Amit Mahato
Amit Mahato
BY
AMIT MAHATO
(ROLL NUMBER)
DEHRADUN – 248007
2021-2024
ON
Mr. XXXXXXXX
DEHRADUN – 248007
2021-2024
Amit
● Introduction.
● Project Description.
● Analysis
●Feasibility Study.
● Design Documents.
●E-R Diagram.
Introduction
This project is designed so as to be used by Car Rental Company specializing in renting cars
to customers. It is an online system through which customers can view available cars,
register, view profile and book car.
The advancement in Information Technology and internet penetration has greatly enhanced
various business processes and communication between companies (services provider) and
their customers of which car rental industry is not left out. This E-Car Rental System is
developed to provide the following services:
● Enhance Business Processes: To be able to use internet technology to project the rental
company to the global world instead of limiting their services to their local domain alone,
thus increase their return on investment (ROI).
● Online Vehicle Reservation: A tools through which customers can reserve available cars
transaction and used same to offer better and improve services to them.
● Group bookings: Allows the customer to book space for a group in the case of weddings
Problem Statement
A car rental is a vehicle that can be used temporarily for a fee during a specified period.
Getting a rental car helps people get around despite the fact they do not have access to their
own personal vehicle or don't own a vehicle at all. The individual who needs a car must
contact a rental car company and contract out for a vehicle. This system increases customer
retention and simplify vehicle and staff management.
● To produce a web-based system that allow customer to register and reserve car online and
Scope
This project traverses a lot of areas ranging from business concept to computing field, and
required to perform several researches to be able to achieve the project objectives. The area
covers include:
● Car rental industry: This includes study on how the car rental business is being done,
● General customers as well as the company’s staff will be able to use the system
effectively.
● Web-platform means that the system will be available for access 24/7 except when there
A car rental is a vehicle that can be used temporarily for a period of time with a fee. Renting
a car assists people to get around even when they do not have access to their own personal
vehicle or don't own a vehicle at all. The individual who want to rent a car must first contact
the car rental company for the desire vehicle. This can be done online. At this point, this
person has to supply some information such as; dates of rental, and type of car. After these
details are worked out, the individual renting the car must present a valid Identification Card.
Most companies throughout the industry make a profit based of the type of cars that are
rented. The rental cars are categorized into economy, compact, compact premium, premium
and luxury. And customers are free to choose any car of their choice based on their purse and
availability of such car at the time of reservation.
Benefits of Online Car Rental Services
● This online car rental system helps in back office administration by streamlining and
● Eco-friendly: The monitoring of the vehicle activity and the overall business becomes
customers.
Functional Requirements
Requirement analysis is a software engineering technique that is composed of the various
tasks that determine the needs or conditions that are to be met for a new or altered product,
taking into consideration the possible conflicting requirements of the various users.
Functional requirements are those requirements that are used to illustrate the internal working
nature of the system, the description of the system, and explanation of each subsystem. It
consists of what task the system should perform, the processes involved, which data should
the system holds and the interfaces with the user. The functional requirements identified are:
a. Customer’s registration: The system should allow new users to register online and
generate membership card.
b. Online reservation of cars: Customers should be able to use the system to make booking
and online reservation.
c. Automatic update to database once reservation is made or new customer registered:
Whenever there’s new reservation or new registration, the system should be able update
the database without any additional efforts from the admin.
d. Feedbacks to customers: It should provide means for customers to leave feedback.
Non-Functional Requirements
It describes aspects of the system that are concerned with how the system provides the
functional requirements. They are:
a. Security: The subsystem should provide a high level of security and integrity of the data
held by the system, only authorized personnel of the company can gain access to the
company’s secured page on the system; and only users with valid password and username
can login to view user’s page.
b. Performance and Response time: The system should have high performance rate when
executing user’s input and should be able to provide feedback or response within a short
time span usually 50 seconds for highly complicated task and 20 to 25 seconds for less
complicated task.
c. Error handling: Error should be considerably minimized and an appropriate error message
that guides the user to recover from an error should be provided. Validation of user’s
input is highly essential. Also the standard time taken to recover from an error should be
15 to 20 seconds.
d. Availability: This system should always be available for access at 24 hours, 7 days a
week. Also in the occurrence of any major system malfunctioning, the system should be
available in 1 to 2 working days, so that the business process is not severely affected.
e. Ease of use: Considered the level of knowledge possessed by the users of this system, a
simple but quality user interface should be developed to make it easy to understand and
required less training.
DATA FLOW DIAGRAMS
A Data Flow Diagram (DFD) is a graphical representation that depicts the information flow
and the transforms that are applied as data moves from input to output.
CAR RESERVED
NEW
REGISTRATION ADD
ONLINE CAR CUSTOMER CAR
CUSTOMER RENTAL RENTAL
COMPANY
LOGIN REQUEST
. SYSTEM TRANSACTION
REPORTS
AUTHENTICATIO
N
REGISTRATION CONFIRMATION
In this diagram, Customer and Car Rental Company are the two entity sets.
Functions of Customer:
● New Registration
● Login Request
● Add Customer
LOGIN
DETAILS
SIGNED IN STAFF
REGISTER AS
NEW MEMBER
CUSTOMER CUSTOMER DB
REPORT STAFF DB
CHOOSE PROCES REPORT
CAR SRENTAL VIEW
REPORT SIGNED IN
CAR DB REPORT
CAR
RESERVED
FEEDBACK CAR DB
Update car This use case is used by the staff to edit and modify
details car details whenever there is new renewal (insurance,
road tax). It allows the company to keep up-to-date
record of their fleet.
Process rental This use case described the event by which staff
updates the system when customer pick up or when
returning car.
Add new staff This use case describes the event by which Admin
add new staff detail to the company's staff database.
Process rental
<<extend>>
Return car
Reply to
customer's
Give feedback/ feedback
comments
Admin
View report
Member Registration
Customer E-Car Rental System
Star
t
Enter details
[Yes]
Confirm and
submit
Display customer's
welcome screen
Send email
confirmation
End
[No]
Login Valid?
Modify your
profile
Update database
Send confirmation
notification
Log out
End
Reservation of Car
Customer E-Car Rental
System
Start
Choose pickup
location
Choose return
location
[No]
Member?
Login
Register
[No]
Valid?
[Yes]
merge
Confirm
Redirect to payment
gateway
Send confirmation
End
Customer Feedback
Customer E-Car Rental System
Start
Submit feedback
Send notification
End
Staff
Start
Provide member id
Adding a New Car
Staff E-Car Rental System
Login
[No]
Login
Valid?
[Yes]
Add to inventory
Update status
End
View Report
Admin E-Car Rental System
Start
Login
[No]
Valid?
[Yes]
Specify report to view
Retrieve report
End
SEQUENCE DIAGRAMS
Sequence Diagram
Sequence diagrams are used to demonstrate the behavior of objects in a use case by
describing the objects and the messages they pass. It provides a graphical representation of
object interactions over time. Sequence diagrams show an actor, the objects and components
they interact with in the execution of a use case. One sequence diagram represents a single
Use Case 'scenario' or events. Sequence diagrams show the flow of messages from one object
to another, and as such correspond to the methods and events supported by an object.
