0% found this document useful (0 votes)
51 views

Project Title: Anti Phishing - The Fraud Detection In: Online Banking

The document describes a system to detect phishing in online banking by authenticating web applications using an encrypted cipher key. The key is used to identify fraudulent websites to protect sensitive user information. Authenticated users are authorized based on their role and can access services like transactions. The three-tier architecture system checks if users exist in the database and provides role-based services. Hardware requirements include an Intel Pentium III processor or above with 512MB of RAM or more. The recommended software includes Windows XP or later, ASP.NET, SQL Server for the backend, and a front-end framework.

Uploaded by

Rajesh Insb
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views

Project Title: Anti Phishing - The Fraud Detection In: Online Banking

The document describes a system to detect phishing in online banking by authenticating web applications using an encrypted cipher key. The key is used to identify fraudulent websites to protect sensitive user information. Authenticated users are authorized based on their role and can access services like transactions. The three-tier architecture system checks if users exist in the database and provides role-based services. Hardware requirements include an Intel Pentium III processor or above with 512MB of RAM or more. The recommended software includes Windows XP or later, ASP.NET, SQL Server for the backend, and a front-end framework.

Uploaded by

Rajesh Insb
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
You are on page 1/ 2

ABSTRACT

Project Title: Anti Phishing The Fraud Detection in Online Banking Description:
The objective of the system is to find whether the web application is a genuine one or not. This is done by authenticating the web application by using a cipher key, which can be obtained by implementing standard encryption algorithm. This cipher key is used to identify the fraud web application to avoid misuse of the sensitive information. After authenticating the web application the authorized users will be allowed to access the application to get various services and provide information that includes transactions like inserting, modifying and deleting records, which vary with different kind of the users in a role based web application. The system will check the users existence in the database and provide the set of services with respect to the role of the user. The application is based on three tier architecture. The cipher key obtained will help to find the fraud application. The business logic helps in authenticating the application, authorizing the users and providing services. The technologies are chosen by keeping the compatibility and performance as the constraints for the application .

SOFTWARE AND HARDWARE SPECIFICATIONS Hardware: Processor Ram Cache !


!

"ntel #entium """ or Above $%& '( or more %)$ *(

Hard disk

)& +( hard disk recommended for primary partition.

Software: O era ti!" s#stem Fro!t E!d Software $ack E!d Software ! : ! ,indows -# or later A.#./0T 123 ./0T4 .56 .erver $77%

You might also like