Synopsisx - DotNetSpider

noiseboliviaSecurity

Nov 5, 2013 (3 years and 8 months ago)

83 views





















Synopsis



Name :

MEERA YADAV





Enrollment number:
051383660






Indira
Gandhi National Open University

TITLE


ON LINE CALL CENTER & BPO AUTOMATION

Introduction


This project contains more data in different field .If a user has any query or
problem,
he can write a query on the site by using facility support .The project
provides enough security .Any facility can be accessible to the user only after
login. This

proje
ct can manipulate the various task like the personal information,
books, tourism, cricket , movies and about the on line query and report
generation .


Objectives


The basic objective of this project is that we can gather the various kinds of
the
information from a single place, just like the call centers, where we make a
call and we ask about our need and then they give us the full information about
the related topics, for example, if we need to know how many tourist places in
delhi, we just have
to make a call to the call center and ask our question they give
us the full details, so here we prepare a global we site to gather the information of
the various kinds in just one place.

For easy and convenient processing we need to develop software which

works
as per our requirements. While preparing this software we got to remember few
things i.e. this software must have a friendly environment, in other words it
should not be much complicated to handle, it should have options for future
modifications . F
or smooth functioning, we had to prepare a database by which
we could enter the required data in their respective locations. so that we can use
them whenever needed. From security point of view this software has a special

login name and password allot
ted. Other than those no one could use this and on
entering an illegal password or login name an error message get displayed.

Analysis



Problem Statement

If we want to gather the information’s about the tourism, cricket news,
personal information etc.It is
very touch to get it because there is no place
to collect the information in quick manner.

The current system also fails in that manner to send a highly confidential
note to the administrative officers.

The current system is too time taking, much more man
power and less
secured.



Requirement Analysis



Collection of the data for the various details

Collection of the group of information for cricket, tourism, movies, books etc.

Project

Category


Multimedia cum Web Technology and Expert System for Network The
pr
oposed system comes under Multimedia cum Web Technology and Expert
System for Network category, as there is need to manipulate the transaction on
line network based for multi
-
user and faster and the quires output in quick
successive time and also the highl
y secured
.


Tools/Platform, Languages to be used


a)

Operating System

The proposed software is targeted to run on Windows 9x, Windows NT version
4.0 (Server/Workstation) and Windows 2000 (Professional/Server) editions.


b)

Front End

HTML
as Front end tools

c) Back End Script

JSP

as scripting

JDBC

as Database Connectivity

d)

Client side scripting

JavaScript as client side scripting

e)

Back End (Central Repository)

SQL server is being used as Back End for application’s central repository. The reasons
to choose it
as back
-
end are:

a)

It is very simple to maintain.

b)

It is highly secured.

c)

It can support and manage a large amount of data.

d)

It is a very scalable product and can support as many number of users as supported
by the infrastructure.

The web server uses for the cl
ient and server connectivity.


Hardware & Software Requirements


The system requirements for running this software includes



Ms WindowsXP or later.




Web browser



Java 5.0




MS SQL Server



Pentium Processor PI, PII, PIII, PIV with Ms Windows NT workstation.



CD
ROM Disk Drive



VGA Monitor or higher resolution screen supported by Ms Windows



16 MB RAM for Win95, 32 MB for Win NT




A mouse or a pointing Device



40 GB HDD,3
1/2
Floppy

Drive



A Printer for printing Reports


Number of Modules and their description

The
module structure

The project is basically deals with the various BPO tasks like to access the
information about the cricket, movies, news, etc.



A)


User login module

:

In this face, existing user gives the user
-
name and password and can access
the other details and if he is current user then first he would have to register
himself by option Registration module.


B)

Registration module

:

This module gives a registration for
m to the user for the Registration. After a
unique user
-
name and password he would be registered by which he would be
login .


C)

Search module

:

Search facility on the main page to check the availability of the field in the
database and if that field is not available , message is generated . It works as a
search engine for some fields, this module deals with the various information
ON LINE BPO

LEVELS

USER LEVEL

SEARCHING DETAILS
RELATED TO THE
CRICKET, NEW,
SHOPPING ETC

SEARCH ENGINE FOR
VARIOUS ON LINE
SEARCH

GATHERING THE
INFORMATION RELATED
TO THE EBOOKS,
TOURISM, MOVIES

ADMINISTRATOR LEVEL

IT CAN CREATE NEW
USER AND PROVIDES
THE VARIOUS KINDS OF
THE SECURITY

THE ADMIN. CAN ALSO
PUT THE DATA RELATED
TO THE EBOOKS,
TOURISM, MOVIES

IT CAN ALSO MANAGE
THE VARIOSU KINDS OF
REPORTS


gathering like r
etrieval of information like, new, cricket, just by typing the related
topics.


