Professional Documents
Culture Documents
A Project Report On The "Critical Evaluation of Security Processing System For Online Purchasing"
A Project Report On The "Critical Evaluation of Security Processing System For Online Purchasing"
s
e
r
l
o
g
i
n
S!"
%B
36
SYSTEM DESIGN
Security Processing System Kohinoor Business School
SPMS
user
&ransaction an# 'as(#
con)irmation
&ransaction
#etails
*on)irmation
#etails
+nline
,oo-
sho'
user
37
DIFFERENT DESIGN :
Systems design i) t%e pro+e)) o$ e$i!i!( t%e "r+%ite+ture5 +ompo!e!t)5 mou#e)5 i!ter$"+e)5
"! "t" $or " ).)tem to )"ti)$. )pe+i$ie re&uireme!t)4
Logical design
T%e #o(i+"# e)i(! o$ " ).)tem pert"i!) to "! "b)tr"+t repre)e!t"tio! o$ t%e "t" $#o')5 i!put)
"! output) o$ t%e ).)tem4
Physical design
T%e p%.)i+"# e)i(! re#"te) to t%e "+tu"# i!put "! output pro+e))e) o$ t%e ).)tem4 T%i) i) #"i
o'! i! term) o$ %o' "t" i) i!put i!to " ).)tem5 %o' it i) -eri$ieE"ut%e!ti+"te5 %o' it i)
pro+e))e5 "! %o' it i) i)p#".e ") output4
DATABASE DESIGN
Security Processing System Kohinoor Business School 38
Data Design
A 'e##/e)i(!e "t"b")e i) e))e!ti"# $or t%e per$orm"!+e o$ t%e ).)tem4 Se-er"#
t"b#e) "re m"!ipu#"te $or -"r.i!( purpo)e)4
N"me o$ t%e t"b#e : Creit +"r "t"b")e ") pro-ie b. b"!>4
Purpo)e : Co!t"i!) u)er +reit +"r et"i#)4
1. Credit_card table
Sl Field Name Type Width Constraint Description
No
2 Creit+"r!umber V"r+%"r 31 Prim"r. ;e. T%e u!i&ue !umber o$
t%e +"r
0 Mo!t% V"r+%"r 31 !u## S%o' Mo!t%
3 Ye"r V"r+%"r 21 !u## S%o' Ye"r
A To>e! V"r+%"r 21 !u## Ge!er"te P"))'or
C pi!!umber V"r+%"r 31 !u## U!i&ue pi! !umber
D p%o!e!umber V"r+%"r 31 !u## U)er mobi#e !umber
I! t%e $o##o'i!( "t"b")e i!trou+i!( " o!#i!e boo> )%op $rom '%ere t%e u)er 'i## pur+%")e t%e
boo> "! )t"rt it) +reit +"r p".me!t i! $urt%er )tep)4
N"me o$ t%e t"b#e: Cu)tomer) T"b#e)
Purpo)e: T%e et"i#) o$ t%e +u)tomer i) )tore i! t%i) t"b#e4
Security Processing System Kohinoor Business School 39
2. Customers Tables
Sl No Field Name Type Width Constraint Description
2 u)er!"me V"r+%"r 7C18 Prim"r. >e. U!i&ue !"me (i-e!
b. t%e u)er
0 p"))'or -"r+%"r 7C18 !ot !u## P"))'or o$ t%e u)er
3 $ir)t!"me -"r+%"r 7C18 !u## U)er $ir)t !"me
A #")t!"me -"r+%"r 7C18 !u## U)er #")t !"me
C "re)) -"r+%"r 72118 !u## T%e "re)) o$ u)er
L )t"te -"r+%"r 72118 !u## N"me o$ t%e )t"te
K pi!+oe -"r+%"r 7018 !u## T%e +oe et"i#
T te#ep%o!e -"r+%"r 7018 !u## T%e +o!t"+t !umber
N"me o$ t%e t"b#e : C"rt t"b#e
Purpo)e : To )%o' t%e o!#i!e tr"!)"+tio! : Fir)t i!trou+e " o!#i!e boo> )%op $rom '%ere t%e
u)er +"! +%e+> to pur+%")e " boo> 4
3. Book_Cart Table
Sl No Field Name Type Width Constraint Description
2 =oo>I V"r+%"r 31 Prim"r. >e. T%e u!i&ue i o$
t%e boo>
0 =oo>N"me V"r+%"r 211 !u## N"me o$ t%e
boo>
3 Pri+e 9oub#e !u## Pri+e o$ t%e
Security Processing System Kohinoor Business School 40
boo>
A Ju"!tit. I!t 22 !u## Number o$ boo>)
C Se))io!I V"r+%"r 011 !u## T%e )e))io! i4
N"me o$ t%e t"b#e: C"te(orie) t"b#e
Purpo)e: T%e et"i#) o$ t%e +"te(orie) o$$ere b. t%e boo> )%op "re )tore i! t%i) t"b#e4
4. Categories Tables
Sl No Field Name Type Width Constraint Description
2 C"te(or.OI I!t 21 Prim"r. U!i&ue i
;e.
0 C"te(or.ON"me V"r+%"r 011 !u## N"me o$
+"te(or.
