GENERATION OF AUTOMATIC VALUES: In project in some screen some fields
generated automatically like Profile detail, Account number, etc.
OVERVIEW OF PROPOSED SYSTEM
1. MENU DRIVEN:
The project uses menu throughout which we can choose required options. Menus are self-
explanatory, as they are very easy to use and user can go to any other web page using the menu.
2. USER CONFIRMATION:
Whenever the user tries to delete or edit the data, the system asks for the confirmation. This is
used to avoid the accidental changes to the database. A confirmation is also provided for the exitof the application.
3. GRAPHICAL USER INTERFACE:
7/28/2019 Icici Bank Project 11 (1)
39/48
User is provided with a graphical interface in which user can select from various options and can
perform desired operations with perfect understanding of the menu selected.
4. MULTIPLE DOCUMENT INTERFACE:
The package provides a multiple document interface to the user. The user can view more than
one entry form or pages at the same time.
5. SECURITY AND ACCESS: A password form has been provided at the beginning of the
package. Entering the correct password will take user to the main user page
3
CONCEPTUAL ANALYSIS
2.3.1 CREATE ACCOUNT
This module is used by the user to create a new account to join services of online banking.
The user is required to fill in a few details and is automatically assigned as an user at the end
of process.
2.3.2 LOGIN
This module is used by all the users to log into the account. The user is required enter his/her
user name and password. After login user will be redirected to the users home page.
2.3.3 UPDATE PROFILE
Update profile module will be used to update or change any detail of user such as address,phone number, city, state, etc.
2.3.4 PASSWORD RECOVERY
7/28/2019 Icici Bank Project 11 (1)
40/48
This module is used to recover the lost password by the user by entering his/her valid email
address. This email address will be matched from database and automatically generated
email will be sent to the user containing his/her user name and password.
2.3.5 VIEW PROFILE
This module is the automatically generated page when user clicks the view profile button.
This contain the user account detail such as name, account balance, email id, address, city.
2.3.6 ATM AND BANK LOCATOR
This module is used to find the address and location of ATM and banks in the selected city.
2.3.7 AMOUNT TRANSACTION
This module is the user view page after login where he/she can transfer the amount to other
account by providing the amount to be transferred and the account number where to be
transferred.
2.3.8 CONTACT FORM
This module is used by both registered and non-registered user to contact bank or to give any
feedback trough message. His/her message will be saved into the database and further bank
can contact him/her.
2.3.9 EMI AND LOAD INTEREST CALCULATOR
This module is used to calculate the interest amount of EMI and load by proving the interest
rate, total amount and duration.
7/28/2019 Icici Bank Project 11 (1)
41/48
2.3.10 DELETE ACCOUNT
This module is used to delete the users account by the confirmation of user.
2.3.11 LOGOUT
6. Performance requirement
The completion of a system is achieved only after it has been thoroughly tested. Though
this gives a feel the project is completed, there cannot be any project without going through this
stage. Hence in this stage it is decided whether the project can undergo the real time environment
execution without any break downs, therefore a package can be rejected even at this stage.
6.1 SYSTEM TESTING
Testing is a set of activities that can be planned in advance and conducted systematically. The
proposed system is tested in parallel with the software that consists of its own phases of analysis,
implementation, testing and maintenance. Following are the tests conducted on the system.
6.2 UNIT TESTING
During the implementation of the system each module of the system was tested separately to
uncover errors with in its boundaries. User interface was used as a guide in the process.
6.3 MODULE TESTING
7/28/2019 Icici Bank Project 11 (1)
42/48
A module is composed of various programs related to that module. Module testing is done to
check the module functionality and interaction between units within a module.
It checks the functionality of each program with relation to other programs within the same
module. It then tests the overall functionality of each module.
6.4 INTEGRATION TESTING
Integration testing is a systematic technique for constructing the program structure while
conducting tests to uncover errors associated with interfacing. The objective is to take unit-tested
module and build a program structure that has been dictated by design.
6.5 ACCEPTANCE TESTING
The software has been tested with the realistic data given by the client and produced fruitful
results. The client satisfying all the requirements specified by them has also developed the
software within the time limitation specified. A demonstration has been given to the client and
the end-user giving all the operational features.
7. Non functional attributes
7.1 Security
7/28/2019 Icici Bank Project 11 (1)
43/48
Event management is the application of project management to the creation and development
of festivals, events ,extra vagenga and conferences.
Event management involves studying the intricacies of the brand, identifying the target audience,
devising the event concept, planning the logistics and coordinating the technical aspects before
actually executing the modalities of the proposed event. Post-event analysis and ensuring a returnon investment have become significant drivers for the event industry.
The recent growth of festivals and events as an industry around the world means that the
management can no longer be ad hoc. Events and festivals, such as the Asian Games, have a
large impact on their communities and, in some cases, the whole country.