D) About us :

This module covers the information of the website owner and the purpose of the
creation of the website.


E)


News

:

In this module, the user can access the current
news or previous news according
to their need .In this Module we create external link to the external website that
already registered at the web world.



F)


Shopping :

This module gives the facility of shopping, so user can interact through the
shopping
facility and in this module we create external link to the external website
that already registered at the web world, the module deals with the world of the
online shopping just like the various other web sites like, rediff.com, yahoo.com
that provides the

on line shopping to convenient the user to purchase any item.


G)


Chatting
:

In this module user can chat with the other person. Through this attractive
feature of module user can link to other user .In this module we also create a
external link to the exte
rnal website that already registered at the web world.


H)

Entertainment
:

In this module user can access the entertainment in different field and in this
module we also create a external link to the external website that already registered
at web world





MODULES AFTER LOGIN BY USER


1)

Personal Information

:


In this module, personal information is arranged in a place and user can
access the information by enter the id
-
no. In the search box.,
in the case we put the
information of the personal related to the particular organization and any one can
retrieve the information from this module, just like the various offices web site.


2)

Books :

In this module, user can access the book details by enter

their type, for
example as we here that we can access the any books data from the internet, we
provides the user to access our website and retrieve the any topics information,
just by clicking, this feature is just like the various websites like bp.com,
t
echmedia.com


3)

Tourism :

In this module, the user can access the different tourist places according to
their need and can gain more knowledge through the tourist places.



4)

Movies :

In this module, the user can access the information and details of the movie
s
according to their need.

5)

Cricket :

This module gives the knowledge to the user in the cricket field.


6)


Search :

This module gives the facility of searching of that field .Through this
module user can search that field content which he want. It works

L
ike a search engine.



MODULES AFTER LOGIN
BY ADMINISTRATOR


Administrator :

Administrator controls all the details of the project. In other words it
controls over all working of the project.



1)

personal information

:

This
module stores the personal information of the person and facilitate the
user that he can access the details . In this module entry editing and deletion of
the new and old details can be done only by the admin.


2)

Books :

This module contains the information

of different books, the admin store the
data of the various books, so that we can access the information in future.

3)

Tourism :

This module stores the information of different tourist places. Through this
module user can access the details of tourist places

of any city .


4)

Movies :

This module store the detail information about the movies and user can take
the different information about the movies.

5)

Cricket :

This module store the information of cricket at different level.The levels are
like player profile
and match profile .


Security Module



This module handles the security features of software. It checks for
unauthorized login/accesses, unauthorized deletion/editing of records,
defining the access permissions to users, etc.


Reporting Module

This module
handles the process of all types of report generation. By this
module the user/admin can got the print of the user desired quaries like for
personal information, cricket , tourism , movies and books .These reports are
very beneficial for both user and the
admin


Future Scope of the Project

To develop this project I had used two very convenient, reliable and
technical languages. These are Web Technology and SQL Sever. These
languages are such developed so that they could be used for a long time. This
allows
my software a long time event. In this way
,
this software can be used by
any organization.

SECURITY MEASURES


Security

constraints guard against accidental or intentional
tampering with data whereas
integrity

constraints ensure that any properly authorized

access,
alteration, deletion, or insertion of the data in the database does not change the consistency and
validity of the data.

Accidental Security And Integrity Threats
.


Improper Authorization: The administrator can accidentally give improper
authoriza
tion to a user, which could lead to database security and/or integrity violations.

Hardware failures, For example, memory protection hardware that fails could lead to software
errors and culminate in database security and or integrity violation, Intentiona
l Security And
Integrity Threats.



A computer system operator or system programmer can intentionally bypass the
normal security and integrity mechanisms, alter or destroy the data in the database, or make
unauthorized copies of sensitive data.


An unauth
orized user can get access to a secure terminal or to the password of an
authorized user and compromise the database. Such users could also destroy the database files.


We have used some security schemes to avoid above threats for
database and application.

Database Security:


In Database security, we have secure data and data integrity.

Authentication
: The simplest and most common authentication scheme used is User name &
Password to authenticate the user.

Application Security:

Application security
is quite different from database security. Application security focuses on
securing not only data but also processes.


Security constraints
:

We have some constraints in security for database and application.

I. We cannot secure system files of operating

system and application.

II. Hardware Security.


Bibliography



Complete reference to
JSP



JS reference book



Complete reference to
JDBC



On line eBooks’.