Security Processing System Kohinoor Business School 41
N"me o$ t%e t"b#e: =oo>
Purpo)e: I!i-iu"# boo> et"i#) "re )tore i! t%i) t"b#e4
5. Books Table
Sl No Field Name Type Width Constraint Description
2 i)b! -"r+%"r 211 Prim"r. >e. U!i&ue +oe
0 tit#e -"r+%"r 311 Nu## Tit#e o$ t%e boo>
3 )ubtit#e -"r+%"r 311 Nu## Subtit#e o$ t%e boo>
A "ut%or -"r+%"r 311 Nu## T%e !"me o$ "ut%or
C pub#i)%e"te -"r+%"r 011 Nu## 9"te o$ pub#i+"tio!
D p"(e) I!t 311 Nu## Number o$ p"(e)
L +"te(or. I!t 21 Nu## C"te(or. o$ t%e boo>
K !e're#e")e I!t 21 Nu## A!. !e' re#e")e
T et"i# -"r+%"r 011 Nu## Ot%er et"i#)
Security Processing System Kohinoor Business School 42
21 pri+e oub#e Nu## T%e +o)t o$ t%e boo>
N"me o$ t%e t"b#e: Orer Item) T"b#e
Purpo)e: A## et"i#) o$ t%e item 'it% it) orer )u+% ") orer &u"!tit.5 oreri "re )tore i! t%i)
t"b#e
6. Order_Items Table
Sl No Field Name Type Width Constraint Description
2 oreri I!t 20 Forei(! T%e oreri
>e.
0 boo>i -"r+%"r C1 Prim"r. T%e u!i&ue
;e. boo>i o$ t%e
orere boo>
3 &u"!tit. I!t 20 !u##
Number o$ boo>)
orere4
A pri+e oub#e !u## T%e tot"# pri+e4
C )ubtot"# oub#e !u## Subtot"#
N"me o$ t%e t"b#e : Orer) T"b#e
Security Processing System Kohinoor Business School 43
Purpo)e : T%e et"i#) o$ orer $rom +u)tomer )u+% ") orer "te5 "mou!t "re )tore i! t%i) t"b#e4
7. Orders Table
Sl No FieldName Type Width Constraint Description
2 oreri I!t 20 Prim"r. >e. T%e u!i&ue oreri
0 "mou!t oub#e Nu## T%e "mou!t 7i$ "!.8
3 orer"te -"r+%"r 211 Nu## 9"te o$ t%e orer
p#"+e
A +u)tomer!"me-"r+%"r 211 !u## T%e !"me o$ t%e
+u)tomer
TESTING
So$t'"re te)ti!( i) "! empiri+"# i!-e)ti("tio! +o!u+te to pro-ie )t">e%o#er) 'it%
i!$orm"tio! "bout t%e &u"#it. o$ t%e prou+t or )er-i+e u!er te)t5 'it% re)pe+t to t%e +o!teBt i!
'%i+% it i) i!te!e to oper"te4 So$t'"re Te)ti!( "#)o pro-ie) "! ob6e+ti-e5 i!epe!e!t -ie'
o$ t%e )o$t'"re to "##o' t%e bu)i!e)) to "ppre+i"te "! u!er)t"! t%e ri)>) "t imp#eme!t"tio!
o$ t%e )o$t'"re4 Te)t te+%!i&ue) i!+#ue5 but "re !ot #imite to5 t%e pro+e)) o$ eBe+uti!( "
pro(r"m or "pp#i+"tio! 'it% t%e i!te!t o$ $i!i!( )o$t'"re bu()4
Testing techniques and Testing strategies :
T%ere "re $our te)ti!( )tr"te(ie) t%"t "re m"i!#. u)e4 T%e)e "re5
24 24U!it Te)ti!(
04 I!te(r"tio! Te)ti!( V
Security Processing System Kohinoor Business School 44
34 V"#i"tio! Te)ti!(
A4 S.)tem Te)ti!(
T%i) ).)tem '") te)te u)i!( U!it Te)ti!( "! I!te(r"tio! Te)ti!( )tr"te(ie) be+"u)e t%e)e 'ere
t%e mo)t re#e-"!t "ppro"+%e) $or t%i) pro6e+t4
Unit testing :
<e "opt '%ite boB te)ti!( '%e! u)i!( t%i) te)ti!( te+%!i&ue4 T%i) te)ti!( '") +"rrie
out o! i!i-iu"# +ompo!e!t) o$ t%e )o$t'"re t%"t 'ere e)i(!e4 E"+% i!i-iu"# mou#e '")
te)te u)i!( t%i) te+%!i&ue uri!( t%e +oi!( p%")e4 E-er. +ompo!e!t '") +%e+>e to m">e
)ure t%"t t%e. "%ere )tri+t#. to t%e )pe+i$i+"tio!) )pe#t out i! t%e 9"t" F#o' 9i"(r"m "! e!)ure
t%"t t%e. per$orm t%e purpo)e i!te!e $or t%em4
A## t%e !"me) o$ t%e -"ri"b#e) "re )+ruti!i,e to m">e )ure t%"t t%e. tru#. re$#e+t t%e
e#eme!t t%e. repre)e!t4 A## t%e #oopi!( me+%"!i)m) 'ere -eri$ie to e!)ure t%"t t%e. 'ere ")
e+ie4 =e)ie) t%e)e5 'e tr"+e t%rou(% t%e +oe m"!u"##. to +"pture ).!t"B error) "! #o(i+"#
error)4
Integration Testing:
A$ter $i!i)%i!( t%e U!it Te)ti!(5 !eBt i) t%e i!te(r"tio! te)ti!( pro+e))4 I! t%i) te)ti!(
pro+e)) 'e put our $o+u) o! ie!ti$.i!( t%e i!ter$"+e) bet'ee! +ompo!e!t) "! t%eir
$u!+tio!"#it. ") i+t"te i! t%e 9"t" F#o' 9i"(r"m4 T%e =ottom Up i!+reme!t"# "ppro"+% '")
"opte uri!( t%e)e te)ti!(4 Lo'/#e-e# mou#e) "re i!te(r"te "! +ombi!e ") " +#u)ter
be$ore te)ti!(4
T%e =#"+> =oB te)ti!( te+%!i&ue '") emp#o.e %ere4 T%e i!ter$"+e) bet'ee! t%e +ompo!e!t)
'ere te)te $ir)t4 T%i) "##o'e ie!ti$.i!( "!. 'ro!( #i!>"(e) or p"r"meter) p"))i!( e"r#. i!
