What are all the procedures,precautionary measures and how to develop Internet banking

Posted on 2009-04-16
Last Modified: 2012-06-21
What are all the procedures,precautionary measures and how to develop Internet banking
using JSP/ASP/

Any guide regarding Internet banking, please share.
Question by:umesh4exp
    LVL 30

    Assisted Solution

    by:Wayne Barron
    java - Only for certain function but not secruity.
    ASP, ASP.NET - For your security. Make sure that you have a SSL backened.
    SQL Server for your Database would be the best route to go.

    The main thing on the server side is to connect to the database that holds the accounts.

    This sounds like a very interesting concept.
    Would be a great project (Interested maybe), but this would be something that you would either do yourself
    (or) Have someone to do for you but would be a charged item. (Pay)

    Once you connect to the Database that holds the accounts, everything else should be rather simple to accomplish I would think.

    Good Luck
    LVL 48

    Accepted Solution

    I was doing some web applications for a global bank before, on their regional side, they were using Java (JSP/Java Bean) + Oracle.

    for internet banking, for sure you need a https SSL certificate.

    some of the internet banking provides "second factor" authentication, where after you logged in with your primary password, you will then requires to enter a secondary password (either send to your authorised mobile device, or devices they provided to you,etc) for further transactions.
    LVL 12

    Assisted Solution

    Regardless of authenication methods, you're going to need to know about session hijacking, sql injection, etc as well as server security...  Otherwise hackers will find a way in.

    Most languages can be secure if programmed correctly, but you will need to work out all the vunerabilities before you start coding and ensure you code to a standard that covers them.   Also, keep your databases encrypted, and use code to decrypt it on the fly so if anybody does gain access to the core database it is useless.

    Get an approved specialist company to due penetration testing and vunerability testing once you have completed the project to ensure everything is secure.

    Author Comment

    Do you have any sample blue print on the same

    Featured Post

    What Should I Do With This Threat Intelligence?

    Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

    Join & Write a Comment

    Suggested Solutions

    Popularity Can Be Measured Sometimes we deal with questions of popularity, and we need a way to collect opinions from our clients.  This article shows a simple teaching example of how we might elect a favorite color by letting our clients vote for …
    This demonstration started out as a follow up to some recently posted questions on the subject of logging in: and…
    This video teaches users how to migrate an existing Wordpress website to a new domain.
    The viewer will learn how to create and use a small PHP class to apply a watermark to an image. This video shows the viewer the setup for the PHP watermark as well as important coding language. Continue to Part 2 to learn the core code used in creat…

    746 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now