SlideShare ist ein Scribd-Unternehmen logo
1 von 54
Banking Management System
Topic
Definition1
importance2
Implement3
Requirements4
Face problems
5
ER-Diagram6
Contents
Entities & attribute7
Modeling8
S.Q.L
9
Conclusion
10
Question answer
11
Contents
Over View
Collection of information
that is organized so that it
can easily access.
Data store in tables,rows
And column
Data Base
 A database management system (DBMS) is system
software.
 Creating and managing databases.
 The DBMS provides users and programmers with a
systematic way to create, retrieve, update and
manage data.
Definition of DBMS1
Importance of DBMS2
 A database management system is important because
 It helps make data management more efficient and effective.
 A database management system stores.
 organizes and manages a large amount of information within a
single software application.
 Use of this system increases efficiency of business operations and
reduces overall costs.
Importance of DBMS2
 Analyze user environment.
 Develop logical model.
 Choose DBMS.
 Map logical model DBMS.
 Develop physical Design.
 Evaluate Physical Model.
 Tune System.
 Implement System.
3 Implement
 Customer
 Banker-info
 Branch
 Loan
 Credit-Card
 Account
Requirements BMS4
 Verification of documentation.
 Customer service representative / Personal banker
Clearing , Account opening , online transfers etc.
 Forms of special crossing cheques.
 Customer debit and credit problem.
 Employee is not efficient.
 Customer Communication problem face.
Face a Problems5
 They do not communication with us accurate time.
 Death of any person.
 Verification of Deduction of Zakat.
 Provision for Bad Debit.
 Missing Vouchers.
 Verification of lockers facilities.
Face a Problems5
ER-Diagram6
1: ENTITIES (Customer)
ATTRIBUTES (Customer-id , Customer-name , Customer-street , Customer-city)
2: ENTITIES (Banker-info)
ATTRIBUTES (Banker-name , Banker-email , Banker-id)
3: ENTITIES (Branch)
ATTRIBUTES (Assets , Branch-name , Branch-city)
4: ENTITIES (Loan)
ATTRIBUTES (loan-number , Amount)
5: ENTITIES (Credit-Card)
ATTRIBUTES (Expired-date , Limit , Credit_card_number )
6: ENTITIES (Account)
ATTRIBUTES (Balance , Account-number , Category)
Entities & attribute7
 Representation of real world objects, event and their
association called molding.
 It helps the user understand the complexities.
 Used to as a communication tool.
 Good data model enables the users to understand the
organization.
 For which the data base design is developed.
 Good data model very necessary to design the data base.
Modeling8
Importance of Data model
Types of data model
 Object-based Data model
 Record based model
 Physical Data model
Object based Data Model
 Object based model use the concept.
 Like Entities, attributes, relationship
 Entities
Person, place, things, for which data is collected.
 Attribute
The characteristics of entity is called attribute.
 Relationship
The association b/w two or more entity.
Record based data model
 Used to describe external and conceptual level of data
base.
 Also use to describe internal level to some extent.
 They are used to develop and logical structure.
 The record may different type.
 Each record types define of fixed number of field.
Types of Record based
 Hierarchical Model
 Network model
 Relational model
(In our project we use the relational model)
Physical Data model
 Describe the store the data in computer.
 They give information, such as record structure.
 They are not as many physical data model as logical data
model
S.Q.L9
S.Q.L (Structured Query Language)
S.Q.L
 S.Q.L stands foe Structured Query language.
 It is not full features programming language.
 It is simply data sub language
 SQL was developed by IBM.
 It endorsed as a national standard by ANSI
 (American national standard institution).
 New standard SQL3 also exists.
 The most widely implement of version of SQL is ANSI-92
 SQL is English-like language.
 It uses words Like SELECT, INSERT etc.
 SQL commands are not case Sensitive
 SQL provide commands for variety of task including.
o Inserting, updating, deleting row in a table.
o Creating, modifying, and deleting.
o Controlling access to the data base and data base object.
Features of S.Q.L
DDL (Data Definition Language)
 Data Definition Language (DDL) is a standard for
commands that define the different structures in a
database.
 DDL statements create, modify, and remove database
objects such as tables.
 Common DDL statements are CREATE, ALTER, and
DROP.
Create Statement:
Using Create statement, we can create a new table in the
database. The syntax of the Create statement is as follows.
Syntax:
CREATE TABLE <Table Name>
(Column 1 data type,
Column 2 data type,
Column 3 data type …
Column n data type);
DDL (Data Definition Language)
 Here, CREATE and TABLE are keywords.
 The table and column names must start with a letter and
can be followed by letters, numbers, or underscores.
 SQL reserved keywords should not be used as names for
tables and columns
DDL (Data Definition Language)
Alter Statement:
 Using alter statement we can do the following alterations
in our existing table.
 Adding a new column
 Renaming a column
DDL (Data Definition Language)
Adding a new column:
The syntax for adding a new column into the table is as
follows.
Syntax:
ALTER TABLE <Table name>
ADD(column 1 data type, column 2 data type, … column
n data type);
 Here, ALTER, TABLE and ADD are keywords.
DDL (Data Definition Language)
Renaming a column:
The syntax for renaming a column is as follows.
Syntax:
ALTER TABLE <Table name> RENAME COLUMN <old
name> TO <new name>;
 Here, ALTER, TABLE, RENAME, COLUMN and TO are
keywords.
DDL (Data Definition Language)
Drop Statement:
The drop statement is used to delete a table and all the
rows in the table.
Syntax:
DROP TABLE <Table name>
 Here, DROP and TABLE are keywords.
DDL (Data Definition Language)
DML (Data manipulation Language)
 The DML commands are used to insert and modify the data
in the database. It enables us to perform the following
tasks.
 Inserting a row or the values of particular columns into the
table (Using Insert statement)
 Updating values of columns in a table (Using Update
statement)
 Deleting rows in a table (Using Delete statement)
Syntax 1: (To insert values for the specified columns in a table)
INSERT INTO <Table Name> (column 1, column 2, … column n)
VALUES (value1, value2, … value n);
 Here, INSERT, INTO and VALUES are keywords.
DML (Data manipulation Language)
Update Statement:
The update statement is used to update or change
records that match specified criteria. This is accomplished
by using a WHERE clause.
Syntax:
UPDATE <Table Name>
SET column 1 = value 1, column 2 = value 2, … column 3 =
value 3
WHERE <condition>;
DML (Data manipulation Language)
Delete Statement:
The delete statement is used to delete the records or rows
from the table.
Syntax:
DELETE FROM <Table Name>
WHERE <Condition>
 Here, DELETE, FROM and WHERE are keywords.
DML (Data manipulation Language)
9
Security
Security
 Overview To Database Security.
 Why need of database security.
 What is Database Security.
 Concepts of Database Security.
Security9
Threats and risk to database have increased, So there is a
need for security of the database.
The majority companies store sensitive data in database.
If there is no
security to
database what
happens???
Data will be
easily corrupted
Overview
Security risk to database includes
Unauthorized database users
Unauthorized Database Administrator
Unauthorized access to Database
Lack of access to Database
services
Sensitive data includes
•Bank/Demat accounts
•Credit card, Salary,
Income tax data
•University admissions,
marks/grades
•Land records, licenses
Definition of Database Security
Database Security is defined as the
process by which “Confidentiality,
Integrity and Availability” of the database
can be protected.
Threats to database
Unauthorized access.
Password Cracking.
Network Eaves Dropping.
SQL Injection.