t%e e-e#opme!t pro+e)) ") it +"! be 6u)t p"))e i! " )et o$ "t" "! +%e+>e i$ t%e re)u#t
retur!e i) "! "++epte o!e4
Validation Testing:
Security Processing System Kohinoor Business School 45
So$t'"re te)ti!( "! -"#i"tio! i) "+%ie-e t%rou(% " )erie) o$ b#"+> boB te)t +")e)4 A
te)t pro+eure e$i!e) )pe+i$i+ te)t +")e) t%"t emo!)tr"te +o!$ormit. 'it% t%e re&uireme!t)4
=ot%5 t%e p#"! t%e pro+eure "re e)i(!e to e!)ure t%"t "## $u!+tio!"# re&uireme!t) "re
"+%ie-e5 o+ume!t"tio! i) +orre+t "! ot%er re&uireme!t) "re met4 A$ter e"+% -"#i"tio! te)t
+")e %") bee! +o!u+te5 o!e o$ t%e t'o po))ib#e +o!itio!) eBi)t)4 T%e. "re5
T%e $u!+tio! or per$orm"!+e +%"r"+teri)ti+) +o!$irm to )pe+i$i+"tio! "! "re
"++epte4 A e-i"tio! $rom t%e )pe+i$i+"tio! i) u!+o-ere "! " e$i+ie!+. #i)t i)
+re"te4
T%e e-i"tio! or error i)+o-ere "t t%i) )t"(e i! pro6e+t +"! r"re#. be +orre+te prior to
)+%eu#e +omp#etio!4 It i) !e+e))"r. to !e(oti"te 'it% t%e +u)tomer to e)t"b#i)% " met%o o$
re)o#-i!( e$i+ie!+ie)4
System Testing
S.)tem te)ti!( i) " )erie) o$ i$$ere!t te)t) '%o)e prim"r. purpo)e i) to $u##. eBer+i)e t%e
+omputer/b")e ).)tem4 A#t%ou(% e"+% te)t %") " i$$ere!t purpo)e5 "## t%e 'or> )%ou# -eri$.
t%"t "## ).)tem e#eme!t) %"-e bee! proper#. i!te(r"te "! per$orm i!te(r"te $u!+tio!)4
S.)tem te)ti!( "#)o e!)ure) t%"t t%e pro6e+t 'or>) 'e## i! t%e e!-iro!me!t4 It tr"p) t%e
error) "! "##o') +o!-e!ie!t pro+e))i!( o$ error) 'it%out +omi!( out o$ t%e pro(r"m "brupt#.4
Re+o-er. te)ti!( i) o!e i! )u+% " '". t%"t $"i#ure i) $or+e to " )o$t'"re ).)tem "!
+%e+>e '%et%er t%e re+o-er. i) proper "! "++ur"te4 T%e per$orm"!+e o$ ).)tem i) %i(%#.
e$$e+ti-e4
Web Testing
Our propo)e pro6e+t i) o$ 3 tier "pp#i+"tio!) 7e-e#ope $or I!ter!et84 Here 'e 'i## be %"-i!(
Security Processing System Kohinoor Business School 46
=ro')er5 'eb )er-er "! 9= )er-er4 T%e "pp#i+"tio!) "++e))ib#e i! bro')er 'ou# be
e-e#ope i! HTML5 J"-"S+ript et+4 <e +"! mo!itor t%rou(% t%e)e "pp#i+"tio!) $or t%e 'eb
)er-er 'ou# be e-e#ope i! J"-"5 JSP5 J"-"S+ript5 7A## t%e m"!ipu#"tio!) "re o!e o! t%e 'eb
)er-er 'it% t%e %e#p o$ t%e)e pro(r"m) e-e#ope84T%e 9=)er-er 'ou# be %"-i!( or"+#e5 )&#
)er-er5 ).b")e5 m.)&# et+4 7A## "t" i) )tore i! t%e "t"b")e "-"i#"b#e o! t%e 9= )er-er84
The tests performed on these types of applications would be
- U)er i!ter$"+e te)ti!(
- Fu!+tio!"#it. te)ti!(
- Se+urit. te)ti!(
- =ro')er +omp"tibi#it. te)ti!(
- Lo" E )tre)) te)ti!(
- Stor"(e "! "t" -o#ume te)ti!(
A web-application is a three-tier application.
