phonelogo+234 8146561114 or +2347015391124

DESIGN AND IMPLEMENTATION OF A SECURITY INFORMATION SYSTEM

USER'S INSTRUCTIONS: The project work you are about to view is on "design and implementation of a security information system". Please, sit back and study the below research material carefully. This project topic "design and implementation of a security information system" have complete 5(five) Chapters. The complete Project Material/writeup include: Abstract + Introduction + etc + Literature Review + methodology + etc + Conclusion + Recommendation + References/Bibliography.Our aim of providing this "design and implementation of a security information system" project research material is to reduce the stress of moving from one school library to another all in the name of searching for "design and implementation of a security information system" research materials. We are not encouraging any form of plagiarism. This service is legal because, all institutions permit their students to read previous projects, books, articles or papers while developing their own works.


TITLE PAGE

DESIGN AND IMPLEMENTATION OF A SECURITY INFORMATION SYSTEM

BY

---
EE/H2013/01430
DEPARTMENT OF ----
SCHOOL OF ---
INSTITUTE OF ---

DECEMBER,2018



APPROVAL PAGE

This is to certify that the research work, "design and implementation of a security information system" by ---, Reg. No. EE/H2007/01430 submitted in partial fulfillment of the requirement award of a Higher National Diploma on --- has been approved.

By
---                                                     . ---
Supervisor                                                  Head of Department.
Signature……………….                           Signature……………….        

……………………………….
---
External Invigilator



DEDICATION
This project is dedicated to Almighty God for his protection, kindness, strength over my life throughout the period and also to my --- for his financial support and moral care towards me.Also to my mentor --- for her academic advice she often gives to me. May Almighty God shield them from the peril of this world and bless their entire endeavour Amen.



ACKNOWLEDGEMENT

The successful completion of this project work could not have been a reality without the encouragement of my --- and other people. My immensely appreciation goes to my humble and able supervisor mr. --- for his kindness in supervising this project.
My warmest gratitude goes to my parents for their moral, spiritual and financial support throughout my study in this institution.
My appreciation goes to some of my lecturers among whom are Mr. ---, and Dr. ---. I also recognize the support of some of the staff of --- among whom are: The General Manager, Deputy General manager, the internal Auditor Mr. --- and the ---. Finally, my appreciation goes to my elder sister ---, my lovely friends mercy ---, ---, --- and many others who were quite helpful.


PROJECT DESCRIPTION: This work "design and implementation of a security information system" research material is a complete and well researched project material strictly for academic purposes, which has been approved by different Lecturers from different higher institutions. We made Preliminary pages, Abstract and Chapter one of "design and implementation of a security information system" visible for everyone, then the complete material on "design and implementation of a security information system" is to be ordered for. Happy viewing!!!


ABSTRACT

The principal objective of this project is to help Security Information Systems (SIS) especially NIGERIAN POLICE which is my case study in the area they encounter problems in securing security data-processing and efficient information system. This will be the solution given to handle this problem by transforming the existing manual information system into an automated form and overcome the existing problems of insecurity and delay in data processing. I decided to use an automated database system to enhance information storage and keep track of security information. Again, doing this will ensure that there is an effective security information system computerization. To achieve this, Visual Basic 6.0 is used for its implementation.

TABLE OF CONTENTS

 

Title Page- -             -

Approval page-     -

Certification-             -

Dedication -              -

Acknowledgement - Table of contents-

List of figures-       -

List of tables-          -

Abstract-      -              -

CHAPTER ONE


-

-

-

-

-

-

-

-i

-

-

-

-

-

-

-

-ii

-

-

-

-

-

-

-

-iii

-

-

-

-

-

-

-

-iv

-

-

-

-

-

-

-

-v

-

-

-

-

-

-

-

-vi

-

-

-

-

-

-

-

-x

-

-

-

-

-

-

-

-xi

-

-

-

-

-

-

-

-xii


 

1.0

INTRODUCTION- -

-

-

-

-

-

-

-1

1.1

Statement of problem- -

-

-

-

-

-

-5


1.2

Objective of the study -

-

-

-

-

-

-5

1.3

Definition of terms/variables- -

-

-

-

-

-6

CHAPTER TWO: LITERATURE REVIEW

2.1

Security Information system- -

-

-

-

-

-6

2.2

Information security-

-

-

-

-

-

-

-17

2.3

Cia as Information Security Watchword-

-

-

-

-18

2.4

Risk Management in Information Security- -

-

-

-23

2.5

The Relevance of Cryptography to Security Information-

-29

2.6

The Concept of “Due Care” In Security Information-

-

-31

CHAPTER THREE:  METHODOLOGY AND  ANALYSIS OF THE

EXISTING SYSTEM

 

 

 

 

 

 

 

31.

