International Journal of Advances in Electronics and Computer Science, ISSN: 2393-2835 Volume-4, Issue-4, Aprl.-2017 http://iraj.in Security and Fraud Issues Due to Existing Process Model of Software Engineering and Unawareness of Online Transaction and Communication Fraud 34 SECURITY AND FRAUD ISSUES DUE TO EXISTING PROCESS MODEL OF SOFTWARE ENGINEERING AND UNAWARENESS OF ONLINE TRANSACTION AND COMMUNICATION FRAUD AMI S DESAI Vivekanand College for BCA E-mail: amijvaidya@gmail.com Abstract - Information security is a most challenging aspect during online transactions and communication. Organizations, Government, Social or Individual every persons are facing security risks. Security plays important roles about 80% of transactions done through online web services, but it is not safe and reliable. Online services are managed automatically, without human interaction, developed by multiple stake holder websites and web services. In this paper we discuss about new threat identification approach, existing process model and guideline will be helpful to increase security through content matching algorithm. I. INTRODUCTION Now a day’s many people are attached with each other using web technology. Many service providers deliver facilities to exchange of ideas, information, videos, pictures, and graphics based on SOA. It also allows easy sharing and distribution of existing content to others, due to that professional work can be shared through on-line networks [10] . Using Social networking websites maximum people share or transfer images, video clips, text and personal details without any precautions and bothering about fraud. On-line transactions are done without any security check because many of them do not have awareness about on-line fraud and cyber crime. Thus, hackers can easily hack and misuse their information. The issues include privacy issues, identity theft [6] , social networks spam, social networks malware, and physical threats. [9] There are certain issues regarding on-line fraud are describe as below, - Hacking: This is a type of common crime, in which a person’s computer is becoming out of order so that his/her personal and sensitive information as well as the entire device can be accessed by unauthorized person’s. In hacking the criminal, uses variety of different software’s to enter into a person’s computer unknowingly without his awareness. [7][14] - Theft: This crime occurs when person violence copyrights laws by downloading music, movies, games and software. Generally, license version software is costly hence culprit person can crack its license software and use for profit. To use cracked software, company’s logo, domain name and idea of good name websites for misguide people is also consider as crime. [7][6] - Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a bombardment of online messages and emails. [5] Typically, these stalkers know their victims and instead of alternative to offline stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not having the desired effect, they begin offline stalking along with cyber stalking to make the victims’ lives more depressed. [7] - Identity Theft: This has become a major problem when people use the Internet for money transactions and online banking services. [11] In this cyber crime, a criminal accesses data of a person like bank account, credit & debit cards details, Social security and other sensitive information to draw off money or to buy things online on the victim’s name. It can result in major financial losses for the victim and even spoil the victim’s credit history also. [3][8] - Malicious Software: These are Internet-based software’s or programs which are used to disturb the entire network. The software is used to gain access to a system to steal sensitive information or data or causing damage to software present in the system. While surfing such websites these malicious software pop up and ask to download, as soon as downloading starts they start damaging victim’s network and system. - Child soliciting and Abuse: In this type of cyber crime wherein criminals solicit minors through chat rooms for the purpose of child pornography. Many Investigating companies or agencies has been spending a lot of time to monitoring chat rooms frequented by children with the hopes of reducing and preventing child abuse and soliciting. - In general, most of the website developers are testing their websites using white box testing, black box testing and gray box testing for protection. [1] After web hosting, some web automated tools are provided in SOA for performance, load and security testing like Soap,