SQL Injection
A form of attack on a database-driven of insecure code on a system connected
to the Internet , bypassing the firewall Web site in which the attacker executes
unauthorized SQL commands by taking advantage.
3/4/2017
Vulnerabilities:
Poor Input validation to web
application.
Unsafe ,dynamically constructed
SQL commands.
Weak permissions that fail to
restrict the application to Database
Methods of securing the database
Authorization - privileges,
views.
Authentication – passwords.
Encryption - public key / private
key, secure sockets.
Logical - firewalls, net proxies.
3/4/2017Database security issues
Security of The Database Through Firewalls
A FIREWALL is dedicated software on another computer which inspects
network traffic passing through it and denies (or) permits passage based on set
of rules. Basically it is a piece of software that monitors all traffic that goes from
your system to another via the Internet or network and Vice Versa
Database Firewalls are a type of Web Application Firewalls that monitor
databases to identify and protect against database specific attacks that
mostly seek to access sensitive information stored in the databases.
How Database Firewall works
The Database Firewalls include a set of pre-defined, customizable security audit policies
and they can identify database attacks based on threat patterns called signatures.
The SQL input statements (or) queries are compared to these signatures, which are
updated frequently by the vendors to identify known attacks on the database.
But all the attacks on the databases may not be familiar.
Database Firewalls build (or come with) white list of approved SQL commands(or)
statements that are safe.
All the input commands are compared with this white list and only those that are already
present in the white list are sent to the database.
Diagrammatic Representation
DATABASES MANAGEMENT SYSTEM
Keys
DATABASES MANAGEMENT SYSTEM
Conclusion
10
Conclusion
 A DBMS is a systematic operational system which consists of tools
making data, data saving and data manipulation an easier task.
 DBMS is the majorly used through out the wold for data handling.
 Thus its a good data manager till today.
 If some one ask you question How do we protect data form crashes.
Bank mangement system
Bank mangement system

