full document
full document
INTRODUCTION
The first recorded cyber crime took place in the year 1820! That is not
surprising considering the fact that the abacus, which is thought to be the earliest
form of a computer, has been around since 3500 B.C. in India, Japan and China.
The era of modern computers, however, began with the analytical engine of
Charles Babbage.
In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the
loom. This device allowed the repetition of a series of steps in the weaving of
special fabrics. This resulted in a fear amongst Jacquard's employees that their
traditional employment and livelihood were being threatened. They committed
acts of sabotage to discourage Jacquard from further use of the new technology.
This is the first recorded cyber crime!
Today computers have come a long way, with neural networks and nano-
computing promising to turn every atom in a glass of water into a computer
capable of performing a Billion operations per second.
Cyber crime is an evil having its origin in the growing dependence on computers
in modern life. In a day and age when everything from microwave ovens and
refrigerators to nuclear power plants is being run on computers, cyber crime has
assumed rather sinister implications. Major cyber crimes in the recent past include
the Citibank rip off. US $ 10 million were fraudulently transferred out of the bank
and into a bank account in Switzerland. A Russian hacker group led by Vladimir
Kevin, a renowned hacker, perpetrated the attack. The group compromised the
bank's security systems. Vladimir was allegedly using his office computer at AO
Saturn, a computer firm in St. Petersburg, Russia, to break into Citibank
computers. He was finally arrested on Heathrow airport on his way to
Switzerland. People hesitate and fear to go directly for giving the complaint ,So
rectifying this problem ,we introduced this online cyber crime process, this
process is used for online complaints for people and easily solved their problems.
Technical Feasibility
CYBERSPACE is the product that is designed mainly on Java. The main reason
behind choosing the Java environment is that, as the users. In order to post the
queries to related Organization always require Input screen which usually
provides services all around the time. Such environment that always gives instant
reply to the users should support input screen. These requirements are satisfied by
Java, as it is multi platform environment supports web Browser where as other
languages lack these features.
Economic Feasibility
As CYBERSPACE which provides continuous communication to users at the
front end, provides solutions to different queries to various different problems as
get from the use of different product. And the solutions for their queries are sent to
them by messaging to their sites within the expiry time or the time mentioned i.e.,
within 12hrs or 24hrs.
Operational Feasibility
Operations done in the CYBERSPACE are very fast and are able to succeed in
sending the responses very fastly. Updating is done very quickly that the modified
data is stored in the database in no time. Its supports up to five hundred
simultaneously users against the central database at any given time.
2.2 EXISTING SYSTEM:
1. Cyberspace has been automated in 2003 using Html as front end and SQL
Server as backend. This system is well adopted but could cater only stores the
complaints but could not send complaints. It requires lot of attention and risk from
the user’s side. Other departments such as employee had not automated. So this
Intranet solution proves to be extremely good. In the present system the user has
to login and he can send the problems. He also maintains the details of the old
complaints.
2. Administrator cannot maintain old complaints in this system and last
disadvantage is database. In this data base is ms access so that’s why it’s old one.
1.Proposed system are those that are automated, so that it is easy to retrieve
the responses from the system fast and updating the details once the response or
services are provided to the end-users upon their request without any difficulty
and saves time.
2. Cyberspace using jsp as front end and Oracle as backend. This system is
Very good it stores the details of all customers and also employees.
3. In the present system we can maintain the old complaints and also update
the customers and employees information. by using oracle we store the stored
procedures, so that why we are using oracle.
3. SYSTEM CONFIGURATION
Language : JSP
Introduction to html:
STRUCTURE OF HTML:
HTML elements perform a defined task. HTML uses two types of elements
. Empty Tags
. Container Tags
These tags differ because of what they represent. Empty tags represent formatting
constricts such as line breaks and horizontal rules. Container tags define a section
of text, formats and dot all of the selected text. A container tag has both a
beginning and an ending.
HTML LAYOUT:
Each document has a head and body delimited by the <HEAD> and <BODY> tag.
The head is where you give your HTML document a title and where you indicate
other parameters the browser may use when dCyberspacelaying the document.
This includes the text for dCyberspacelaying the text. Tag also references special
and indicates the hot spots that link your document to other documents.
HTML FORMS:
Creating a form usually involves two independent steps: Creating the layout
for the form itself and then writing a script program on the server side to process
the formation you get back from a form.
To create a form, You use the <FORM> tag. Inside the opening and closing
FORM tags are each of the individual form elements plus any other HTML
content to create a layout for that form.