Member Registration
Reservation of Car
Figure 7.2: Make reservation
Customer Feedback
Enter details
Enter feedback
message
Confirm and submit
Accept feedback
Add to database
Send confirmation
Login
Pass to control
Check validity
Confirm and
submit Pass to control
Add to database
Log out
Close
session
Fi
gure 7.4: Add new car
Feedback Response
Login
Check validity
Get staff info
Select feedback
Display feedback
Respond to feedback
Log out
End session
Provide member
id
Update
database
View Report
Login
Check validity
Specify report
Retrieve report
Log out
End session
Class Diagram
The class diagram is the main building block, a number of classes are identified and grouped
together in a class diagram which helps to determine the statically relations between those
objects.
Automation notify
provides 1 alert
Distance chart - name : string 1
1..*
- source : string get () Feedback respond to
- destination : 1 provide () 1..* 1..*
alert () 1
- id : int Staff
get () notify () - custName :
provide () - custEmail : string
string
1notify - sid : char
- sname : string
1.. send - position : string
* respond ()
() - mobile : int
Reservation Customer
gives1..* add 1 addcar ()
- rid : int - userId : string 1..* modifyInfo ()
- pickdate : date makes 1..* - custName : string 1..*
- returndate : date 1..* - cusAddr : string 1 add
- mobile : int 1..*
- pickloc : string
- VehicleClass : string - email : string Car 1
Admin
1..* register () 1
reserve () rent - PlateNo : string
search() login () 1 - CarName : string - Id : string
reservation () - carType : string - name : string
1..* - rent : double
makes makes add ()
add () modify ()
1..* modify () view ()
1.. Return reserve ()
1
Payment *
- id : int
- retdate : date process View
- id : int
- amount : double 1..*
- custName : string update () Report
pay () - id : int
confirm () - date : date
Early return - title : string
Late return
1..*
- lateCharge : double generate ()
confirm () print ()
save
pay ()
confirm () ()
About PHP
PHP was originally created by Rasmus Lerdorf in 1995 and has been in continuous
development ever since. The main implementation of PHP is now produced by the PHP
Group and serves as the de facto standard for PHP as there is no formal specification. PHP is
free software released under the PHP License.
Originally designed to create dynamic web pages, PHP now focuses mainly on server-side
scripting, and it is similar to other server-side scripting languages that provide dynamic
content from a web server to a client, such as Microsoft's Active Server Pages, Sun
Microsystems’ Java Server Pages, and mod_perl. PHP has also attracted the development of
many frameworks that provide building blocks and a design structure to promote rapid
application development (RAD). Some of these include CakePHP, Symfony, CodeIgniter and
Zend Framework, offering features similar to other web application frameworks.
PHP Syntax:
HTML and PHP code is written on the same page, and to distinguish PHP code from
HTML, the PHP code is enclosed within <? php ?> Tags.
For example:
<html>
<head><title>php basics</title></head>
<body>
<h2>HELLO</h1>
<?php
echo "hello";
?>
</body>
</html>
In the above example PHP code is embedded within HTML. In this way PHP and HTML
coding is combined on the same page.
Since PHP is a server side scripting language, the PHP coding cannot be seen by the end user
through view source option, due to this feature PHP is very secure.
PHP is a parsed language; therefore PHP environment is necessary at the server for running
PHP scripts.
Working of PHP:
When a client requests web page containing PHP code from the server, then the requested
PHP pages are parsed under PHP environment and interaction with database is made if
required.
After server side processing, the resulting HTML pages are passed to client and displayed on
the browser.
$db=mysql_select_db("databasename",$con);
$result=mysql_query($qry);
while($row = mysql_fetch_array($result))
{
//some logic
}
9.5 Introduction to MySQL:
The MySQL development project has made its source code available under the terms of the
GNU General Public License, as well as under a variety of proprietary agreements. MySQL
is owned and sponsored by a single for-profit firm, the Swedish company MySQL AB, now
owned by Sun Microsystems, a subsidiary of Oracle Corporation.
MySQL code uses C and C++. The SQL parser uses yacc and a home-brewed lexer,
sql_lex.cc.
MySQL works on many different system platforms, including AIX, BSDi, FreeBSD, HP-UX,
i5/OS, Linux, Mac OS X, NetBSD, Novell NetWare, OpenBSD, OpenSolaris, eComStation,
OS/2 Warp, QNX, IRIX, Solaris, Symbian, SunOS, SCO OpenServer, SCO UnixWare,
Sanos, Tru64 and Microsoft Windows. A port of MySQL to OpenVMS also exists.
All major programming languages with language-specific APIs include Libraries for
accessing MySQL database. In addition, an ODBC interface called MyODBC allows
additional programming languages that support the ODBC interface to communicate with a
MySQL database, such as ASP or ColdFusion. The HTSQL - URL based query method also
ships with MySQL adapter allowing direct interaction with MySQL database from any web
client via structured URLs. The MySQL server and official libraries are mostly implemented
in ANSI C/ANSI C++.
9.6 Introduction to APACHE SERVER:
In this project apache server is used to parse and execute PHP pages, before deploying
websites on the server, the website should be tested at the developer side to get a feel of how
the website will work on actual server.
Therefore apache server is like a local server on the developer side, apache server should be
informed about the environment on which it should work.
In our project apache server is configured to work with PHP, in this way all the PHP pages
are parsed and executed by the server.
When apache is installed on the system, then its services is controlled by apache service
monitor.
\
Features of the Language Used
About PHP
● PHP files can contain text, HTML, CSS, JavaScript, and PHP code
● PHP code are executed on the server, and the result is returned to the
● PHP can create, open, read, write, delete, and close files on the server
With PHP you are not limited to output HTML. You can output
images, PDF files, and even Flash movies. You can also output any
● PHP is compatible with almost all servers used today (Apache, IIS, etc.)
Linux, Mac and Windows. Since most actual web server deployments
popular PHP and MySQL for beginners course will teach you.
all websites.
2. MySQL: Every web application, howsoever simple or
You can learn how to master PHP with this free MySQL
[Note: For the purpose of this XAMPP tutorial, we’ll assume that
includes:
Feasibility Study
The success of any system resides particularly form the user point that
is, does the system provides you the proper information, easy to
him the possible solution .The system should meet the user needs, the
enhanced.
Feasibility study is conducted to test the operational, economical and
● Operational Feasibility :
● Economic Feasibility :
incurred in the
everywhere.
feasible.
● Technical Feasibility :
technically feasible.
Required Hardware:
Required Software:
Design Document :
● The entire system is projected with a physical diagram which specifics the
actual storage parameters that are physically necessary for any database to
be stored on to the disk. The overall systems existential idea is derived from
this diagram.
which not only specifics the existential entities but also the standard
relations through which the system exists and the cardinalities that are
● The entity Relationship Diagram (ERD) depicts the relationship between the
data objects.
● The ERD is the notation that is used to conduct the date modeling activity
Descriptions.
● The set of primary components that are identified by the ERD are
● Their relationships.
● A UML system is represented using five different views that describe the
perspective.
● In this model the data and functionality are arrived from inside the system.
● In this the structural and behavioral as parts of the system are represented as
are
views.
Use cases model the system from the end users point of view, with the
following objectives
of how the end user and the system interact with one
another.