Fact finding method-

-

-

-

-

-

-

-33

3.2

Organizational structure-

-

-

-

-

-

-35


3.3

Objectives of the existing system-

-

-

-

-

-36

3.4

Input, process, output analysis-

-

-

-

-

-36

3.5

Information flow diagram-   -

-

-

-

-

-38

3.6

Problems of current system- -

-

-

-

-

-39

3.7

Justification for the new system-

-

-

-

-

-39

CHAPTER  FOUR:  DESIGN  AND  IMPLEMENTATION  OF  THE

NEW SYSTEM

4.1

Output specification and design-

-

-

-

-

-40

4.2

Input design and specification-

-

-

-

-

-42

4.3

File Design -

-

-

-

-

-

-

-

-44

4.4

Procedure chart- -

-

-

-

-

-

-

-47

4.5

System flowchart-

-

-

-

-

-

-

-48

4.6

System requirement-

-

-

-

-

-

-

-49


4.7

Program flowchart-

-

-

-

-

-

-

-51

CHAPTER   FIVE

SUMMARY,

RECOMMENDATION.

AND

CONCLUSIONS

 

 

 

 

 

 

 

 

 

5.1

Summary-

-

-

-

-

-

-

-

-

-53

5.2

Conclusion- -

-

-

-

-

-

-

-

-54

5.3

Recommendation-

-

-

-

-

-

-

-55

REFERENCES-

-

-

-

-

-

-

-

-

-58

APPENDIX-

-

-

-

-

-

-

-

-

-61

LIST OF FIGURES

Fig 3.2 Organization Structure-

-

-

-

-

-

-35

Fig 3.5

Information Flow Diagram- -

-

-

-

-

-38

Fig 4.1.1 Security Signal Report-

-

-

-

-

-

-41

Fig 4.1.2 Police Personnel Information-

-

-

-

-

-42

Fig 4.4

Procedure Chart-

-

-

-

-

-

-

-47

Fig 4.5

System Flowchart-

-

-

-

-

-

-

-48

4.7 Program Flowchart-

-

-

-

-

-

-

-51

Fig 5.1

Program Flowchart-

-

-

-

-

-

-

-52

LIST OF TABLES

Table 4.3.1

Structure for “Police Information” -

-

-

-45

Table 4.3.2

Structure for File “Signal” -  -

-

-

-

-46


CHAPTER ONE

1.0      INTRODUCTION

National security is the requirement to maintain the survival of the state through the use of economic, security operatives especially police, political power and the exercise of diplomacy. The concept developed mostly in the United States of America after World War II focusing on the police and military might. Now, it encompasses a broad range of facets, all of which impinge on the police and military for economic security of the nation, lives property and values protected by national society. Accordingly, in order to possess national security, a nation needs to possess economic security, energy security, environmental security, etc. Security threats involve not only conventional foes such as other national states but also non-state actors such as violent non-state actors, narcotic cartels, multinational corporations and non-governmental organizations;

some authorities include natural disasters and events causing severe environmental change in this category.

The origin of the modern concept of “national security” as a philosophy of maintaining a stable nation state can be traced to the peace of Westphalia, wherein the concept of a sovereign state, ruled by a sovereign, became the basis of a new international order of nation states.

As an academic concept, national security can be seen as a recent phenomenon which was first introduced in the United States after World War II, and has to some degree replaced other concepts that describe the struggle of states to overcome various external and internal threats. The struggle of states to overcome various external and internal threats. The earliest mention of the term national security, however, was made in Yale University in 1790 wherein was made to its relation with domestic industries.

The concept of the national security became an official guiding principle of foreign policy in the United States when the National security Act of 1947 was signed on July 26, 1947 by the U.S. President Harry S. Truman. Together with its 1949 amendment, this act create American national security d important facets for American national security as the precursor to the department of defense, subordinated the security operatives branches to the new cabinet level position of the secretary of defense, established the National Security council and the Central Intelligence Agency. The Act did not define national security which was conceivably advantageous as it’s ambiguity made it a powerful phrase to invoke whenever issues threatened by other interests of the state, such as domestic concerns, came up for discussion and decision making.

The realization that national security encompasses more than just security was present though understated, from the beginning itself.

The US National Security Act of 1947 was set up “to advise the president on the integration of domestic security and foreign policies related to national security”.

Gen Maxwell Taylor’s essay of 1947 titled “The Legitimate claims of National Security” has this to say;

The national valuables in this broad sense include current assets and national interests, as well as the sources of strength upon which our future as a nation depends. Some valuables are tangible and earthly; others are spiritual or intellectual. They range widely from political assets such as the Bill of Rights, National Security and political institutions and international relations to many economic assets which radiate worldwide from a highly productive domestic economy supported by rich natural resources. It is the urgent need to protect valuables such as these which legitimizes and makes essential the role of national security.

1.1 STATEMENT OF THE PROBLEM

Security information system has always played a vital role in the stability of a nation. Keeping security information manually can hinder some defense program and delay passage of security information to the appropriate body. Manual documentation of security information can lead to exposure of the information thereby creating threat to the nation at large. Hence, there is need for an automated security information system to guaranty safety of information.

1.2 OBJECTIVES OF THE STUDY

The general objective of the study is to develop a database for security information storage and retrieval.