T%i) %") " bro')er 7mo!itor) "t"8 Rmo!itori!( i) o!e u)i!( %tm#/N 'eb)er-er 7m"!ipu#"te)
"t"8 Rm"!ipu#"tio!) "re o!e u)i!( pro(r"mmi!( #"!(u"(e) or )+ript) #i>e "- 6"-"5 6)p5
6"-")+ript5S /N "t"b")e )er-er 7)tore) "t"8 R"t" )tor"(e "! retrie-"# i) o!e u)i!( "t"b")e)
#i>e m.)&#S4
The types of tests, which can be applied on this type of applications, are:
24 U)er i!ter$"+e te)ti!( $or -"#i"tio! H u)er $rie!#i!e))
04 Fu!+tio!"#it. te)ti!( to -"#i"te be%"-ior)5 iEp5 error %"!#i!(5 oEp5 m"!ipu#"tio!)5 )er-i+e)
Security Processing System Kohinoor Business School 47
#e-e#)5 orer o$ $u!+tio!"#it.5 #i!>)5 +o!te!t o$ 'eb p"(e H b"+>e! +o-er"(e@)
34 Se+urit. te)ti!(
A4 =ro')er +omp"tibi#it.
C4 Lo" E )tre)) te)ti!(
D4 I!teroper"bi#it. te)ti!(
L4 Stor"(e H "t" -o#ume te)ti!(
11.2 Testing with different test cases:
S.No Test case No Test Case Test Step Description Expected Result
Name No
2 TC 2OLo(i! To +%e+> Step 2 T.pe t%e URL i! t%e T%e Lo(i! p"(e
Security Processing System Kohinoor Business School 48
)+ree! '%et%er t%e IE "! +#i+> o! GO )%ou# be
u)er i) "b#e to butto! i)p#".e4
#o(i! 'it% t%e
-"#i u)er i
"! p'
Step 0 E!ter t%e -"#i T%e $ie#) )%ou#
u)er!"me "! p' "++ept t%e "t"
i! t%e USER NAME e!tere b. t%e
$ie# "! u)er4
PASS<OR9 $ie#4
Step 3 C#i+> o! t%e O; T%e U)er )%ou#
butto!4 be t">e! to t%e
SPS %omep"(e4
0 TC 0OLo(i! To +%e+> Step 2 T.pe t%e URL i! t%e T%e SPS Lo(i!
)+ree! '%et%er t%e IE "! +#i+> o! GO p"(e )%ou# be
u)er i) !ot "b#e butto! i)p#".e4
to #o(i! to t%e
SPS 'it% t%e
-"#i u)er i
"! i!-"#i
p'
Step 0 E!ter t%e -"#i T%e $ie#) )%ou#
u)er!"me "! "++ept t%e "t"
i!-"#i p' i! t%e e!tere b. t%e
USER NAME $ie# u)er4
"! PASS<OR9
$ie#4
Step 3 C#i+> o! t%e O; T%e Error
butto!4 me))"(e F Lo(i!
F"i#eF )%ou# be
i)p#".e4
3 TC 3OLo(i! To +%e+> Step 2 T.pe t%e URL i! t%e T%e Lo(i! p"(e
)+ree! '%et%er t%e IE "! +#i+> o! GO )%ou# be
u)er i) !ot "b#e butto! i)p#".e4
Security Processing System Kohinoor Business School 49
to #o(i! to t%e
'it% t%e
i!-"#i u)er i
"! -"#i p'
Step 0 E!ter t%e i!-"#i T%e $ie#) )%ou#
u)er!"me "! -"#i "++ept t%e "t"
p' i! t%e USER e!tere b. t%e
NAME $ie# "! u)er4
PASS<OR9 $ie#4
Step 3 C#i+> o! t%e O; T%e Error
butto!4 me))"(e F Lo(i!
F"i#eF )%ou# be
i)p#".e4
A TC AOLo(i! To +%e+> Step 2 T.pe t%e URL i! t%e T%e Lo(i! p"(e
)+ree! '%et%er t%e IE "! +#i+> o! GO )%ou# be
u)er i) !ot "b#e butto! i)p#".e4
to #o(i! to t%e
'it% t%e
i!-"#i u)er i
"! i!-"#i
p'
Step 0
E!ter t%e
i!-"#i T%e $ie#) )%ou#
u)er!"me
"! -"#i "++ept t%e "t"
p' i! t%e
USER e!tere b. t%e
NAME
$ie# "! u)er4
PASS<OR
9 $ie#4
Step 3
C#i+> o! t%e
O; T%e Error
butto!4 me))"(e F Lo(i!
F"i#eF )%ou# be
Security Processing System Kohinoor Business School 50
i)p#".e4
C
TC
COHo
me To +%e+> Step 2
T.pe t%e
URL i! t%e T%e Lo(i! p"(e
p"(eO
Si(! '%et%er t%e
IE "! +#i+>
o! GO )%ou# be
out
$u!+tio
! u)er i) "b#e to butto! i)p#".e4
)i(!out o$ t%e
"pp#i+"tio!
IMPLEMENTATION
I! t%e imp#eme!t"tio! p%")e5 t%e te"m bui#) t%e +ompo!e!t) eit%er $rom )+r"t+% or b.