Use Cases
The actors who have been recognized within the system are
Collaboration Diagram:
Ship among the Object. Collaboration Diagram does not show the time as,
Uses:
2. Show the spatial organization of object and there interaction rather than
interaction.
View: Dynamic.
Sequence Diagram:
It Validate and Flush the Logic of Usage scenario. Sequence diagram show
the object.
Class Diagram:
Class Diagram describe the static nature of the system of the system .It
And there static relationship, you can specify the characteristic and process
To the other object and common semantic. In Class diagram following are
● + public
● # protected
● – private
● $ static attribute
● / Derived attribute
● * Primary Key
Show the relationship between the actors and use cases. Three main
components are,
● Actor
● Use cases
● System Boundary
Activity Diagram:
The control activity. It can model the flow of control activity to activity. An
Class operation in the system that result is change in the state of system.
Testing
role for quality assurance and for ensuring the reliability of software. The
that it has no errors. The basic purpose of testing phase is to detect the errors
that may be present in the program. Hence one should not start testing with
the intent of showing that a program works, but the intent should be to show
Testing Objectives
we can say,
an error.
● A good test case is one that has a high probability of finding error, if it
exists.
standards.
Levels of Testing
below…
Client Needs
Requirements
Design
Code
System Testing
The philosophy behind testing is to find errors. Test cases are devised with
Code Testing:
This strategy examines the logic of the program. To follow this method we
developed some test data that resulted in executing every instruction in the
program and module i.e. every path is tested. Systems are not designed as
entire nor are they tested as single systems. To ensure that the coding is
● Unit Testing
● Link Testing
Unit Testing
Unit testing focuses verification effort on the smallest unit of software i.e.
the module. Using the detailed design and the process specifications testing
is done to uncover errors within the boundary of the module. All modules
must be successful in the unit test before the start of the integration testing
begins.
In this project each service can be thought of a module. There are so many
PManager. Giving different sets of inputs has tested each module. When
module works without any error. The inputs are validated when accepting
in a system are the modules and routines that are assembled and integrated
avoided.
Link Testing
Link testing does not test software but rather the integration of each module
Integration Testing
After the unit testing we have to perform integration testing. The goal here
as testing the design and hence the emphasis on testing module interactions.
In this project integrating all the modules forms the main system. When
integrating all the modules I have checked whether the integration effects
System Testing
Here the entire software system is tested. The reference document for this
Acceptance Testing
emphasized.
This is a unit testing method where a unit will be taken at a time and tested
step wise every piece of code, taking care that every statement in the code is
executed at least once. The white box testing is also called Glass Box
Testing.
I have generated a list of test cases, sample data. which is used to check all
level.
This testing method considers a module as a single unit and checks the unit
details at statement level. Here the module will be treated as a block box
that will take some input and generate output. Output for a given set of input
● Test cases that reduced by a count that is greater than one, the number of
● Test cases that tell us something about the presence or absence of classes of
errors, rather than an error associated only with the specific test at hand.
Database :-
Screenshots: -
Index Page:
Car Selection Page:
Sign In Page:
Customer Experience:
Sign Up Page:
New User:
Index Page:
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>UOWN</title>
<style type="text/css">
.nav-bar {
background-color: transparent;
.w-container {
margin-left: auto;
margin-right: auto;
max-width: 940px;
#nav{
background-color: transparent;
.logo{
padding-top: 8px;
.w-nav {
position: relative;
background: #dddddd;
z-index: 1000;
.w-nav-brand {
position: relative;
float: none;
text-decoration: none;
color: #333333;
}
.w-nav-overlay {
position: absolute;
overflow: hidden;
display: none;
top: 100%;
left: 0;
right: 0;
width: 100%;
.hed{
background-image:url(img/s.jpg);
background-size: cover;
background-repeat: no-repeat;
height: 100vh;
.hero-container{
margin-top: 29vh;
text-align: center;
.w-container {
margin-left: auto;
margin-right: auto;
max-width: 940px;
.hero-subtitle {
font-size: 16px;
line-height: 22px;
letter-spacing: 1px;
text-transform: uppercase;
.hero-heading {
margin-top: 0px;
color: #fff;
font-size: 80px;
line-height: 85px;
font-weight: 400;
text-transform: uppercase;
button.big {
margin-right: 9px;
margin-left: 9px;
font-size: 16px;
.button {
background-color: transparent;
color: white;
font-size: 14px;
.w-container {
.w-nav[data-collapse="medium"] .w-nav-menu {
display: none;
.nav-menu {
.menu-button:hover {
.menu-button {
.w-container {
.logo{
.menu-button {
}
.hero-heading {
.logo{
.w-container {
.hero-container {
.hero-heading {
.button.big {
width: 100%;
margin-right: 0px;
margin-bottom: 12px;
margin-left: 0px;
.logo{
</style>
</head>
<body>
<div class="hed">
<?php
include "navbar.php";
?>
CAR?</a>
</div>
</div>
</body>
</html>
Tour Page:
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>UOWN</title>
<style type="text/css">
<?php
if(isset($_SESSION['mail']))
{
include "modal.css";
else{
include "modal1.css";
?>
body{
color: white;
.nav-bar {
background-color: transparent;
.w-container {
margin-left: auto;
margin-right: auto;
max-width: 940px;
#nav{
background-color: transparent;
.logo{
padding-top: 8px;
}
.w-nav {
position: relative;
background: #dddddd;
z-index: 1000;
.w-nav-brand {
position: relative;
float: none;
text-decoration: none;
color: #333333;
.w-nav-overlay {
position: absolute;
overflow: hidden;
display: none;
top: 100%;
left: 0;
right: 0;
width: 100%;
body {
background-image: url(img/bu.jpg);
background-size: cover;
overflow: scroll;
background-repeat: no-repeat;
background-attachment: fixed;
.content-wrapper {
margin-top: 78px;
.w-container {
margin-left: auto;
margin-right: auto;
max-width: 940px;
.page-title {
margin-top: 0px;
margin-bottom: 86px;
font-size: 36px;
line-height: 51px;
font-weight: 300;
text-align: center;
text-transform: uppercase;
.footer {
padding-top: 43px;
padding-bottom: 43px;
background-color: transparent;
color: #222;
text-align: center;
.venue-list-item {
padding-top: 5px;
padding-bottom: 5px;
.w-container {
.w-nav[data-collapse="medium"] .w-nav-menu {
display: none;
}
.nav-menu {
.w-container {
.logo{
.logo{
}
@media screen and (max-width: 479px){
.w-container {
.logo{
#a{
color: #2675ae;
text-decoration: none;
.new{
margin-top: 16px;
text-align: center;
.head{
text-align: center;
}
.login{
margin: 0 auto;
width: 340px;
label{
color: #0e0e0f;
.bd1{
background-color: transparent;
font-size: 14px;
padding: 20px;
.btn-primary {
background-color: #2675aed9;
form label {
display: block;
margin-bottom: 7px;
input{
margin-bottom: 15px;
margin-top: 5px;
}
.label-link{
margin-left: 7em;
.form-control{