The industry now includes events of all sizes from the Olympics down to a breakfast meeting for
ten business people. Many industries, charitable organization and interest groups will hold events
of some size in order to market themselves, build business relationships, raise money orcelebrate.
7.2 Reliability
Internet banking renders location and time irrelevant, and empowers customers with greatercontrol of their accounts. Banks achieve cost and efficiency gains in a large number ofoperational areas. This paper addresses the aspects of reliability and accessibility from a banking
enterprise point of view and puts forth present day solutions to problems involving these issues.An Indian perspective of Internet banking is also looked at in order to gaining a betterperspective regarding the situation.
7.3 Maintainability
The aptitude of a system to undergo repair and evolution.
(1) The ease with which a software system or component can be modified to correctfaults, improve performance or other attributes, or adapt to a changed environment.
(2) The ease with which a hardware system or component can be retained in, or restoredto, a state in which it can perform its required functions. [IEEE Std. 610.12]
7.4 Portability
Portability in high-level computer programming is the usability of the same software in differentenvironments. The prerequirement for portability is the generalized abstractionbetween the
http://en.wikipedia.org/wiki/High-level_programming_languagehttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Abstraction_(computer_science)http://en.wikipedia.org/wiki/Abstraction_(computer_science)http://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/High-level_programming_language7/28/2019 Icici Bank Project 11 (1)
44/48
application logic and system interfaces. When software with the same functionality is producedfor several computing platforms, portability is the key issue for development cost reduction.
7.5 Reusability
In computer science and software engineering, reusability is the likelihood a segment of sourcecode that can be used again to add new functionalities with slight or no modification. Reusablemodules and classes reduce implementation time, increase the likelihood that prior testing anduse has eliminated bugs and localizes code modifications when a change in implementation isrequired.
Subroutines orfunctions are the simplest form of reuse. A chunk of code is regularly organizedusing modules ornamespaces into layers. Proponents claim that objects and offer a moreadvanced form of reusability, although it has been tough to objectively measure and define levelsor scores of reusability.
The ability to reuse relies in an essential way on the ability to build larger things from smaller
parts, and being able to identify commonalities among those parts. Reusability is often a requiredcharacteristic ofplatform software. Reusability brings several aspects to softwaredevelopment that do not need to be considered when reusability is not required.
Reusability implies some explicit managementofbuild, packaging, distribution, installation, configuration, deployment, maintenance and upgrade issues. If these issues are not considered, software may appear to be reusablefrom designpoint of view, but will not be reused in practice.
Software reusability more specifically refers to design features of a software element (orcollection of software elements) that enhance its suitability for reuse.
7.6 Resource utilization
A supply chain network uses resources of various kinds: manufacturing resources (machines,
material handlers, tools, etc.); storage resources (warehouses, automated storage and retrieval
systems); logistics resources (trucks, rail transport, air-cargo carriers, etc.); human resources
(labor, scientific and technical personnel); and financial (working capital, stocks, etc.). The
objective is to utilize these assets or resources efficiently so as to maximize customer service
levels, minimize lead times, and optimize inventory levels.
7.7 Stable and speed efficiency
The implementation is the final and important phase. It involves User training, system testing
and successful running of the developed system. The users test the developed system when
http://en.wikipedia.org/wiki/Interface_(computer_science)http://en.wikipedia.org/wiki/Computing_platformhttp://en.wikipedia.org/wiki/Computer_sciencehttp://en.wikipedia.org/wiki/Software_engineeringhttp://en.wikipedia.org/wiki/Subroutinehttp://en.wikipedia.org/wiki/Function_(programming)http://en.wikipedia.org/wiki/Module_(programming)http://en.wikipedia.org/wiki/Namespace_(computer_science)http://en.wikipedia.org/wiki/Layer_(HTML_tag)http://en.wikipedia.org/wiki/Object_(computer_science)http://en.wikipedia.org/wiki/Commonalityhttp://en.wikipedia.org/wiki/Platform_(computing)http://en.wikipedia.org/wiki/Software_developmenthttp://en.wikipedia.org/wiki/Software_developmenthttp://en.wikipedia.org/wiki/Software_buildhttp://en.wikipedia.org/wiki/Packaginghttp://en.wikipedia.org/wiki/Distribution_(business)http://en.wikipedia.org/wiki/Installation_(computer_programs)http://en.wikipedia.org/wiki/Computer_configurationhttp://en.wikipedia.org/wiki/Software_deploymenthttp://en.wikipedia.org/wiki/Software_maintenancehttp://en.wikipedia.org/wiki/Upgradehttp://en.wikipedia.org/wiki/Upgradehttp://en.wikipedia.org/wiki/Software_designhttp://en.wikipedia.org/wiki/Software_designhttp://en.wikipedia.org/wiki/Upgradehttp://en.wikipedia.org/wiki/Upgradehttp://en.wikipedia.org/wiki/Software_maintenancehttp://en.wikipedia.org/wiki/Software_deploymenthttp://en.wikipedia.org/wiki/Computer_configurationhttp://en.wikipedia.org/wiki/Installation_(computer_programs)http://en.wikipedia.org/wiki/Distribution_(business)http://en.wikipedia.org/wiki/Packaginghttp://en.wikipedia.org/wiki/Software_buildhttp://en.wikipedia.org/wiki/Software_developmenthttp://en.wikipedia.org/wiki/Software_developmenthttp://en.wikipedia.org/wiki/Platform_(computing)http://en.wikipedia.org/wiki/Commonalityhttp://en.wikipedia.org/wiki/Object_(computer_science)http://en.wikipedia.org/wiki/Layer_(HTML_tag)http://en.wikipedia.org/wiki/Namespace_(computer_science)http://en.wikipedia.org/wiki/Module_(programming)http://en.wikipedia.org/wiki/Function_(programming)http://en.wikipedia.org/wiki/Subroutinehttp://en.wikipedia.org/wiki/Software_engineeringhttp://en.wikipedia.org/wiki/Computer_sciencehttp://en.wikipedia.org/wiki/Computing_platformhttp://en.wikipedia.org/wiki/Interface_(computer_science)7/28/2019 Icici Bank Project 11 (1)
45/48
changes are made according to the needs. The testing phase involves the testing of the developed
system using various kinds of data. An elaborate testing of data is prepared and system is tested
using the tests data.