The opening tag of the FORM element usually includes the attributes:
METHOD and ACTION. The METHOD attributes can be either GET or POST
which determines how your form data is sent to the script to process it.
The ACTION attribute is a pointer to the script that processes the form on
the server side. The ACTION can be included by a relative path or by a full URL
to a script on your server or somewhere else. For example, the following
<FORM> tag would call a script called form-name in cgi-bin directory on server
www.myservser.com
METHOD ATTRIBUTE:
The other required attribute for the <form> tag sets the methods by which the
browser form’s data to the server for processing. There are two ways: the POST
method and GET method. With POST method, the browser sends the data in two
steps: the browser first contacts the form-processing server specified in the action
attributes, and once contact is made, sends the data.
The GET method in the other hand, contacts the form processing server and sends
the form data in a single transaction step: the browser appends the data to the
form’s action URL, separated by the question mark (?) character.
Introduction to JavaScript
JavaScript:
JavaScript is a new scripting language for WebPages. Scripts written with
java script can be embedded into your HTML pages. With java script you have
many possibilities for enhancing your HTML page with interesting elements. For
example you are able to respond to user-initiated events quite easily. Some effects
that are now possible with java script were some time ago only possible with CGI.
So you can create really sophisticated pages with the helps of java script on the
Internet.
Although the names are almost the same Java is not the same as Java Script.
These are two different techniques for Internet programming. Java
Cyberspacerogramming language. JavaScript is a scripting language as the name
implies. The difference is that we can create real programs with java. But java
script in not real programming. Java Script is meant to be easy to understand and
easy to use. JavaScript authors should not have to care too much about
programming. We could say that Java Script is rather an extension to HTML than
a separate computer language. Of course this is not the official definition but it
makes it easier to understand the difference between java and java script.
The first browser to support java script was the Netscape Navigator 2.0 of
course the higher versions do have java script as well. You might know that java
does not run on all Netscape Navigators 2.0 (or higher versions) versions. But
this is not true for java script -although there are some problems with the different
versions.
The Mac version for example seems to have many bugs. In the near future
there are going to be some other browsers, which support java script. The
Microsoft Internet explorer 3.0 is going to support java script. JavaScript enabled
browsers are going to spread soon - it is worth learning this new technique now.
You might realize that is really easy to write Java Script scripts. We have to know
is some basic techniques and some work-around for problems you might
encounter. Of course we need a basic. Understanding HTML before reading this
tutorial you can find many really good online resources about HTML. Best you
make an online search about ‘html’ at yahoo if you want to get informed about
HTML. Now I want to show some small scripts so you can learn how they are
implemented into HTML-documents and to show which possibilities you have
with the new scripting language. The following is a very small script, which will
only print a text into an HTML document.
<html>
<head>
My first JavaScript
</head>
<body><br>
This is a normal HTML document
<br>
<script language=”JavaScript”>
Document.write (“this is a java script”)
</script><b r>
Backing HTML again
</body>
</html>
If you are using a java script enabled-browser at the moment then you will have
the possibility to see this script working. If your browser doesn’t support Java
Script then this output might be some kind of strange…
This is a normal HTML document
This is java script!
Back in HTML again.
Functions
Functions are bet declared between the <Head> tag of HTML page. Functions are
called by user-initiated events. Seems reasonable to keep the functions between
the <Head> tags. They are loaded first before a user can do anything that might
call a function. Scripts can be placed between inside comment fields to ensure
that older browser do not dCyberspacelay the script itself.
<html>
<head>
<script language=”JavaScript”>
function pushbutton (){
alert (“Hello!”);
}
</script>
</head>
<body>
<form>
<input type=”button” name=”Button1” value=”push me” onclick=”pushbutton
()”>
</form>
</body>
</html>
If we want to test this one immediately and you are using a Java Script enabled
browser then please go ahead and push the button.
This script will create a button and when you press it a window will pop up saying
“hello!”. In fact we have a lot of possibilities just by adding functions to our
scripts.
The common browsers transmit the form information by either method: here’s the
complete tag including the GET transmission method attribute for the previous
form
Example
Input elements.
Use the <input> tag to define any one of a number of common form elements
including text fields multiple choice lists click able images and submission
buttons. There are many attributers for this tag only that types and name attributes
are required for each element, each type of input element uses only a subset of the
followed attributes. Additional <input> attributes may be required based upon
which type of the form element you specify.
Submit button:
The submit button (<input type=submit> ) does what its name implies, settings in
motion the form’s submission to the server from the browser. We many have
more than submit buttons will be added to the parameter list the browser sends
along to the server.