background-color: #ffffffc2;
#p{
color: black;
</style>
</head>
<body>
#A4C615, #4363AB,#BE4A94,#E30922);-webkit-background-clip:
</div>
item">
<div>Mahindra Scorpio</div>
</div>
<div class="venue">Mileage-15Km</div>
</div>
<div>300/Hour</div>
</div>
onclick="op()">BOOK NOW</button>
</div>
</div>
</div>
<div>SANTRO</div>
</div>
<div class="venue">Mileage-35Km</div>
</div>
<div>150/Hour</div>
</div>
onclick="op()">BOOK NOW</button>
</div>
</div>
</div>
<div>Swift Dzire</div>
</div>
<div class="venue">Mileage-10Km</div>
</div>
<div class="w-col w-col-3">
<div>100/Hour</div>
</div>
Now</button>
</div>
</div>
</div>
<div>XUV-500</div>
</div>
<div class="venue">Mileage-25Km</div>
</div>
<div>180/Hour</div>
</div>
Now</button>
</div>
</div>
<div>Nissan</div>
</div>
<div class="venue">Mileage-35Km</div>
</div>
<div>170/Hour</div>
</div>
Now</button>
</div>
</div>
</div>
<div>Ford</div>
</div>
</div>
<div>160/Hour</div>
</div>
Now</button>
</div>
</div>
</div>
<div>Nano</div>
</div>
<div class="venue">Mileage-20Km</div>
</div>
<div>120/Hour</div>
</div>
now</button>
</div>
</div>
</div>
<div>Jeep</div>
</div>
<div class="venue">Mileage-20Km</div>
</div>
<div>150/Hour</div>
</div>
now</button>
</div>
</div>
</div>
</div>
<div class="venue">Mileage-19Km</div>
</div>
<div>180/Hour</div>
</div>
Now</button>
</div>
</div>
</div>
<div>Marshal</div>
</div>
<div class="venue">Mileage-18Km</div>
</div>
<div>19/Hour</div>
</div>
onclick="op()">BOOK Now</button>
</div>
</div>
</div>
<div>Safari</div>
</div>
<div class="venue">Mileage-19Km</div>
</div>
<div>180/Hour</div>
</div>
Now</button>
</div>
</div>
<div>Travera</div>
</div>
<div class="venue">Mileage-15Km</div>
</div>
<div>130/Hour</div>
</div>
Now</button>
</div>
</div>
</div>
<div>Innova</div>
</div>
<div class="venue">Mileage-15Km</div>
</div>
<div class="w-col w-col-3">
<div>220/Hour</div>
</div>
Now</button>
</div>
</div>
</div>
<div>KIA</div>
</div>
<div class="venue">Mileage-20Km</div>
</div>
<div>220/Hour</div>
</div>
Now </button>
</div>
</div>
</div>
</div>
</div>
<?php
if(isset($_SESSION['mail']))
include "modal.php";
else{
include "modal1.php";
?>
<script>
function op() {
modal.style.display = "block";
span.onclick = function() {
modal.style.display = "none";
</script>
<script type="text/javascript">
$(document).ready(function(){
var quantitiy=0;
$('.quantity-right-plus').click(function(e){
e.preventDefault();
// If is not undefined
$('#quantity').val(quantity + 1);
var t=Number(document.getElementById("quantity").value);
var r=Number(document.getElementById("quantty").value);
document.getElementById("myText").value=t*4000+r*9000;
// Increment
});
$('.quantity-left-minus').click(function(e){
e.preventDefault();
// If is not undefined
// Increment
if(quantity>0){
$('#quantity').val(quantity - 1);
var t=Number(document.getElementById("quantity").value);
var r=Number(document.getElementById("quantty").value);
document.getElementById("myText").value=t*4000+r*9000;
});
});
</script>
<script type="text/javascript">
$(document).ready(function(){
var quatiy=0;
$('.quantity-right-plus1').click(function(e){
e.preventDefault();
// If is not undefined
$('#quantty').val(quanity + 1);
var t=Number(document.getElementById("quantity").value);
var r=Number(document.getElementById("quantty").value);
document.getElementById("myText").value=t*4000+r*9000;
// Increment
});
$('.quantity-left-minus1').click(function(e){
e.preventDefault();
// If is not undefined
// Increment
if(quantity>0){
$('#quantty').val(quantity - 1);
}
var t=Number(document.getElementById("quantity").value);
var r=Number(document.getElementById("quantty").value);
document.getElementById("myText").value=t*4000+r*9000;
});
});
</script>
<script>
function che()
var to=Number(document.getElementById("myText").value);
if(to>0){
document.getElementById("tic").click();
else{
</script>
</body>
</html>
Booking Page:
<!DOCTYPE html>
<html>
<head>
scale=1.0">
<title>UOWN</title>
<style>
.login{
margin: 0 auto;
width: 340px;
body {
background-image: url(img/music.png);
background-size: cover;
overflow: scroll;
background-repeat: no-repeat;
background-attachment: fixed;
color:black;
}
.credit-card-box .panel-title {
display: inline;
font-weight: bold;
.credit-card-box .form-control.error {
border-color: red;
outline: 0;
rgba(255,0,0,0.6);
.credit-card-box label.error {
font-weight: bold;
color: red;
margin-top: 2px;
.credit-card-box .payment-errors {
font-weight: bold;
color: red;
margin-top: 2px;
.credit-card-box label {
display: block;
.credit-card-box .display-table {
display: table;
.credit-card-box .display-tr {
display: table-row;
.credit-card-box .display-td {
display: table-cell;
vertical-align: middle;
width: 50%;
min-width: 180px;
.footer{
padding-top: 70px;
padding-bottom: 0;
background-color: transparent;
color: #222;
text-align: center;
}
.nav-bar {
background-color: transparent;
.w-container {
margin-left: auto;
margin-right: auto;
max-width: 940px;
#nav{
background-color: transparent;
.logo{
padding-top: 8px;
.w-nav {
position: relative;
background: #dddddd;
z-index: 1000;
.w-nav-brand {
position: relative;
float: none;
text-decoration: none;
color: #333333;
.w-nav-overlay {
position: absolute;
overflow: hidden;
display: none;
top: 100%;
left: 0;
right: 0;
width: 100%;
body{
background-image:url(img/back5.png);
background-size: cover;
height: 100vh;
.content-wrapper {
margin-top: 78px;
.w-container {
margin-left: auto;
margin-right: auto;
max-width: 940px;
}
</style>
<body>
#4363AB,#BE4A94,#E30922);-webkit-background-clip: text;-
webkit-text-fill-color: transparent;">COLDPLAY</h1>
<div class="row">
<div class="col-md-4"></div>
<div class="col-md-4">
Details</h3>
src="http://i76.imgup.net/accepted_c22e0.png">
</div>
</div>
</div>
<div class="panel-body">
<div class="row">
<div class="col-xs-12">
<div class="form-group">
<label for="cardNumber">CARD
NUMBER</label>
<div class="input-group">
<span class="input-group-addon"><i
class="fa fa-credit-card"></i></span>
</div>
</div>
</div>
</div>
<div class="row">
<div class="form-group">
<label for="cardExpiry"><span class="hidden-
xs">EXPIRATION</span><span
class="visible-xs-inline">EXP</span> DATE</label>
<input
type="tel"
class="form-control"
name="cardExpiry"
placeholder="MMYY"
autocomplete="cc-exp"
required
/>
</div>
</div>
<div class="form-group">
<input
type="tel"
class="form-control"
name="cardCVC"
id="cvc";
placeholder="CVC";
autocomplete="off";
required
/>
</div>
</div>
</div>
<div class="row">
<div class="col-xs-12">
<div class="form-group">
NAME</label>
required />
</div>
</div>
</div>
<div class="row">
<div class="col-xs-12">
</div>
</div>
<div class="col-xs-12">
<p class="payment-errors"></p>
</div>
</div>
</form>
</div>
</div>
</div>
</div>
</div>
<script type="text/javascript">
function checkForm(form){
var n=(document.getElementById("num").value.length);
var c=(document.getElementById("cvc").value.length);
if(n==16)
if(c==3)
return true;
else{
return false;
}
else{
return false;
</script>
</body>
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>UOWN</title>
popup.css">
<script
src="https://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js"
></script>
<script
src="magnific-popup/dist/jquery.magnific-popup.js"></script>
<script>
jQuery(document).ready(function($) {
$(".fancybox").magnificPopup({type:'iframe',iframe: {
'<div class="mfp-close"></div>'+
allowfullscreen></iframe>'+
'</div>',
patterns: {
youtube: {
index: 'youtube.com/',
id: 'v=',
src: 'http://www.youtube.com/embed/%id%?