Implementation is the stage where theoretical design turned into a working system.
Implementation is planned carefully to propose system to avoid unanticipated problems. Manypreparations involved before and during the implementation of proposed system. The system
needed to be plugged in to the organizations network then it could be accessed from anywhere,
after a user logins into the portal. The tasks that had to be done to implement the system were to
create the database tables in the organization database domain. Then the administrator was
granted his role so that the system could be accessed.
The next phase in the implementation was to educate the system. A demonstration of all the
functions that can be carried out by the system was given to examination department person, who
will make extensive use of the system.
8.Security
8.1 Description
Event management is the application of project management to the creation and development
of festivals, events ,extra vagenga and conferences.
Event management involves studying the intricacies of the brand, identifying the target audience,
devising the event concept, planning the logistics and coordinating the technical aspects before
actually executing the modalities of the proposed event. Post-event analysis and ensuring a returnon investment have become significant drivers for the event industry.
The recent growth of festivals and events as an industry around the world means that the
management can no longer be ad hoc. Events and festivals, such as the Asian Games, have a
large impact on their communities and, in some cases, the whole country.
7/28/2019 Icici Bank Project 11 (1)
46/48
The industry now includes events of all sizes from the Olympics down to a breakfast meeting for
ten business people. Many industries, charitable organization and interest groups will hold events
of some size in order to market themselves, build business relationships, raise money or
celebrate.
8.2 Technical issues
Software companies service event planners with a complete Tool, Hotel Booking Tool,
Travel Booking Tool, Budgeting Tool etc.
As far as the technical issues related to this project from security point of view, there is
no chance of steal the data until either we want or if there is any problem in the coding
section.
8.3 Cost and schedule
Merely we think of the cost estimation on the basis of the following points:
Static IP for WEB ---- null
Paper work & reports ---- Rs.400
Labour costs ---- null
Other expenses ---- Rs. 50
Now looking at the time limit of 15 days and working for 2 hours and work to do we can
divide our work in following parts and complete it.
8.4 Risk
Risk is the term applied to a logical and semantic method of establishing the context,
identifying, analyzing, evaluating, treating, monitoring and communicating risks associated with
any activity, function or process in a way that will enable organizations to maximize
losses and minimize opportunities.
7/28/2019 Icici Bank Project 11 (1)
47/48
The complete RISK ANALYSIS is given below in the table :-
S.NO. RISK ITEMS. RISK MANAGEMENT TECHNIQUES.
1. Personnel
Shortfalls
Team comprises of the persons who are ignorant or novice in the
security issues and also in the technology that we are going to use
for the implementation of the same.
2. Unrealistic
Schedule and
Budget
The term/ time span allotted is very short, quite insufficient and the
things are really next to impossible to be in such a short span of
time, with the same working hours per day.
3. Developing the
wrong s/w
functions
Mission Analysis is strong but what if a person or more gets
diverted from.
4. User interface For the user interface developed , even after getting it sanctioned
from the opposite side if it denies to accept the existing user
interface.
5. Continuation
stream of
requirementchanges.
What if the user side even after signing the contract are
continuously asking for the changes and modification an undue
problem would be there in the development of the software andundue time would be utilized for the same which can ultimately
result in a delay in the project.
Risk may occur with the WEB is
Internet speed Proper security and communication for password and premium
submission.
We have to take certain important measures to not face these risks to occur.
7/28/2019 Icici Bank Project 11 (1)
48/48
Top Related