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Asp.net Lab manual
Asp.net Lab manualAsp.net Lab manual
Asp.net Lab manual
 
Jdbc ppt
Jdbc pptJdbc ppt
Jdbc ppt
 
DNS Presentation
DNS PresentationDNS Presentation
DNS Presentation
 
PHP MVC
PHP MVCPHP MVC
PHP MVC
 
Document Object Model (DOM)
Document Object Model (DOM)Document Object Model (DOM)
Document Object Model (DOM)
 
Php forms
Php formsPhp forms
Php forms
 
Linking in MS-Dos System
Linking in MS-Dos SystemLinking in MS-Dos System
Linking in MS-Dos System
 
HTML, CSS and XML
HTML, CSS and XMLHTML, CSS and XML
HTML, CSS and XML
 
JDBC ppt
JDBC pptJDBC ppt
JDBC ppt
 
Cisco packet tracer router
Cisco packet tracer  routerCisco packet tracer  router
Cisco packet tracer router
 
DML
DMLDML
DML
 
The structure of process
The structure of processThe structure of process
The structure of process
 
Music management system
Music management system  Music management system
Music management system
 
PHP file handling
PHP file handling PHP file handling
PHP file handling
 
Sql commands
Sql commandsSql commands
Sql commands
 
Web controls
Web controlsWeb controls
Web controls
 
DBMS Notes: DDL DML DCL
DBMS Notes: DDL DML DCLDBMS Notes: DDL DML DCL
DBMS Notes: DDL DML DCL
 
Introduction to Database Management System
Introduction to Database Management SystemIntroduction to Database Management System
Introduction to Database Management System
 
HTML and DHTML
HTML and DHTMLHTML and DHTML
HTML and DHTML
 
Configuration DHCP
Configuration DHCPConfiguration DHCP
Configuration DHCP
 

Andere mochten auch

Tesi magistrale Martino Marangon
Tesi magistrale Martino MarangonTesi magistrale Martino Marangon
Tesi magistrale Martino MarangonMartino Marangon
 
Evidence Seizure
Evidence SeizureEvidence Seizure
Evidence SeizureCTIN
 
My CorporateComm. Presentation Talk - for the UPM Final Student 2014
My CorporateComm. Presentation Talk - for the UPM Final Student 2014My CorporateComm. Presentation Talk - for the UPM Final Student 2014
My CorporateComm. Presentation Talk - for the UPM Final Student 2014Sharifah Zannurain Al Khred
 
MOU Between Voice of Women ( Malaysia) & World Muslimah Foundation (WMF)
MOU Between Voice of Women  ( Malaysia) & World Muslimah Foundation (WMF)MOU Between Voice of Women  ( Malaysia) & World Muslimah Foundation (WMF)
MOU Between Voice of Women ( Malaysia) & World Muslimah Foundation (WMF)Sharifah Zannurain Al Khred
 
marketing management
marketing managementmarketing management
marketing managementNavneet kaur
 
Presentation of DBMS (database management system) part 1
Presentation of DBMS (database management system) part 1Presentation of DBMS (database management system) part 1
Presentation of DBMS (database management system) part 1Junaid Nadeem
 
Data Base Management System(Dbms)Sunita
Data Base Management System(Dbms)SunitaData Base Management System(Dbms)Sunita
Data Base Management System(Dbms)SunitaApex
 