Example
< Input type =”submit”>
<Input type=”submit” value=”submit” name=”name”>
Reset button:
The reset button if firm <input> button is nearly self- explanatory; it lets the user
reset erase or set to some default value all elements in the form. By default the
browser dCyberspacelays a reset button worth the label “reset”. We can change
that by specifying a value attribute with tour own button label.
INTRODUCTION TO JDBC
The next question that needs to be answered is why we need JDBC, once
we have ODBC on hand. We can use the same ODBC to connect the entire
database and ODBC is a proven technology.
Problem for doing this is ODBC gives a ‘c’ language API, which uses
pointers extensively. Since java does not have any pointes and is object-oriented
sun Microsystems, inventor of java developed to suit its needs.
After that you need to have a back-end database engine for which a JDBC driver
is available. When JDBC drivers are not available JDBC-ODBC bridge drivers are
used to access the database through ODBC. Back-end is not needed when JDBC
driver is capable of storing and retrieving the data itself, or if JDBC-ODBC
Bridge and the ODBC driver can be used to store and retrieve the information.
OVERVIEW OF SQL SERVER
DATABASE
DATA DICTIONARY
The DBA is the person responsible for the operation, configuration and
performance of the database. The DBA is charged with keeping the database
operating smoothly, ensuring that backups are done on regular basis (and that
backups work), and installing new software. Other responsibilities might include
planning for future expansion and disk space needs, creating databases and table
spaces, adding users and maintaining security, and monitoring the database and
retuning it as necessary. Large installations might have teams of DBA’s to keep
the system running smoothly; alternatively, the task might be segmented among
the DBA’s.
Insertion of values: This is used to insert values to the specified columns in the
table.
Viewing Data from tables: This is used to view the content’s of the table created.
Syntax: select * from table_name;
Creating a table from existing table: This is used to create a table from existing
table by taking the columns needed.
Inserting data into a table from another table: This is used to insert rows from
one table into another table.
Delete operation: The verb DELETE in SQL is used to remove all rows from
table, or a selected set of rows from a table.
Syntax: delete from table_name; (deletes all rows)
Syntax: delete from table_name where condition; (deletes specified rows based on
condition)
Syntax: update table_name set column_name = expression; (updates all the rows)
Syntax: Alter table table_name modify (column_name new datatype (new size));
Destroying tables: This is used to delete any table from the database.
Syntax: drop table_name;
Finding out the tables created by user: To display all the tables which are there
in our database.
Finding out the columns details of a table created: To check which columns are
present and what is there datatype& size we use this command i.e. desc.
4.1 NORMALIZATION:
ILogin_MasterAdmin:
ILogin_MasterCust:
Cust_id number
Username varchar2(20)
Password varchar2(20)
Cust_type varchar2(20)
Address1 varchar2(30)
Address2 varchar2(30)
Email_id varchar2(20)
Phone number
Faxno number
ConnType number
Employee CYBERSPACE:
Emp_id number
Emp_name varchar2(20)
Password varchar2(20)
emp_type varchar2(20)
Dept varchar2(20)
Contact_no number
Email varchar2(20)
address1 varchar2(20)
address2 varchar2(20)
CustCompliants:
cust_id Number
Complaint_id Number
Complaint_type varchar2(20)
Complaint_desc varchar2(20)
Complaint_date Date
AsignComplaints:
Emp_id Number
Comp_id Number
Cust_id Number
comp_type varchar2(20)
comp_desc varchar2(20)
SolveProb:
Emp_id Number
Comp_id Number
Cust_id Number
comp_type varchar2(20)
comp_desc varchar2(20)
Solution varchar2(20)
inputs like text (numeric, string, character, special characters). Sometimes the user
itself became a input like the biometric inputs such as finger print, palm print, iris,
foot print and so on. In our proposed project the user gives input through manual
options such as unique username and password for access the application. The
user gives input through neither keyboard nor any sensors. The user can give any
type of input randomly. he can use any window frames through GUI control. The
CYBERSPACE
Administrator
Cyber
Customers Space
Database
Employee
Level 1: Admin
Login
Customer User
validatio
New Customer n Database
Update details Admin
process
New Complaints
Completed
Level 2: Customer
Login
User
validat
My Information
ion Database
Complai
nt
process
My Complaint
information
Add Complaints
Level 3 : Employer
Login
User
validati
on Database
My Information
Employe
e
process
My Task
information
Solving Problem
E-R Diagram:
Addres E-mail
s ID Comp desc Comp type
Admi
n
Comp_de
s Assign Complaint
empnam passwor
e d
Comp_typ Cus_id
e
Employer Emp
ID
Comp_i Emp_id
d
Emp type Addres E-mail
s ID
5. SYSTEM DESCRIPTION
MODULES:
1. Administrator
2. Employee
3. Customer
1. ADMINISTRATOR:
Administrator can add employees and also customers whenever they join
in to organization. He has to maintain the details of all employees as well as
customers. If any customer post problem he has to assign that problem to related
employee. And also admin can update customer details.