rel=0&autoplay=1'
}});
});
</script>
<style type="text/css">
.nav-bar {
background-color: transparent;
.w-container {
margin-left: auto;
margin-right: auto;
max-width: 940px;
#nav{
background-color: transparent;
.logo{
padding-top: 8px;
.w-nav {
position: relative;
background: #dddddd;
z-index: 1000;
.w-nav-brand {
position: relative;
float: none;
text-decoration: none;
color: #333333;
.w-nav-overlay {
position: absolute;
overflow: hidden;
display: none;
top: 100%;
left: 0;
right: 0;
width: 100%;
body {
background-image: url(img/v.jpg);
background-size: cover;
overflow: fixed;
background-repeat: no-repeat;
background-attachment: fit;
.content-wrapper {
margin-top: 30px;
.w-container {
margin-left: auto;
margin-right: auto;
max-width: 900px;
.page-title {
margin-top: 0px;
margin-bottom: 86px;
font-size: 45px;
line-height: 51px;
font-weight: 300;
text-align: center;
text-transform: uppercase;
.footer {
padding-top: 43px;
padding-bottom: 43px;
background-color: transparent;
color: #222;
text-align: center;
.w-nav[data-collapse="medium"] .w-nav-menu {
display: none;
.nav-menu {
.w-container {
.logo{
.w-container {
.logo{
.row{
text-align: center;
.thumb{
width: 100%;
margin-bottom: 60px;
float: left;
}
.elastic{
max-width: 80%;
.title{
font-family: sans-serif;
font-size: 18px;
line-height: 21px;
text-align: center;
color: white;
.timestamp{
height: 11px;
font-size: 11px;
letter-spacing: 1px;
line-height: 11px;
font-style: italic;
color: #636363;
text-align: center;
text-transform: uppercase;
.timestamp img {
display: inline;
margin-right: 3px;
margin-bottom: 1px;
.nav-link.w--current {
color: #fff;
text-decoration: none;
</style>
</head>
<body>
Experience</font></font></h1>
</div>
<div class="w-container">
<div class="row">
<div class="col-md-4">
<a class="fancybox"
href="https://www.youtube.com/watch?v=2psxg4EY7l8">
<div class="thumb
videoThumb">
<div
class="videoThumbImage">
<div
class="hover"></div>
<div
class="playIcon"></div>
<img
</div>
<div
<div>31st May,2014</div>
</div>
</a>
</div>
<div class="col-md-4">
<a class="fancybox"
href="https://www.youtube.com/watch?v=RN8pwEpPwJ0">
<div class="thumb
videoThumb">
<div
class="videoThumbImage">
<div
class="hover"></div>
<div
class="playIcon"></div>
<img
Bachchu at Rangpur">
</div>
<div
<div>July 15,
2018</div>
</div>
</a>
</div>
<div class="col-md-4">
<a class="fancybox"
href="youtube.com/watch?v=NgI9flIu2Z4">
<div class="thumb
videoThumb">
<div
class="videoThumbImage">
<div
class="hover"></div>
<div
class="playIcon"></div>
<img
</div>
<div
<div>July 15,
2015</div>
</div>
</a>
</div>
</div>
</div>
</div>
</body>
Signup Page:
<!DOCTYPE html>
<html>
<head>
scale=1.0">
<title>UOWN</title>
<script type="text/javascript">
function checkForm(form)
spaces
@#\$%\^&\*])(?=.{8,})");
// validation fails if the input doesn't match our regular expression
if(!r.test(form.first.value)) {
form.first.focus();
return false;
if(form.pwd1.value.length < 8)
form.pwd1.focus();
return false;
if(form.pwd1.value == form.first.value) {
form.pwd1.focus();
return false;
if(!re.test(form.pwd1.value)) {
form.first.focus();
return false;
}
return true;
</script>
<style>
a{
color: #124c76;
text-decoration: none;
.new{
margin-top: 16px;
text-align: center;
.head{
text-align: center;
.login{
margin: 0 auto;
width: 340px;
label{
color: white;
.bd1{
background-color: transparent;
font-size: 14px;
padding: 20px;
.btn-primary {
background-color: #2675aed9;
form label {
display: block;
margin-bottom: 7px;
input{
margin-bottom: 15px;
margin-top: 5px;
body{
background-image: url("img/back4.png");
background-repeat: no-repeat;
color:white;
.label-link{
margin-left: 7em;
.form-control{
background-color: #ffffffc2;
p{
color: #ffffffba;
.logo{
width: 146px;
height: 18px;
background: url("img/logo.png");
@keyframes shake {
10%, 90% {
}
20%, 80% {
40%, 60% {
.inc{
animation-name: shake;
animation-duration: 1s;
text-align: center;
color: red;
</style>
</head>
<body>
<div class="login">
<form name="form1" action="Sign up.php"
<div class="head">
<h1><b>Sign Up</b></h1>
</div>
<div class="bd1">
<?php
if(isset($_REQUEST["msg"])<>"")
?>
<label for="signup">Name</label>
<label for="user">Email</label>
<label for="password">Password</label>
<input type="password" name="pwd1"
with="Signing in…">
</div>
</form>
<p class="new">
</p>
</div>
</body>
</html>
Sign In Page:
<!DOCTYPE html>
<html>
<head>
scale=1.0">
<title>UOWN</title>
<style>
a{
color: #2675ae;
text-decoration: none;
.new{
margin-top: 16px;
text-align: center;
.head{
text-align: center;
}
.login{
margin: 0 auto;
width: 340px;
label{
color: white;
.bd1{
background-color: transparent;
font-size: 14px;
padding: 20px;
.btn-primary {
background-color: #2675aed9;
form label {
display: block;
margin-bottom: 7px;
input{
margin-bottom: 15px;
margin-top: 5px;
}
body{
background-image: url("img/n.jpg");
background-size: auto;
background-repeat: no-repeat;
color: white;
.label-link{
margin-left: 7em;
.form-control{
background-color: #ffffffc2;
p{
color: #ffffffba;
@keyframes shake {
10%, 90% {
20%, 80% {
40%, 60% {
.inc{
animation-name: shake;
animation-duration: 1s;
text-align: center;
color: red;
</style>
</head>
<body>
<div class="login">
<div class="head">
<h1><b>Sign In</b></h1>
</div>
<div class="bd1">
<?php
if(isset($_REQUEST["msg"])<>"")
$_REQUEST["msg"]."</h4>";
?>
<label for="login">Email</label>
if (isset($_COOKIE['mail']) &&
isset($_COOKIE['password'])) {
echo $_COOKIE['mail'];
else
echo "";
}
?>">
<label for="password">Password</label>
value="<?php
if (isset($_COOKIE['mail']) &&
isset($_COOKIE['password'])) {
echo $_COOKIE['password'];
else
echo "";
?>">
data-disable-with="Signing in…">
</div>
</form>
<p class="new">
"New to site"<i>
account</a></i><br>OR<br><i>
Sign In</a></i>
</p>
</div>
</body>
</html>
Footer Page:
<div class="footer">
<div class="w-container">
href="http://www.facebook.com/shagor.noman" target="_blank">
<img id="fot"
src="http://uploads.webflow.com/560eb94ab52962bd77dfcf14/56152
593b79d0bd36c914521_social-03-white.svg" width="23">
</a>
href="https://twitter.com/Abdullah_Shagor" target="_blank">
<img
src="http://uploads.webflow.com/560eb94ab52962bd77dfcf14/56152
5930c0daecc11081899_social-18-white.svg" width="23">
</a>
