[Last Call] Learn how to a build a cloud-first strategyRegister Now


What are all the procedures,precautionary measures and how to develop Internet banking

Posted on 2009-04-16
Medium Priority
Last Modified: 2012-06-21
What are all the procedures,precautionary measures and how to develop Internet banking
using JSP/ASP/ASP.net/Java?

Any guide regarding Internet banking, please share.
Question by:umesh4exp
LVL 31

Assisted Solution

by:Wayne Barron
Wayne Barron earned 300 total points
ID: 24164950
java - Only for certain function but not secruity.
ASP, ASP.NET - For your security. Make sure that you have a SSL backened.
SQL Server for your Database would be the best route to go.

The main thing on the server side is to connect to the database that holds the accounts.

This sounds like a very interesting concept.
Would be a great project (Interested maybe), but this would be something that you would either do yourself
(or) Have someone to do for you but would be a charged item. (Pay)

Once you connect to the Database that holds the accounts, everything else should be rather simple to accomplish I would think.

Good Luck
LVL 54

Accepted Solution

Ryan Chong earned 750 total points
ID: 24164989
I was doing some web applications for a global bank before, on their regional side, they were using Java (JSP/Java Bean) + Oracle.

for internet banking, for sure you need a https SSL certificate.

some of the internet banking provides "second factor" authentication, where after you logged in with your primary password, you will then requires to enter a secondary password (either send to your authorised mobile device, or devices they provided to you,etc) for further transactions.
LVL 12

Assisted Solution

R_Harrison earned 450 total points
ID: 24165717
Regardless of authenication methods, you're going to need to know about session hijacking, sql injection, etc as well as server security...  Otherwise hackers will find a way in.

Most languages can be secure if programmed correctly, but you will need to work out all the vunerabilities before you start coding and ensure you code to a standard that covers them.   Also, keep your databases encrypted, and use code to decrypt it on the fly so if anybody does gain access to the core database it is useless.

Get an approved specialist company to due penetration testing and vunerability testing once you have completed the project to ensure everything is secure.

Author Comment

ID: 24202023
Do you have any sample blue print on the same

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When the s#!t hits the fan, you don’t have time to look up who’s on call, draft emails, call collaborators, or send text messages. An instant chat window is definitely the way to go, especially one like HipChat. HipChat is a true business app. An…
Strategic internal linking is often considered an SEO power technique, especially for content marketing. Do you need to hire an SEO agency to optimize you internal linking? No, this article will help you understand the basics of internal linking and…
This video teaches users how to migrate an existing Wordpress website to a new domain.
This tutorial will teach you the core code needed to finalize the addition of a watermark to your image. The viewer will use a small PHP class to learn and create a watermark.
Suggested Courses
Course of the Month18 days, 12 hours left to enroll

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question