Enhanced E-R diagram
Enhanced E-R diagramEnhanced E-R diagram
Enhanced E-R diagramMayank Jain
 
Previous question papers of Database Management System (DBMS) By SHABEEB
Previous question papers of Database Management System (DBMS) By SHABEEBPrevious question papers of Database Management System (DBMS) By SHABEEB
Previous question papers of Database Management System (DBMS) By SHABEEBShabeeb Shabi
 
Distributed blood bank management system database
Distributed blood bank management system databaseDistributed blood bank management system database
Distributed blood bank management system databaseSaimunur Rahman
 
SYNOPSIS ON BANK MANAGEMENT SYSTEM
SYNOPSIS ON BANK MANAGEMENT SYSTEMSYNOPSIS ON BANK MANAGEMENT SYSTEM
SYNOPSIS ON BANK MANAGEMENT SYSTEMNitish Xavier Tirkey
 

Andere mochten auch (16)

Tesi magistrale Martino Marangon
Tesi magistrale Martino MarangonTesi magistrale Martino Marangon
Tesi magistrale Martino Marangon
 
Evidence Seizure
Evidence SeizureEvidence Seizure
Evidence Seizure
 
My CorporateComm. Presentation Talk - for the UPM Final Student 2014
My CorporateComm. Presentation Talk - for the UPM Final Student 2014My CorporateComm. Presentation Talk - for the UPM Final Student 2014
My CorporateComm. Presentation Talk - for the UPM Final Student 2014
 
MOU Between Voice of Women ( Malaysia) & World Muslimah Foundation (WMF)
MOU Between Voice of Women  ( Malaysia) & World Muslimah Foundation (WMF)MOU Between Voice of Women  ( Malaysia) & World Muslimah Foundation (WMF)
MOU Between Voice of Women ( Malaysia) & World Muslimah Foundation (WMF)
 
Marketing planning
Marketing planningMarketing planning
Marketing planning
 
The MEAN stack
The MEAN stack The MEAN stack
The MEAN stack
 
marketing management
marketing managementmarketing management
marketing management
 
Presentation of DBMS (database management system) part 1
Presentation of DBMS (database management system) part 1Presentation of DBMS (database management system) part 1
Presentation of DBMS (database management system) part 1
 
Data Base Management System(Dbms)Sunita
Data Base Management System(Dbms)SunitaData Base Management System(Dbms)Sunita
Data Base Management System(Dbms)Sunita
 
Enhanced E-R diagram
Enhanced E-R diagramEnhanced E-R diagram
Enhanced E-R diagram
 
enhanced er diagram
enhanced er diagramenhanced er diagram
enhanced er diagram
 
Previous question papers of Database Management System (DBMS) By SHABEEB
Previous question papers of Database Management System (DBMS) By SHABEEBPrevious question papers of Database Management System (DBMS) By SHABEEB
Previous question papers of Database Management System (DBMS) By SHABEEB
 
Distributed blood bank management system database
Distributed blood bank management system databaseDistributed blood bank management system database
Distributed blood bank management system database
 
Bank management system
Bank management systemBank management system
Bank management system
 
SYNOPSIS ON BANK MANAGEMENT SYSTEM
SYNOPSIS ON BANK MANAGEMENT SYSTEMSYNOPSIS ON BANK MANAGEMENT SYSTEM
SYNOPSIS ON BANK MANAGEMENT SYSTEM
 
Bank Management System
Bank Management SystemBank Management System
Bank Management System
 

Ähnlich wie Bank mangement system

Introduction to the Structured Query Language SQL
Introduction to the Structured Query Language SQLIntroduction to the Structured Query Language SQL
Introduction to the Structured Query Language SQLHarmony Kwawu
 
2nd chapter dbms.pptx
2nd chapter dbms.pptx2nd chapter dbms.pptx
2nd chapter dbms.pptxkavitha623544
 
Introduction to database with ms access.hetvii
Introduction to database with ms access.hetviiIntroduction to database with ms access.hetvii
Introduction to database with ms access.hetvii07HetviBhagat
 
Introduction to database with ms access(DBMS)
Introduction to database with ms access(DBMS)Introduction to database with ms access(DBMS)
Introduction to database with ms access(DBMS)07HetviBhagat
 