href="https://www.youtube.com/channel/UCt29-
7Gnhlm9gKQYM_SWpQQ?view_as=subscriber" target="_blank">
<img
src="http://uploads.webflow.com/560eb94ab52962bd77dfcf14/56152
593cb7d6c033386b191_social-16-white.svg" width="23">
</a>
cookies. </font></font></div>
</div>
</div>
Navbar Page:
<div class="w-container">
href="index.php">
<img class="logo" src="img\logo1.png" style="width:
5%">
</a>
With Us</a>
Car</a>
<?php
if(isset($_SESSION['mail']))
href="signout.php">Sign Out</a>';
else{
in.php">Sign In</a>';
?>
</nav>
<div class="menu-button w-clearfix w-nav-button">
<div class="menu-text">MENU</div>
</div>
</div>
none;"></div>
</div>
Session Page:
<?php
session_start();
if (isset($_SESSION['mail'])) {
$now = time();
session_destroy();
again!");
}
?>
Success Page:
<!DOCTYPE html>
<html>
<head>
scale=1.0">
<title>UOWN</title>
<style>
a{
color: #38acff;
.head{
text-align: center;
.login{
margin: 0 auto;
width: 340px;
body {
background-image: url(img/ja.jpg);
background-size: cover;
overflow: scroll;
background-repeat: no-repeat;
background-attachment: fixed;
color: white;
</style>
</head>
<body>
<h1><b>Awesome!</b></h1>
</div>
14%;">
details.</P>
Home Page.</a>
</div>
</form>
</div>
</body>
</html>
BootStrap:
name="viewport">
<link
href="https://daks2k3a4ib2z.cloudfront.net/560eb94ab52962bd77dfcf
14/css/template-method.webflow.cd9516ad2.css" rel="stylesheet"
type="text/css">
<script
src="https://ajax.googleapis.com/ajax/libs/webfont/1.4.7/webfont.js">
</script>
<link rel="stylesheet"
href="http://fonts.googleapis.com/css?
family=Roboto:300,regular,500%7CRoboto+Slab:regular">
<script type="text/javascript">WebFont.load({
google: {
families: ["Roboto:300,regular,500","Roboto
Slab:regular"]
});
</script>
<script
src="https://daks2k3a4ib2z.cloudfront.net/0globals/modernizr-
2.7.1.js" type="text/javascript"></script>
type="image/x-icon">
<link
href="https://daks2k3a4ib2z.cloudfront.net/img/webclip.png"
rel="apple-touch-icon">
<script
src="https://ajax.googleapis.com/ajax/libs/jquery/2.2.0/jquery.min.js"
type="text/javascript"></script>
<script
src="https://daks2k3a4ib2z.cloudfront.net/560eb94ab52962bd77dfcf1
4/js/webflow.57f4ffb2a.js" type="text/javascript"></script>
System Security:
● Threat: A program which has the potential to cause serious damage to the system.
● Attack: An attempt to break security and make unauthorized use of an asset.
Security violations affecting the system can be categorized as malicious and accidental.
Malicious threats, as the name suggests are a kind of harmful computer code or web script
designed to create system vulnerabilities leading to back doors and security breaches.
Accidental Threats, on the other hand, are comparatively easier to be protected against.
Example: Denial of Service DDoS attack.
1. Integrity:
The objects in the system mustn’t be accessed by any unauthorized user & any user
not having sufficient rights should not be allowed to modify the important system
files and resources.
2. Secrecy:
The objects of the system must be accessible only to a limited number of authorized
users. Not everyone should be able to view the system files.
3. Availability:
All the resources of the system must be accessible to all the authorized users i.e only
one user/process should not have the right to hog all the system resources. If such
kind of situation occurs, denial of service could happen. In this kind of situation, a
malware might hog the resources for itself & thus preventing the legitimate processes
from accessing the system resources.
1. Program Threats:
A program written by a cracker to hijack the security or to change the behaviour of a
normal process.
2. System Threats:
These threats involve the abuse of system services. They strive to create a situation in
which operating-system resources and user files are misused. They are also used as a
medium to launch program threats.
1. Virus:
An infamous threat, known most widely. It is a self-replicating and a malicious thread
which attaches itself to a system file and then rapidly replicates itself, modifying and
destroying essential files leading to a system breakdown.
2. Trojan Horse:
A code segment that misuses its environment is called a Trojan Horse. They seem to
be attractive and harmless cover program but are a really harmful hidden program
which can be used as the virus carrier. In one of the versions of Trojan, User is fooled
to enter its confidential login details on an application. Those details are stolen by a
login emulator and can be further used as a way of information breaches.
Another variance is Spyware, Spyware accompanies a program that the user has
chosen to install and downloads ads to display on the user’s system, thereby creating
pop-up browser windows and when certain sites are visited by the user, it captures
essential information and sends it over to the remote server. Such attacks are also
known as Convert Channels.
3. Trap Door:
The designer of a program or system might leave a hole in the software that only he is
capable of using, the Trap Door works on similar principles. Trap Doors are quite
difficult to detect as to analyze them, one needs to go through the source code of all
the components of the system.
4. Logic Bomb:
A program that initiates a security attack only under a specific situation.
1. Worm:
An infection program which spreads through networks. Unlike a virus, they target mainly
LANs. A computer affected by a worm attacks the target system and writes a small program
“hook” on it. This hook is further used to copy the worm to the target computer. This process
repeats recursively, and soon enough all the systems of the LAN are affected. It uses the
spawn mechanism to duplicate itself. The worm spawns copies of itself, using up a majority
of system resources and also locking out all other processes.
2. Port Scanning:
It is a means by which the cracker identifies the vulnerabilities of the system to attack. It is an
automated process which involves creating a TCP/IP connection to a specific port. To protect
the identity of the attacker, port scanning attacks are launched from Zombie Systems, that is
systems which were previously independent systems that are also serving their owners while
being used for such notorious purposes.