Specifically, the following objectives are also considered:

  1. To build a database system for police security information.
  1. To develop a software for managing security information.
  1. To determine the effectiveness of Nigerian police in managing signal.
    1. 3 DEFINITION OF TERMS/VARIABLES

Policing: Policing is another way of depicting the police.

Anti-policing: Anti-policing is the society’s social attitude opposed to war between states and in particular countering arguments based on policism.

Databases: A systematically arranged collection of computer data, structured so that it can be automatically retrieved or manipulated. It is also called a databank.

National Security: The requirement to maintain the survival of the nation-state through the use of economic, policing, and political power and the exercise of diplomacy.

Information Security: means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction.

Classified Information is sensitive information to which the access is restricted by law or regulation to particular groups of persons.

Security Management is a broad field of management related to asset management, physical security and human resource safety functions.

1.4                                                    PLAN OF THE STUDY
This project work stems on communication as an important tool for the development of an institution. This study is basically divided into five (5) chapters.
CHAPTER ONE: Takes on the introduction of the subject matter. If consists of the super significance and definition of terms of the study.
CHAPTER TWO: This is the literature review this entails the works that had been done on this particular topic which was done by other researchers.
CHAPTER THREE: Will talk about the Methodist that the researcher adopted in getting necessary materials or information that will facilitate the success of the research work.
CHAPTER FOUR: Explain how the researcher was able to analysis and present the data he got for his work while the chapter:
CHAPTER FIVE: Brings everything to conclusion the researcher does his summary and give necessary recommendation where needed.


CHAPTER TWO: The chapter one of this work has been displayed above. The complete chapter two of "design and implementation of a security information system" is also available. Order full work to download. Chapter two of "design and implementation of a security information system" consists of the literature review. In this chapter all the related work on "design and implementation of a security information system" was reviewed.

CHAPTER THREE: The complete chapter three of "design and implementation of a security information system" is available. Order full work to download. Chapter three of "design and implementation of a security information system" consists of the methodology. In this chapter all the method used in carrying out this work was discussed.

CHAPTER FOUR: The complete chapter four of "design and implementation of a security information system" is available. Order full work to download. Chapter four of "design and implementation of a security information system" consists of all the test conducted during the work and the result gotten after the whole work

CHAPTER FIVE: The complete chapter five of design and construction of a "design and implementation of a security information system" is available. Order full work to download. Chapter five of "design and implementation of a security information system" consist of conclusion, recommendation and references.

 

CLICK HERE FOR MORE RELATED TOPICS/MATERIAL


To "DOWNLOAD" the complete material on this particular topic above click "HERE"

Do you want our Bank Accounts? please click HERE

To view other related topics click HERE

To "SUMMIT" new topic(s), develop a new topic OR you did not see your topic on our site but want to confirm the availiability of your topic click HERE

Do you want us to research your new topic? if yes, click "HERE"

Do you have any question concerning our post/services? click HERE for answers to your questions


For more information contact us through any of the following means:

Mobile No phonelogo:+2348146561114 or +2347015391124 [Mr. Innocent]

Email address emailus:engr4project@gmail.com

Watsapp No whatsapp.html :+2348146561114


COUNTRIES THAT FOUND OUR SERVICES USEFUL

Australia, Botswana, Canada, Europe, Ghana, Ireland, India, Kenya, Liberia, Malaysia, Namibia, New Zealand, Nigeria, Pakistan, Philippines, Singapore, Sierra Leone, South Africa, Uganda, United States, United Kindom, Zambia, Zimbabwe, etc
Support: +234 8146561114 or +2347015391124

Watsapp Nowhatsapp.html
:+2348146561114


E
mail Address emailus:engr4project@gmail.com


FOLLOW / VISIT US VIA:

tweeter instagram.htmlfacebook logo

Order Full Material(s)
Download Full Material(s)
Bank Accounts

Contact us

Hire a writer

Order/learn construction


View other related topics

Vrequently asked questions(FAQ)
View more related topics and download more material
Format = microsoft word

Chapters = 1-5 chapters


Price: N3,000.
»Accountancy (AC) project
» Agric engineering project topics
» Business admin and management project
» Banking and finance project
» Civil engineering project
» Co-operative economics and management project
» Computer science project
» Community Health Project
» Electrical/electronic/telecom/ power project
» Estate management project
» Education
» Human Kinetics & Health Education Project
» Industrial safety and environmental (ISET) project
» Mass communication project
» Mechanical engineering (ME) project
» Medical And Health Science Project
» Office technology and management (O.T.M) project
» Public administration (PA) project
» Public Health Education Project Topics
» Paramedic Project Topics
» Industrial Physics/Physics Electronics Project
» Science laboratory technology (microbiology option) project
» Agricultural science and engineering seminar
» Building engineering seminar topics/materials
» Civil engineering seminar topics
» Computer science seminar topics
» Environmental seminar topics
» Electrical/electronic/telecom/ power seminar
» Mechanical engineering seminar
» Physics / industrial physics/physics electronics seminar topics/materials