PPT SQL CLASS.pptx
PPT SQL CLASS.pptxPPT SQL CLASS.pptx
PPT SQL CLASS.pptxAngeOuattara
 
csedatabasemanagementsystemppt-170825044344.pdf
csedatabasemanagementsystemppt-170825044344.pdfcsedatabasemanagementsystemppt-170825044344.pdf
csedatabasemanagementsystemppt-170825044344.pdfSameerKhanPathan7
 
Bca examination 2017 dbms
Bca examination 2017 dbmsBca examination 2017 dbms
Bca examination 2017 dbmsAnjaan Gajendra
 
Lecture on DBMS & MySQL.pdf v. C. .
Lecture on DBMS & MySQL.pdf v.  C.     .Lecture on DBMS & MySQL.pdf v.  C.     .
Lecture on DBMS & MySQL.pdf v. C. .MayankSinghRawat6
 
Database-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptxDatabase-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptxAnmolThakur67
 
Artifacts, Data Dictionary, Data Modeling, Data Wrangling
Artifacts, Data Dictionary, Data Modeling, Data WranglingArtifacts, Data Dictionary, Data Modeling, Data Wrangling
Artifacts, Data Dictionary, Data Modeling, Data WranglingFaisal Akbar
 

Ähnlich wie Bank mangement system (20)

unit 1.pptx
unit 1.pptxunit 1.pptx
unit 1.pptx
 
Database fundamentals
Database fundamentalsDatabase fundamentals
Database fundamentals
 
Introduction to the Structured Query Language SQL
Introduction to the Structured Query Language SQLIntroduction to the Structured Query Language SQL
Introduction to the Structured Query Language SQL
 
Module02
Module02Module02
Module02
 
unit 1.pptx
unit 1.pptxunit 1.pptx
unit 1.pptx
 
2nd chapter dbms.pptx
2nd chapter dbms.pptx2nd chapter dbms.pptx
2nd chapter dbms.pptx
 
Introduction to database with ms access.hetvii
Introduction to database with ms access.hetviiIntroduction to database with ms access.hetvii
Introduction to database with ms access.hetvii
 
Introduction to database with ms access(DBMS)
Introduction to database with ms access(DBMS)Introduction to database with ms access(DBMS)
Introduction to database with ms access(DBMS)
 
Data base
Data baseData base
Data base
 
PPT SQL CLASS.pptx
PPT SQL CLASS.pptxPPT SQL CLASS.pptx
PPT SQL CLASS.pptx
 
csedatabasemanagementsystemppt-170825044344.pdf
csedatabasemanagementsystemppt-170825044344.pdfcsedatabasemanagementsystemppt-170825044344.pdf
csedatabasemanagementsystemppt-170825044344.pdf
 
Database Management System ppt
Database Management System pptDatabase Management System ppt
Database Management System ppt
 
Bca examination 2017 dbms
Bca examination 2017 dbmsBca examination 2017 dbms
Bca examination 2017 dbms
 
Lecture on DBMS & MySQL.pdf v. C. .
Lecture on DBMS & MySQL.pdf v.  C.     .Lecture on DBMS & MySQL.pdf v.  C.     .
Lecture on DBMS & MySQL.pdf v. C. .
 
Database-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptxDatabase-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptx
 
Dbms Basics
Dbms BasicsDbms Basics
Dbms Basics
 
Database Systems Concepts, 5th Ed
Database Systems Concepts, 5th EdDatabase Systems Concepts, 5th Ed
Database Systems Concepts, 5th Ed
 
Artifacts, Data Dictionary, Data Modeling, Data Wrangling
Artifacts, Data Dictionary, Data Modeling, Data WranglingArtifacts, Data Dictionary, Data Modeling, Data Wrangling
Artifacts, Data Dictionary, Data Modeling, Data Wrangling
 
T-SQL Overview
T-SQL OverviewT-SQL Overview
T-SQL Overview
 
Ch1- Introduction to dbms
Ch1- Introduction to dbmsCh1- Introduction to dbms
Ch1- Introduction to dbms
 