3. Denial of Service:
Such attacks aren’t aimed for the purpose of collecting information or destroying system
files. Rather, they are used for disrupting the legitimate use of a system or facility.
These attacks are generally network based. They fall into two categories:
– Attacks in this first category use so many system resources that no useful work can be
performed.
For example, downloading a file from a website that proceeds to use all available CPU time.
– Attacks in the second category involves disrupting the network of the facility. These attacks
are a result of the abuse of some fundamental TCP/IP principles.
the fundamental functionality of TCP/IP.
Usually, Anti Malware programs are used to periodically detect and remove such viruses and
threats. Additionally, to protect the system from the Network Threats, Firewall is also be
used.
As computers and other digital devices have become essential to business and commerce,
they have also increasingly become a target for attacks. In order for a company or an
individual to use a computing device with confidence, they must first be assured that the
device is not compromised in any way and that all communications will be secure. In this
chapter, we will review the fundamental concepts of information systems security and discuss
some of the measures that can be taken to mitigate security threats. We will begin with an
overview focusing on how organizations can stay secure. Several different measures that a
company can take to improve security will be discussed. We will then follow up by reviewing
security precautions that individuals can take in order to secure their personal computing
environment.
The security triad
Confidentiality
When protecting information, we want to be able to restrict access to those who are allowed
to see it; everyone else should be disallowed from learning anything about its contents. This
is the essence of confidentiality. For example, federal law requires that universities restrict
access to private student information. The university must be sure that only those who are
authorized have access to view the grade records.
Integrity
Integrity is the assurance that the information being accessed has not been altered and truly
represents what is intended. Just as a person with integrity means what he or she says and can
be trusted to consistently represent the truth, information integrity means information truly
represents its intended meaning. Information can lose its integrity through malicious intent,
such as when someone who is not authorized makes a change to intentionally misrepresent
something. An example of this would be when a hacker is hired to go into the university’s
system and change a grade.
Integrity can also be lost unintentionally, such as when a computer power surge corrupts a
file or someone authorized to make a change accidentally deletes a file or enters incorrect
information.
Availability
Information availability is the third part of the CIA triad. Availability means that information
can be accessed and modified by anyone authorized to do so in an appropriate timeframe.
Depending on the type of information, appropriate timeframe can mean different things. For
example, a stock trader needs information to be available immediately, while a sales person
may be happy to get sales numbers for the day in a report the next morning. Companies such
as Amazon.com will require their servers to be available twenty-four hours a day, seven days
a week. Other companies may not suffer if their web servers are down for a few minutes once
in a while.
Tools for Information Security
In order to ensure the confidentiality, integrity, and availability of information, organizations
can choose from a variety of tools. Each of these tools can be utilized as part of an overall
information-security policy, which will be discussed in the next section.
Authentication
The most common way to identify someone is through their physical appearance, but how do
we identify someone sitting behind a computer screen or at the ATM? Tools for
authentication are used to ensure that the person accessing the information is, indeed, who
they present themselves to be.
Authentication can be accomplished by identifying someone through one or more of three
factors: something they know, something they have, or something they are. For example, the
most common form of authentication today is the user ID and password. In this case, the
authentication is done by confirming something that the user knows (their ID and password).
But this form of authentication is easy to compromise (see sidebar) and stronger forms of
authentication are sometimes needed. Identifying someone only by something they have,
such as a key or a card, can also be problematic. When that identifying token is lost or stolen,
the identity can be easily stolen. The final factor, something you are, is much harder to
compromise. This factor identifies a user through the use of a physical characteristic, such as
an eye-scan or fingerprint. Identifying someone through their physical characteristics is called
biometrics.
A more secure way to authenticate a user is to do multi-factor authentication. By combining
two or more of the factors listed above, it becomes much more difficult for someone to
misrepresent themselves. An example of this would be the use of an RSA SecurID token. The
RSA device is something you have, and will generate a new access code every sixty seconds.
To log in to an information resource using the RSA device, you combine something you
know, a four-digit PIN, with the code generated by the device. The only way to properly
authenticate is by both knowing the code and having the RSA device.
Access Control
Once a user has been authenticated, the next step is to ensure that they can only access the
information resources that are appropriate. This is done through the use of access control.
Access control determines which users are authorized to read, modify, add, and/or delete
information. Several different access control models exist. Here we will discuss two: the
access control list (ACL) and role-based access control (RBAC).
For each information resource that an organization wishes to manage, a list of users who have
the ability to take specific actions can be created. This is an access control list, or ACL. For
each user, specific capabilities are assigned, such as read, write, delete, or add. Only users
with those capabilities are allowed to perform those functions. If a user is not on the list, they
have no ability to even know that the information resource exists.
ACLs are simple to understand and maintain. However, they have several drawbacks. The
primary drawback is that each information resource is managed separately, so if a security
administrator wanted to add or remove a user to a large set of information resources, it would
be quite difficult. And as the number of users and resources increase, ACLs become harder to
maintain. This has led to an improved method of access control, called role-based access
control, or RBAC. With RBAC, instead of giving specific users access rights to an
information resource, users are assigned to roles and then those roles are assigned the access.
This allows the administrators to manage users and roles separately, simplifying
administration and, by extension, improving security.
Comparison of ACL and RBAC (click to enlarge)
Encryption
Many times, an organization needs to transmit information over the Internet or transfer it on
external media such as a CD or flash drive. In these cases, even with proper authentication
and access control, it is possible for an unauthorized person to get access to the data.
Encryption is a process of encoding data upon its transmission or storage so that only
authorized individuals can read it. This encoding is accomplished by a computer program,
which encodes the plain text that needs to be transmitted; then the recipient receives
the cipher text and decodes it (decryption). In order for this to work, the sender and receiver
need to agree on the method of encoding so that both parties can communicate properly. Both
parties share the encryption key, enabling them to encode and decode each other’s messages.
This is called symmetric key encryption. This type of encryption is problematic because the
key is available in two different places.
An alternative to symmetric key encryption is public key encryption. In public key
encryption, two keys are used: a public key and a private key. To send an encrypted message,
you obtain the public key, encode the message, and send it. The recipient then uses the
private key to decode it. The public key can be given to anyone who wishes to send the
recipient a message. Each user simply needs one private key and one public key in order to
secure messages. The private key is necessary in order to decrypt something sent with the
public key.
Public key encryption (click for larger diagram)
● Require complex passwords. One reason passwords are compromised is that they can
be easily guessed. A recent study found that the top three passwords people used in
2012 were password, 123456 and 12345678.[1] A password should not be simple, or a
word that can be found in a dictionary. One of the first things a hacker will do is try to
crack a password by testing every term in the dictionary! Instead, a good password
policy is one that requires the use of a minimum of eight characters, and at least one
upper-case letter, one special character, and one number.
● Change passwords regularly. It is essential that users change their passwords on a
regular basis. Users should change their passwords every sixty to ninety days,
ensuring that any passwords that might have been stolen or guessed will not be able to
be used against the company.
● Train employees not to give away passwords. One of the primary methods that is used
to steal passwords is to simply figure them out by asking the users or administrators.