+ompo)itio!4 Gi-e! t%e "r+%ite+ture o+ume!t $rom t%e e)i(! p%")e "! t%e re&uireme!t
o+ume!t $rom t%e "!"#.)i) p%")e5 t%e te"m )%ou# bui# eB"+t#. '%"t %") bee! re&ue)te5
Security Processing System Kohinoor Business School 51
t%ou(% t%ere i) )ti## room $or i!!o-"tio! "! $#eBibi#it.4 For eB"mp#e5 " +ompo!e!t m". be
!"rro'#. e)i(!e $or t%i) p"rti+u#"r ).)tem5 or t%e +ompo!e!t m". be m"e more (e!er"# to
)"ti)$. " reu)"bi#it. (uie#i!e4 T%e "r+%ite+ture o+ume!t )%ou# (i-e (ui"!+e4 Sometime)5
t%i) (ui"!+e i) $ou! i! t%e re&uireme!t o+ume!t4
T%e imp#eme!t"tio! p%")e e"#) 'it% i))ue) o$ &u"#it.5 per$orm"!+e5 b")e#i!e)5 #ibr"rie)5
"! ebu((i!(4 T%e e! e#i-er"b#e i) t%e prou+t it)e#$4 9uri!( t%e imp#eme!t"tio! p%")e5 t%e
).)tem i) bui#t "++ori!( to t%e )pe+i$i+"tio!) $rom t%e pre-iou) p%")e)4 T%i) i!+#ue) 'riti!(
+oe5 per$ormi!( +oe re-ie')5 per$ormi!( te)t)5 )e#e+ti!( +ompo!e!t) $or i!te(r"tio!5
+o!$i(ur"tio!5 "! i!te(r"tio!4
T%e imp#eme!t"tio! i!+#ue) t%e $o##o'i!( t%i!()4
C"re$u# p#"!!i!(
I!-e)ti("tio! o$ ).)tem "! +o!)tr"i!t)4
9e)i(! t%e met%o) to "+%ie-e t%e +%"r(e o-er4
Tr"i!i!( t%e )t"$$ i! t%e +%"!(e p%")e4
Imp#eme!t"tio! i) t%e )t"te o$ pro6e+t '%ere t%e t%eoreti+"# e)i(! i) tur!e i!to " 'or>i!(
).)tem4 T%e mo)t +riti+"# )t"(e i! "+%ie-i!( " )u++e))$u# !e' ).)tem i) (i-i!( t%e +o!$ie!+e
t%"t t%e !e' ).)tem 'i## 'or> e$$e+ti-e#.4 T%ere "re pro-i)io!) $or perioi+ e-"#u"tio! o$ t%e
)o$t'"re "$ter imp#eme!t"tio!4 T%i) pro+e)) e-"#u"te) t%e ).)tem@) per$orm"!+e "("i!)t
pree$i!e re&uireme!t)4 T%e )o$t'"re u)e i! SPS i) p#"t$orm i!epe!e!t %e!+e
imp#eme!t"tio! i) e").4 U!#i>e ).)tem
te)ti!(5 '%i+% etermi!e) '%ere t%e ).)tem $"i#) )o t%"t !e+e))"r. "6u)tme!t) +"! be m"e5
e-"#u"tio! etermi!e) %o' 'e## t%e imp#eme!te ).)tem +o!ti!ue) to meet t%e per$orm"!+e
Security Processing System Kohinoor Business School 52
)pe+i$i+"tio!)4
MAINTENANCE
So$t'"re m"i!te!"!+e i) t%e moi$i+"tio! o$ " )o$t'"re prou+t "$ter e#i-er. to +orre+t $"u#t)5
to impro-e per$orm"!+e or ot%er "ttribute)5 or to ""pt t%e prou+t to " moi$ie e!-iro!me!t4
T%e >e. )o$t'"re m"i!te!"!+e i))ue) "re bot% m"!"(eri"# "! te+%!i+"#4 ;e. m"!"(eme!t
i))ue) "re: "#i(!me!t 'it% +u)tomer prioritie)5 )t"$$i!(5 '%i+% or("!i,"tio! oe) m"i!te!"!+e5
e)tim"ti!( +o)t)4 ;e. te+%!i+"# i))ue) "re: #imite u!er)t"!i!(5 imp"+t "!"#.)i)5 te)ti!(5 "!
m"i!t"i!"bi#it. me")ureme!t4
M"i!te!"!+e i!-o#-e) " 'ie r"!(e o$ "+ti-itie) i!+#ui!( +orre+ti!(5 +oi!(5 "! e)i(!
error)5 up"ti!( o+ume!t"tio! "! te)t "t"5 "! up(r"i!( u)er )upport4 M"i!te!"!+e i) o!e
"$ter t%e )u++e)) imp#eme!t"tio!4 M"i!te!"!+e i) +o!ti!ue ti## t%e prou+t i) ree!(i!eere or
ep#o.e to "!ot%er p#"t$orm4 M"i!te!"!+e i) "#)o o!e b")e o! $iBi!( t%e prob#em) reporte5
+%"!(i!( t%e i!ter$"+e 'it% ot%er )o$t'"re or %"r'"re e!%"!+i!( t%e )o$t'"re4
I! t%i) ).)tem t%ree t.pe) o$ M"i!te!"!+e) bei!( o$$ere:
Corre+ti-e M"i!te!"!+e:/Error) t%"t +reep i!to t%e ).)tem "re remo-e4
A"pti-e M"i!te!"!+e :/To A"pt t%e C%"!(i!( EBter!"# F"+tor)4
Per$e+ti-e M"i!te!"!+e:/To S"ti)$. t%e U)er)
3.OB1ECTIVE AND IMPORTANCE OF PRO1ECT
Objective
Security Processing System Kohinoor Business School 53
T%e ob6e+ti-e o$ m. )tu. i) to $i! "! "!"#.,e '%. peop#e )ti## re)i)t to m">e pur+%")e) or
tr"!)"+tio!) -i" i!ter!et "! '%et%er )e+urit. pro+e))i!( ).)tem 'i## %e#p i! bri(i!( t%e ("p
bet'ee! it4
Importance of the project
T%e pro6e+t 'i## pro-ie t%e "!"#.)i) o$ '%"t i) t%e m"i! re")o! '%. peop#e o!@t m">e "!.