Kürzlich hochgeladen

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 

Kürzlich hochgeladen (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

Bank mangement system

  • 1.
  • 2.
  • 6.
  • 7. Over View Collection of information that is organized so that it can easily access. Data store in tables,rows And column Data Base
  • 8.  A database management system (DBMS) is system software.  Creating and managing databases.  The DBMS provides users and programmers with a systematic way to create, retrieve, update and manage data. Definition of DBMS1
  • 10.  A database management system is important because  It helps make data management more efficient and effective.  A database management system stores.  organizes and manages a large amount of information within a single software application.  Use of this system increases efficiency of business operations and reduces overall costs. Importance of DBMS2
  • 11.  Analyze user environment.  Develop logical model.  Choose DBMS.  Map logical model DBMS.  Develop physical Design.  Evaluate Physical Model.  Tune System.  Implement System. 3 Implement
  • 12.  Customer  Banker-info  Branch  Loan  Credit-Card  Account Requirements BMS4
  • 13.  Verification of documentation.  Customer service representative / Personal banker Clearing , Account opening , online transfers etc.  Forms of special crossing cheques.  Customer debit and credit problem.  Employee is not efficient.  Customer Communication problem face. Face a Problems5
  • 14.  They do not communication with us accurate time.  Death of any person.  Verification of Deduction of Zakat.  Provision for Bad Debit.  Missing Vouchers.  Verification of lockers facilities. Face a Problems5
  • 16.
  • 17. 1: ENTITIES (Customer) ATTRIBUTES (Customer-id , Customer-name , Customer-street , Customer-city) 2: ENTITIES (Banker-info) ATTRIBUTES (Banker-name , Banker-email , Banker-id) 3: ENTITIES (Branch) ATTRIBUTES (Assets , Branch-name , Branch-city) 4: ENTITIES (Loan) ATTRIBUTES (loan-number , Amount) 5: ENTITIES (Credit-Card) ATTRIBUTES (Expired-date , Limit , Credit_card_number ) 6: ENTITIES (Account) ATTRIBUTES (Balance , Account-number , Category) Entities & attribute7
  • 18.  Representation of real world objects, event and their association called molding.  It helps the user understand the complexities.  Used to as a communication tool.  Good data model enables the users to understand the organization.  For which the data base design is developed.  Good data model very necessary to design the data base. Modeling8 Importance of Data model
  • 19. Types of data model  Object-based Data model  Record based model  Physical Data model
  • 20. Object based Data Model  Object based model use the concept.  Like Entities, attributes, relationship  Entities Person, place, things, for which data is collected.  Attribute The characteristics of entity is called attribute.  Relationship The association b/w two or more entity.
  • 21. Record based data model  Used to describe external and conceptual level of data base.  Also use to describe internal level to some extent.  They are used to develop and logical structure.  The record may different type.  Each record types define of fixed number of field.
  • 22. Types of Record based  Hierarchical Model  Network model  Relational model (In our project we use the relational model)
  • 23. Physical Data model  Describe the store the data in computer.  They give information, such as record structure.  They are not as many physical data model as logical data model
  • 25. S.Q.L  S.Q.L stands foe Structured Query language.  It is not full features programming language.  It is simply data sub language  SQL was developed by IBM.  It endorsed as a national standard by ANSI  (American national standard institution).  New standard SQL3 also exists.  The most widely implement of version of SQL is ANSI-92
  • 26.  SQL is English-like language.  It uses words Like SELECT, INSERT etc.  SQL commands are not case Sensitive  SQL provide commands for variety of task including. o Inserting, updating, deleting row in a table. o Creating, modifying, and deleting. o Controlling access to the data base and data base object. Features of S.Q.L
  • 27. DDL (Data Definition Language)  Data Definition Language (DDL) is a standard for commands that define the different structures in a database.  DDL statements create, modify, and remove database objects such as tables.  Common DDL statements are CREATE, ALTER, and DROP.
  • 28. Create Statement: Using Create statement, we can create a new table in the database. The syntax of the Create statement is as follows. Syntax: CREATE TABLE <Table Name> (Column 1 data type, Column 2 data type, Column 3 data type … Column n data type); DDL (Data Definition Language)
  • 29.  Here, CREATE and TABLE are keywords.  The table and column names must start with a letter and can be followed by letters, numbers, or underscores.  SQL reserved keywords should not be used as names for tables and columns DDL (Data Definition Language)