2. EMPLOYEE:
Employee has to login and if admin assign any work to employee, he has
to solve the problem and post solution to that particular customer. So he can see
his details and he cannot change the details.
3. CUSTOMERS:
In this module customers can login by using their own id and password.
Customers can see their details and also if they have problem in internet also post
that problem to provider. You will get solution after employee solved.
Testing Principles:
TESTING STRATEGIES
A Strategy for software testing integrates software test cases into a series of
well planned steps that result in the successful construction of software. Software
testing is a broader topic for what is referred to as Verification and Validation.
Verification refers to the set of activities that ensure that the software correctly
implements a specific function. Validation refers he set of activities that ensure
that the software that has been built is traceable to customer’s requirements
Unit Testing:
Integration Testing:
Bottom-up Integration:
This method as the name suggests, begins construction and testing with
atomic modules i.e., modules at the lowest level. Because the modules are
integrated in the bottom up manner the processing required for the modules
subordinate to a given level is always available and the need for stubs is
eliminated.
Validation Testing:
System Testing:
System testing is actually a series of different tests whose primary purpose
is to fully exercise the computer-based system. Although each test has a different
purpose, all work to verify that all system elements have been properly integrated
to perform allocated functions.
Security Testing:
Performance Testing:
CONCLUSION:
The result of the CYBERSPACE is that it supports many solved complaints from
admin and the individual users or the end-users with unique interface, through
which the employee problems are solved within given time and it shows
efficiency in the internal messaging system and results in accurate task scheduling
system and this can be run with the minimal administration.
FUTURE SCOPE:
ADMIN LOGIN:
This page can achieve through
http://localhost:8080/cyberspace1/adminloginpage.jsp . From this page
user can forward to the administrator page, customers page and
employee page. The admin login page is used for authenticate the
administrators to control other users through this application.
LATEST COMPLAINT:
This page can achieve through
http://localhost:8080/cyberspace1/latestcomplaints.jsp . From this page
user can forward to the complaints page, customers page and employee
page. The admin use (view this page).
PENDING COMPLAINTS:
This page can achieve through
http://localhost:8080/cyberspace1/pendingcomp.jsp . From this page
user can forward to the complaints page, customers page and employee
page. The admin use (view this page).
COMPLETED PROBLEMS:
This page can achieve through
http://localhost:8080/cyberspace1/completedproblems.jsp . From this
page user can forward to the complaints page, customers page and
employee page. The admin use (view this page). The status of the
complaint is described here.
ASSIGNING WORK TO EMPLOYEE:
This page can achieve through
http://localhost:8080/cyberspace1/assignwork.jsp . From this page user
can forward to the complaints page, customers page and employee
page. The admin use this page to assign the works to employee.
CUSTOMER MODULE:
This page can achieve through
http://localhost:8080/cyberspace1/custloginpage.jsp . From this page
user can forward to the administrator page, customers page and
employee page. The customer login page is used for authenticate the
customers to access this application.
CUSTOMER INFORMATION:
This page can achieve through
http://localhost:8080/cyberspace1/custinfo.jsp . This page is used forto
enter the customer details.
COMPLAINT INFORMATION:
EMPLOYEE LOGIN:
This page can achieve through
http://localhost:8080/cyberspace1/emploginpage.jsp. from this page we
can forward to administrator page, customers page, employees page and
home page. The employee was authenticated and login through this
page.
EMPLOYEE HOME PAGE:
This page can achieve through
http://localhost:8080/cyberspace1/employeehome.jsp . this page used to
access the link my info and my tasks info.
EMPLOYEE INFORMATION :
This page can achieve through
http://localhost:8080/cyberspace1/employeeinfo.jsp , the information
deals with this page are employee: Id, name, password, type,
department and contact details.
TASK INFORMATION:
This page can achieve through
http://localhost:8080/cyberspace1/taskinfo.jsp . this user view this form
as task report.
LOGOUT:
After all process got over this page will appear.
9.BIBILIOGRAPHY
BOOKS AND MANUALS :-
1.JAVA-2 Complete-Reference
Author : Fairley
Publisher : Tata McGraw Hill Publication,3rd
Edition.
Author : Pressman