pur+%")e) or "!. >i! o$ tr"!)"+tio!) -i" i!ter!et "! 'ou# ).)tem) #i>e )e+urit. pro+e))i!(
).)tem '%e! imp#eme!te 'i## %e#p bri!( b"+> t%e +u)tomer +o!$ie!+e i! o!#i!e
tr"!)"+tio!)Epur+%")e "! 'i## %e#p t%em i! m">i!( )e+ure tr"!)"+tio!) e")i#.4
Scope of the Project
T%e per$orm"!+e o$ t%e ).)tem i) pro-e to be e$$i+ie!t4 A## t%e Pro$i#e) re+ei-e "!
o-er"## be!e$it t%rou(% t%e ).)tem4
T%e ).)tem pro-ie) $#eBibi#it. $or i!+orpor"ti!( !e' $e"ture)5 '%i+% m". be !e+e))"r.
i! $uture4 I! t%i) propo)e ).)tem5 to )%o' t%e o!#i!e tr"!)"+tio! )pe+i$i+"##. "!
eB"mp#e o$ boo> )%op t">e!4
T%e SPS ).)tem +"! be e&u"##. be!e$i+i"# $or "!. t.pe o$ o!#i!e tr"!)"+tio! $or
eB"mp#e o!#i!e bi##i!(5 o!#i!e re)er-"tio!5 o!#i!e )%oppi!( et+ T%u) t%e )e+ure
pro+e))i!( ).)tem i) $#eBib#e "! +"! be i!+orpor"te 'it% !e' $e"ture) i! t%e $uture4
T'o/$"+tor Aut%e!ti+"tio! +ou# reu+e t%e i!+ie!+e o$ o!#i!e ie!tit. t%e$t "! ot%er
o!#i!e $r"u i! $uture
T'o F"+tor Aut%e!ti+"tio! i) +o)t e$$e+ti-e "! +"! be "e to +o!)umer !et'or>
'it%out " +o)t#. i!$r")tru+ture i!-e)tme!t4
T'o F"+tor Aut%e!ti+"tio! i) more u)er) $rie!#. to u)er) '%o re)i)t %"-i!( t%eir
per)o!"# i!$orm"tio! +"pture "! u)e $or "ut%e!ti+"tio! purpo)e)4
4. Research methodology
Security Processing System Kohinoor Business School 54
Type //// EBp#or"tor.7Ju"!tit"ti-e8
Sample Size ---- S"mp#e Si,e t"r(ete i) 014
Approach ---- Ju"#it"ti-e "t" 'i## be +o##e+te $rom )e+o!"r. )our+e) #i>e #iter"ture "!
'eb)ite) "! &u"!tit"ti-e "t" 'i## be +o##e+te $rom prim"r. )our+e) #i>e i!ter-ie') "!
)ur-e.)4
Sources of data * Prim"r. "t"ESe+o!"r. "t"
Prim"r. "t"/ Prim"r. "t" i) " $ir)t %"!e +o##e+te "t"4 Prim"r. "t" "re obt"i!e $rom t%e
peop#e '%o %"-e o!e o!#i!e )%oppi!( or tr"!)"+tio!)4
Se+o!"r. 9"t" / Se+o!"r. "t" "re t%o)e "t"5 '%i+% %"-e bee! +o##e+te "! +ompi#e
e"r#ier $or )ome ot%er purpo)e b. -"riou) )our+e)4 I %"-e +o##e+te t%e )e+o!"r. "t" %ere i!
$o##o'i!( '".):
<eb re)our+e)
Comp"!. 6our!"#)
Method of data collection * Stru+ture &ue)tio!!"ire)
Sampling Method *Co!-e!ie!+e S"mp#i!(
5.Data Analysis And findings
Security Processing System Kohinoor Business School 55
1. Percentage People who have shopped or never shopped online?
Peop#e S%oppe o!#i!e T
Peop#e !e-er )%oppe o!#i!e 02
People Shopped
online
30%
People never
shopped online
70%
People Shopped online
People never shopped
online
T%e tot"# !o o$ peop#e )ur-e.e '") 314Out o$ 31 peop#e &ue)tio!e re("ri!( t%eir i!tere)t i!
o!#i!e )%oppi!( $or "!. prou+t)5 'e $ou! t%"t "#mo)t L1U per+e!t peop#e %"-e !e-er
)%oppe o!#i!e '%i+% i) " %u(e !umber "! o!#. 31U %"-e )%oppe o!#i!e "t #e")t o!+e4
2. The reason we tried to found out from the people who shop online?
0ABL "-"i#"bi#it. 0
9oor )tep e#i-er. 0
E"). p".me!t optio!) C
Reason for which people shop online
0
2
4
6
24x7 availability Door step delivery Easy payment options
Reasons to shop online
N
o
.