  • 30. Alter Statement:  Using alter statement we can do the following alterations in our existing table.  Adding a new column  Renaming a column DDL (Data Definition Language)
  • 31. Adding a new column: The syntax for adding a new column into the table is as follows. Syntax: ALTER TABLE <Table name> ADD(column 1 data type, column 2 data type, … column n data type);  Here, ALTER, TABLE and ADD are keywords. DDL (Data Definition Language)
  • 32. Renaming a column: The syntax for renaming a column is as follows. Syntax: ALTER TABLE <Table name> RENAME COLUMN <old name> TO <new name>;  Here, ALTER, TABLE, RENAME, COLUMN and TO are keywords. DDL (Data Definition Language)
  • 33. Drop Statement: The drop statement is used to delete a table and all the rows in the table. Syntax: DROP TABLE <Table name>  Here, DROP and TABLE are keywords. DDL (Data Definition Language)
  • 34. DML (Data manipulation Language)  The DML commands are used to insert and modify the data in the database. It enables us to perform the following tasks.  Inserting a row or the values of particular columns into the table (Using Insert statement)  Updating values of columns in a table (Using Update statement)  Deleting rows in a table (Using Delete statement)
  • 35. Syntax 1: (To insert values for the specified columns in a table) INSERT INTO <Table Name> (column 1, column 2, … column n) VALUES (value1, value2, … value n);  Here, INSERT, INTO and VALUES are keywords. DML (Data manipulation Language)
  • 36. Update Statement: The update statement is used to update or change records that match specified criteria. This is accomplished by using a WHERE clause. Syntax: UPDATE <Table Name> SET column 1 = value 1, column 2 = value 2, … column 3 = value 3 WHERE <condition>; DML (Data manipulation Language)
  • 37. Delete Statement: The delete statement is used to delete the records or rows from the table. Syntax: DELETE FROM <Table Name> WHERE <Condition>  Here, DELETE, FROM and WHERE are keywords. DML (Data manipulation Language)
  • 39.  Overview To Database Security.  Why need of database security.  What is Database Security.  Concepts of Database Security. Security9
  • 40. Threats and risk to database have increased, So there is a need for security of the database. The majority companies store sensitive data in database. If there is no security to database what happens??? Data will be easily corrupted Overview
  • 41. Security risk to database includes Unauthorized database users Unauthorized Database Administrator Unauthorized access to Database Lack of access to Database services Sensitive data includes •Bank/Demat accounts •Credit card, Salary, Income tax data •University admissions, marks/grades •Land records, licenses
  • 42. Definition of Database Security Database Security is defined as the process by which “Confidentiality, Integrity and Availability” of the database can be protected.
  • 43. Threats to database Unauthorized access. Password Cracking. Network Eaves Dropping. SQL Injection.
  • 44.  SQL Injection A form of attack on a database-driven of insecure code on a system connected to the Internet , bypassing the firewall Web site in which the attacker executes unauthorized SQL commands by taking advantage. 3/4/2017 Vulnerabilities: Poor Input validation to web application. Unsafe ,dynamically constructed SQL commands. Weak permissions that fail to restrict the application to Database
  • 45. Methods of securing the database Authorization - privileges, views. Authentication – passwords. Encryption - public key / private key, secure sockets. Logical - firewalls, net proxies. 3/4/2017Database security issues
  • 46. Security of The Database Through Firewalls A FIREWALL is dedicated software on another computer which inspects network traffic passing through it and denies (or) permits passage based on set of rules. Basically it is a piece of software that monitors all traffic that goes from your system to another via the Internet or network and Vice Versa Database Firewalls are a type of Web Application Firewalls that monitor databases to identify and protect against database specific attacks that mostly seek to access sensitive information stored in the databases.
  • 47. How Database Firewall works The Database Firewalls include a set of pre-defined, customizable security audit policies and they can identify database attacks based on threat patterns called signatures. The SQL input statements (or) queries are compared to these signatures, which are updated frequently by the vendors to identify known attacks on the database. But all the attacks on the databases may not be familiar. Database Firewalls build (or come with) white list of approved SQL commands(or) statements that are safe. All the input commands are compared with this white list and only those that are already present in the white list are sent to the database.
  • 50.
  • 52. Conclusion  A DBMS is a systematic operational system which consists of tools making data, data saving and data manipulation an easier task.  DBMS is the majorly used through out the wold for data handling.  Thus its a good data manager till today.  If some one ask you question How do we protect data form crashes.