Pretexting occurs when an attacker calls a helpdesk or security administrator and
pretends to be a particular authorized user having trouble logging in. Then, by
providing some personal information about the authorized user, the attacker convinces
the security person to reset the password and tell him what it is. Another way that
employees may be tricked into giving away passwords is through e-mail phishing.
Phishing occurs when a user receives an e-mail that looks as if it is from a trusted
source, such as their bank, or their employer. In the e-mail, the user is asked to click a
link and log in to a website that mimics the genuine website and enter their ID and
password, which are then captured by the attacker.
Backups
Another essential tool for information security is a comprehensive backup plan for the entire
organization. Not only should the data on the corporate servers be backed up, but individual
computers used throughout the organization should also be backed up. A good backup plan
should consist of several components.
Besides these considerations, organizations should also examine their operations to determine
what effect downtime would have on their business. If their information technology were to
be unavailable for any sustained period of time, how would it impact the business?
Additional concepts related to backup include the following:
● Universal Power Supply (UPS). A UPS is a device that provides battery backup to
critical components of the system, allowing them to stay online longer and/or
allowing the IT staff to shut them down using proper procedures in order to prevent
the data loss that might occur from a power failure.
● Alternate, or “hot” sites. Some organizations choose to have an alternate site where an
exact replica of their critical data is always kept up to date. When the primary site
goes down, the alternate site is immediately brought online so that little or no
downtime is experienced.
As information has become a strategic asset, a whole industry has sprung up around the
technologies necessary for implementing a proper backup strategy. A company can contract
with a service provider to back up all of their data or they can purchase large amounts of
online storage space and do it themselves. Technologies such as storage area networks and
archival systems are now used by most large businesses.
Firewalls
Network configuration with firewalls, IDS, and a DMZ. Click to enlarge.
Another method that an organization should use to increase security on its network is a
firewall. A firewall can exist as hardware or software (or both). A hardware firewall is a
device that is connected to the network and filters the packets based on a set of rules. A
software firewall runs on the operating system and intercepts packets as they arrive to a
computer. A firewall protects all company servers and computers by stopping packets from
outside the organization’s network that do not meet a strict set of criteria. A firewall may also
be configured to restrict the flow of packets leaving the organization. This may be done to
eliminate the possibility of employees watching YouTube videos or using Facebook from a
company computer.
Some organizations may choose to implement multiple firewalls as part of their network
security configuration, creating one or more sections of their network that are partially
secured. This segment of the network is referred to as a DMZ, borrowing the term
demilitarized zone from the military, and it is where an organization may place resources that
need broader access but still need to be secured.
Intrusion Detection Systems
Another device that can be placed on the network for security purposes is an intrusion
detection system, or IDS. An IDS does not add any additional security; instead, it provides
the functionality to identify if the network is being attacked. An IDS can be configured to
watch for specific types of activities and then alert security personnel if that activity occurs.
An IDS also can log various types of traffic on the network for analysis later. An IDS is an
essential part of any good security setup.
Physical Security
An organization can implement the best authentication scheme in the world, develop the best
access control, and install firewalls and intrusion prevention, but its security cannot be
complete without implementation of physical security. Physical security is the protection of
the actual hardware and networking components that store and transmit information
resources. To implement physical security, an organization must identify all of the vulnerable
resources and take measures to ensure that these resources cannot be physically tampered
with or stolen. These measures include the following.
● Locked doors: It may seem obvious, but all the security in the world is useless if an
intruder can simply walk in and physically remove a computing device. High-value
information assets should be secured in a location with limited access.
● Physical intrusion detection: High-value information assets should be monitored
through the use of security cameras and other means to detect unauthorized access to
the physical locations where they exist.
● Secured equipment: Devices should be locked down to prevent them from being
stolen. One employee’s hard drive could contain all of your customer information, so
it is essential that it be secured.
● Environmental monitoring: An organization’s servers and other high-value equipment
should always be kept in a room that is monitored for temperature, humidity, and
airflow. The risk of a server failure rises when these factors go out of a specified
range.
● Employee training: One of the most common ways thieves steal corporate information
is to steal employee laptops while employees are traveling. Employees should be
trained to secure their equipment whenever they are away from the office.
Security Policies
Besides the technical controls listed above, organizations also need to implement security
policies as a form of administrative control. In fact, these policies should really be a starting
point in developing an overall security plan. A good information-security policy lays out the
guidelines for employee use of the information resources of the company and provides the
company recourse in the case that an employee violates a policy.
According to the SANS Institute, a good policy is “a formal, brief, and high-level statement
or plan that embraces an organization’s general beliefs, goals, objectives, and acceptable
procedures for a specified subject area.” Policies require compliance; failure to comply with a
policy will result in disciplinary action. A policy does not lay out the specific technical
details, instead it focuses on the desired results. A security policy should be based on the
guiding principles of confidentiality, integrity, and availability.[2]
A good example of a security policy that many will be familiar with is a web use policy. A
web use policy lays out the responsibilities of company employees as they use company
resources to access the Internet. A good example of a web use policy is included in Harvard
University’s “Computer Rules and Responsibilities” policy, which can be found here.
A security policy should also address any governmental or industry regulations that apply to
the organization. For example, if the organization is a university, it must be aware of the
Family Educational Rights and Privacy Act (FERPA), which restricts who has access to
student information. Health care organizations are obligated to follow several regulations,
such as the Health Insurance Portability and Accountability Act (HIPAA).
A good resource for learning more about security policies is the SANS Institute’s Information
Security Policy Page.
Usability
When looking to secure information resources, organizations must balance the need for
security with users’ need to effectively access and use these resources. If a system’s security
measures make it difficult to use, then users will find ways around the security, which may
make the system more vulnerable than it would have been without the security measures!
Take, for example, password policies. If the organization requires an extremely long
password with several special characters, an employee may resort to writing it down and
putting it in a drawer since it will be impossible to memorize.
Biblography:
www.stackoverflow.com
www.hackerearth.com
www.hackerrank.com
www.codechef.com
www.geekforgeeks.com
www.free-css.com
www.templatemo.com
Future Scope:
The car rental industry is growing very fast and demand for this industry has been increased
globally in the past few years. The global car rental industry looks good and seems so many
opportunities for this sector in the future. With the increase of national and international
tourists in different countries, the industry is expecting more growth and bright car rental
business opportunities.
For most of the travelers, renting a car is one of the easiest and cost-effective solution to
travel. You can choose your preferred car and cover the distance you want. Often Car Rental
companies offer great deals and discounts which can save money for you. Also by renting a
car, you can enjoy a convenient journey.
These days most of the people prefer car rentals as one of their favorite mode of transport.
With number of vehicle options like luxury cars, economy cars, sports vehicles, multi utility
vehicles, etc, car rental companies are making it available for every customer.
The entire project has been developed and deployed as per the requirements
Stated by the user, it is found to be bug free as per the testing standards that is
implemented. Any specification-untraced errors will be concentrated in the
coming versions, which are planned to be developed in near future. The system
at present does not take care off the money payment methods, as the
consolidated constructs need SSL standards and are critically to be initiated in
the first face; the application of the credit card transactions is applied as a
developmental phase in the coming days. The system needs more elaborative
technicality for its inception and evolution.