o
f
p
e
o
p
l
e
Series1
Security Processing System Kohinoor Business School 56
I! "bo-e +%"rt 'e +"! )ee t%"t m"!. peop#e pre$er to )%op o!#i!e be+"u)e o$ e"). p".me!t
optio!) "-"i#"b#e "! "#)o ue to oor )tep e#i-er. "! it) 0ABL "-"i#"bi#it.4 )o e!)uri!( t%"t
t%e tr"!)"+tio!) per$orme i) )"$e i) " mu)t i! o!#i!e )%oppi!(4
3. We also tried to find the main reason why so many people won't like to shop online
No Tru)t 'it% p".me!t optio!) 23
No tru)t i! e#i-er. 3
C"!Ft )ee or tr. prou+t C
Reasons for People not shopping online
13
3
5
0
5
10
15
no r!st "ith payment
options
no tr!st in deleivery #ant see or try prod!#t
Reasons to not shop
N
o
.
o
F
p
e
o
p
l
e
Series1
Interpretation
I! t%e "bo-e +%"rt 'e +"! "("i! )ee t%"t m"6orit. o$ t%e peop#e )ur-e.e 'ou# !ot #i>e to )%op
o!#i!e be+"u)e o$ o!#. re")o! t%"t i) !o tru)t i! tr"!)"+tio!) per$orme -i" mobi#e Ee)>top -i"
i!ter!et5 )i!+e t%e. $ee# t%e. "re pro!e to +.ber )e+urit. t%re"t) '%i+% m". +"u)e t%em " bi(
#o))4 T%e ot%er re")o!) "re e#i-er. i) !ot (u"r"!tee "$ter mo!e. eu+tio! $rom t%e "++ou!t
"! "#)o t%e. +"!Ft %"-e p%.)i+"# $ee# o$ t%e prou+t4
4. When asked whether they would like to shop online if they are guaranteed securities
Security Processing System Kohinoor Business School 57
by putting in security factors like two factor authentication in place?
With SPS system implemented the no.of people who
wil shop online
y
$0%
%
20%
y
%
Interpretation
From "bo-e +%"rt 'e +"! )ee t%"t K1U o$ peop#e 'ou# pre$er to )%op o!#i!e 'it% ).)tem) #i>e
t'o $"+tor "ut%e!ti+"tio! i) u)e '%i#e per$ormi!( tr"!)"+tio!)4 Peop#e be#ie-e t%"t t%i) )e+urit.
pro+e))i!( ).)tem 'i## %e#p t%em i! per$ormi!( )e+ure tr"!)"+tio!)
5. We explained them how two factor authentication system works and asked them to
rate it from their point of view in terms of its effectiveness
-er. %i(% T
%i(% 22
!eutr"# L
#o' 3
Security Processing System Kohinoor Business School 58
People's belief in SPS System
&
11
7
3
0
2
4
6
$
10
12
very hi'h hi'h ne!tral lo"
Series1
Interpretation
From "bo-e +%"rt 'e +"! )ee t%"t t%e peop#e) be#ie$ i! SPS S.)tem i) %i(% e-e! t%ou(% it) !ot
-er. %i(%4 T%i) +#e"r#. )%o') t%"t )ome eBtr" #".er o$ )e+urit. i) t%e !ee o$ time $or
m"i!t"i!i!( .our +u)tomer) "t" +o!$ie!ti"# "! $or (ro'i!( .our bu)i!e)) )i!+e it 'i##
i!+re")e t%e )"#e) o!e -i" o!#i!e ("i!i!( +u)tomer +o!$ie!+e "! (i-i!( +u)tomer t%e
)"ti)$"+tio! "! #ei)ure ") re&uire4
T%e be#o' me!tio!e &ue)tio!) '") ")>e to or("!i,"tio! '%i+% %"-e imp#eme!te t%i) !e'
).)tem to m"i!t"i! )e+urit. $or t%eir "t" "! $or t%eir o!#i!e e/bu)i!e))
1. Do you find any difference in your sales and profit margin after implementing
these system?
<e (ot " 211U .e) "!)'er $or t%e)e
Security Processing System Kohinoor Business School 59
2. What was your previous sales revenue generated before implementing these SPS
Systems
No.of companies with revenues before SPS
implementation
3
2
0
0(5
1
1(5
2
2(5
3
3(5
)5 la*hs )2 la*hs
Rupees in lakhs
N
o
.
o
f
o
m
p
a
n
y
Series1
<e )ur-e.e C or("!i,"tio!) '%o %"-e imp#eme!te t%i) SPS i4e4 t'o $"+tor "ut%e!ti+"tio! i!
t%eir ).)tem)4 Out o$ C +omp"!ie) )ur-e.e t%e )"#e) o$ 3 +omp"!. '") #e)) t%"! C #">%) "! 0
+omp"!ie) 'it% )"#e) re-e!ue #e)) t%"! 0 #">%) be$ore imp#eme!t"tio! o$ SPS i! t%eir ).)tem)4
3. What is your current sales revenue generated after implementing these SPS
Systems?
Security Processing System Kohinoor Business School 60
ompanies with revenue after SPS implementation
0
1
2
3
4
)15 la*hs )10 la*hs
Rs in lakhs
N
o
.
o
f
o
m
p
a
n
y
Series1
From t%e "bo-e +%"rt 'e +"! )ee t%"t "$ter imp#eme!ti!( SPS ).)tem)5 out o$ $i-e +omp"!ie)
)ur-e.e 3 +omp"!ie) i!+re")e t%eir )"#e) re-e!ue +o!)ier"b#. "! "#)o ot%er t'o +omp"!ie)
per$orme mu+% better t%"! t%eir )"#e) re-e!ue be$ore imp#eme!ti!( t%e ).)tem4
From t%e "bo-e t'o +%"rt) 'e +"! +#e"r#. )ee t%e i$$ere!+e bet'ee! re-e!ue) (e!er"te
be$ore t%e SPS imp#eme!t"tio! "! "$ter it) imp#eme!t"tio!4
Conclusion
Security Processing System Kohinoor Business School 61
SPS #i>e T'o F"+tor Aut%e!ti+"tio! Stro!( "ut%e!ti+"tio!5 "#)o +"##e 0/F"+tor
Aut%e!ti+"tio!5 '%i+% +ombi!e) 'it% " known factor authentication 7)u+% ") "
Username "! Password8 'it% " onetime key generator device 7)u+% ") " to>e!5 or
mobi#e p%o!e i) imp#eme!te to pro-ie e!%"!+e )e+urit. to e! u)er) ") 'e## ")
member)4
T'o/$"+tor Aut%e!ti+"tio! +ou# reu+e t%e i!+ie!+e o$ o!#i!e ie!tit. t%e$t "! ot%er
o!#i!e $r"u4
Co)t e$$e+ti-e!e)) * T'o F"+tor Aut%e!ti+"tio! +"! be "e to +o!)umer !et'or>
'it%out " +o)t#. i!$r")tru+ture i!-e)tme!t4
T'o F"+tor Aut%e!ti+"tio! i) more u)er) $rie!#. to u)er) '%o re)i)t %"-i!( t%eir
per)o!"# i!$orm"tio! +"pture "! u)e $or "ut%e!ti+"tio! purpo)e)4
A#)o t%e prob#em '%i+% +ou# be "m"(i!( i) i$ t%ere "ri)e) " prob#em i! t%e )er-er t%e!
"## t%e "pp#i+"tio!) 'i## be imp"+te b. it4 So proper b"+> up "! %"!#i!( i) re&uire4
16. Recommendation
Security Processing System Kohinoor Business School 62
T'o $"+tor "ut%e!ti+"tio! ).)tem i) " u)er/$rie!#. p"+>"(e "! re&uire) #itt#e prior
>!o'#e(e o$ )o$t'"re4 It "##o') )"$e "! e"). o!#i!e tr"!)"+tio! o$ mo!e. 'it% #e")t t%re"t o$
bei!( %"+>e4 T%e ).)tem i) %i(%#. $#eBib#e "! i) 'e## e$$i+ie!t to m">e e"). i!ter"+tio!) 'it%
t%e "t"b")e4 T%e (o"# o$ +omputer )e+urit. to m"i!t"i! t%e i!te(rit.5 "-"i#"bi#it. "! pri-"+. o$
i!$orm"tio! e!tru)te to t%e ).)tem i) )u++e))$u##. obt"i!e4 It %e#p) i! ("i!i!( +u)tomer
+o!$ie!+e b. m">i!( t%eir tr"!)"+tio!) e")i#. t%"t too )"$e "! )e+ure#. b. imp#eme!ti!( it "t
tr"!)"+tio! #e-e#4 T%i) %e#p) i! m"i!t"i!i!( (oo +u)tomer re#"tio!)%ip "! "#)o i! "+&uiri!(
!e' +u)tomer b")e4 T%i) ).)tem i) #e")t pro!e to %"+>i!( )o it 'i## be " -er. (oo ie" $or o!#.
t%e +omp"!ie) to imp#eme!t it e-e! i! or("!i,"tio! "t #o(i! #e-e# to m"i!t"i! t%eir "t" )"$e
"! )e+ure )o t%"t it +ou# !ot be %"+>e4
Questionnaire
Security Processing System Kohinoor Business School 63
Age Gender
1.Have your ever shopped online?
"4 Ye)
b4 No
2.If yes, Why?
"4 0ABL A-"i#"bi#it.
b4 9oor )tep e#i-er.
+4 9i)+ou!t)
4 E"). P".me!t Optio!)
e4 Cu)tomi,"tio!
$4 Not App#i+"b#e
3.If No, Why?
"4 No tru)t 'it% e#i-er.
b4 No tru)t 'it% &u"#it.
+4 Per)o!"# i!$orm"tio! i) eBpo)e
4 C"!Ft )ee or tr. t%e prou+t
e4 No tru)t 'it% p".me!t optio!)
$4 Not "pp#i+"b#e
4.With SPS system in place would you now like to shop online since it claims to be 100
safe method?
"4 Ye)
b4 No
1. Rate the SPS system according to your belief in the system`s safety
"4 Ver. %i(% b4 Hi(% +4 Neutr"# 4 Lo' e4 Ver. Lo'
Questionnaire for Sales and marketing Department
Security Processing System Kohinoor Business School 64
1. Do you find any difference in your sales and profit margin after implementing these
system?
"4 .e)
b4 !o
2. What was your previous sales revenue generated before implementing these SPS
Systems
"4 0/ C #"+)
b4 C/21 #"+)
+4 21/2C #"+)
4 2C/21 #"+)
3. What is your current sales revenue generated after implementing these SPS Systems?
"4 0/ C #"+)
b4 C/21 #"+)
+4 21/2C #"+)
4 2C/21 #"+)
Security Processing System Kohinoor Business School 65
17.Bibliography
C R Kothari - Research methodology
Ranjit Kumar - Research Methodology
Bruce Scheneier- Computer Security
'''4boo>)4(oo(#e4+om
'''4#e"r!Bpre))4+om
'''46t)4our+e$or(e4!et
'''4e!4'i>ipei"4or(
Security Processing System Kohinoor Business School 66