DESIGN AND IMPLEMENTATION OF A SECURITY INFORMATION SYSTEM


DESIGN AND IMPLEMENTATION OF A SECURITY INFORMATION SYSTEM (A CASE STUDY OF THE NIGERIAN POLICE)  

ABSTRACT

The principal objective of this project is to help Security Information Systems (SIS) especially NIGERIAN POLICE which is my case study in the area they encounter problems in securing security data-processing and efficient information system. This will be the solution given to handle this problem by transforming the existing manual information system into an automated form and overcome the existing problems of insecurity and delay in data processing. I decided to use an automated database system to enhance information storage and keep track of security information. Again, doing this will ensure that there is an effective security information system computerization. To achieve this, Visual Basic 6.0 is used for its implementation.

TABLE OF CONTENTS

Title Page- - -

Approval page- -

Certification- -

Dedication - -

Acknowledgment - 

Table of contents-

List of figures- -

List of tables- -

Abstract- - -

CHAPTER ONE

1.0 INTRODUCTION- - - - - - - - -1

1.1 Statement of problem- - - - - - - -5

1.2 Objective of the study - - - - - - -5

1.3 Definition of terms/variables- - - - - - -6

CHAPTER TWO: LITERATURE REVIEW

2.1 Security Information system- - - - - - -6

2.2 Information security- - - - - - - -17

2.3 Cia as Information Security Watchword- - - - -18

2.4 Risk Management in Information Security- - - - -23

2.5 The Relevance of Cryptography to Security Information- -29

2.6 The Concept of “Due Care” In Security Information- - -31

CHAPTER THREE:  METHODOLOGY AND  ANALYSIS OF THE EXISTING SYSTEM

31. Fact finding method- - - - - - - -33

3.2 Organizational structure- - - - - - -35

3.3 Objectives of the existing system- - - - - -36

3.4 Input, process, output analysis- - - - - -36

3.5 Information flow diagram-   - - - - - -38

3.6 Problems of current system- - - - - - -39

3.7 Justification for the new system- - - - - -39

CHAPTER  FOUR:  DESIGN  AND  IMPLEMENTATION  OF  THE NEW SYSTEM

4.1 Output specification and design- - - - - -40

4.2 Input design and specification- - - - - -42

4.3 File Design - - - - - - - - -44

4.4 Procedure chart- - - - - - - - -47

4.5 System flowchart- - - - - - - -48

4.6 System requirement- - - - - - - -49

4.7 Program flowchart- - - - - - - -51

CHAPTER   FIVESUMMARY,RECOMMENDATION.AND CONCLUSIONS

5.1 Summary- - - - - - - - - -53

5.2 Conclusion- - - - - - - - - -54

5.3 Recommendation- - - - - - - -55

REFERENCES- - - - - - - - - -58

APPENDIX- - - - - - - - - -61

CHAPTER ONE

1.0 INTRODUCTION

National security is the requirement to maintain the survival of the state through the use of economic, security operatives especially police, political power and the exercise of diplomacy. The concept developed mostly in the United States of America after World War II focusing on the police and military might. Now, it encompasses a broad range of facets, all of which impinge on the police and military for economic security of the nation, lives property and values protected by national society. Accordingly, in order to possess national security, a nation needs to possess economic security, energy security, environmental security, etc. Security threats involve not only conventional foes such as other national states but also non-state actors such as violent non-state actors, narcotic cartels, multinational corporations and non-governmental organizations;

some authorities include natural disasters and events causing severe environmental change in this category.

The origin of the modern concept of “national security” as a philosophy of maintaining a stable nation state can be traced to the peace of Westphalia, wherein the concept of a sovereign state, ruled by a sovereign, became the basis of a new international order of nation states.

As an academic concept, national security can be seen as a recent phenomenon which was first introduced in the United States after World War II, and has to some degree replaced other concepts that describe the struggle of states to overcome various external and internal threats. The struggle of states to overcome various external and internal threats. The earliest mention of the term national security, however, was made in Yale University in 1790 wherein was made to its relation with domestic industries.

The concept of the national security became an official guiding principle of foreign policy in the United States when the National security Act of 1947 was signed on July 26, 1947 by the U.S. President Harry S. Truman. Together with its 1949 amendment, this act create American national security d important facets for American national security as the precursor to the department of defense, subordinated the security operatives branches to the new cabinet level position of the secretary of defense, established the National Security council and the Central Intelligence Agency. The Act did not define national security which was conceivably advantageous as it’s ambiguity made it a powerful phrase to invoke whenever issues threatened by other interests of the state, such as domestic concerns, came up for discussion and decision making.

The realization that national security encompasses more than just security was present though understated, from the beginning itself.

The US National Security Act of 1947 was set up “to advise the president on the integration of domestic security and foreign policies related to national security”.

Gen Maxwell Taylor’s essay of 1947 titled “The Legitimate claims of National Security” has this to say;

The national valuables in this broad sense include current assets and national interests, as well as the sources of strength upon which our future as a nation depends. Some valuables are tangible and earthly; others are spiritual or intellectual. They range widely from political assets such as the Bill of Rights, National Security and political institutions and international relations to many economic assets which radiate worldwide from a highly productive domestic economy supported by rich natural resources. It is the urgent need to protect valuables such as these which legitimizes and makes essential the role of national security.

1.1 STATEMENT OF THE PROBLEM

Security information system has always played a vital role in the stability of a nation. Keeping security information manually can hinder some defense program and delay passage of security information to the appropriate body. Manual documentation of security information can lead to exposure of the information thereby creating threat to the nation at large. Hence, there is need for an automated security information system to guaranty safety of information.

1.2 OBJECTIVES OF THE STUDY

The general objective of the study is to develop a database for security information storage and retrieval.

Specifically, the following objectives are also considered:

i. To build a database system for police security information.

ii. To develop a software for managing security information.

iii. To determine the effectiveness of Nigerian police in managing signal.

1.3 DEFINITION OF TERMS/VARIABLES

Policing: Policing is another way of depicting the police.

Anti-policing: Anti-policing is the society’s social attitude opposed to war between states and in particular countering arguments based on policism.

Databases: A systematically arranged collection of computer data, structured so that it can be automatically retrieved or manipulated. It is also called a databank.

National Security: The requirement to maintain the survival of the nation-state through the use of economic, policing, and political power and the exercise of diplomacy.

Information Security: means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction.

Classified Information is sensitive information to which the access is restricted by law or regulation to particular groups of persons.

Security Management is a broad field of management related to asset management, physical security and human resource safety functions.

.

DESIGN AND IMPLEMENTATION OF A SECURITY INFORMATION SYSTEM



TYPE IN YOUR TOPIC AND CLICK SEARCH.






RESEARCHWAP.ORG

Researchwap.org is an online repository for free project topics and research materials, articles and custom writing of research works. We’re an online resource centre that provides a vast database for students to access numerous research project topics and materials. Researchwap.org guides and assist Postgraduate, Undergraduate and Final Year Students with well researched and quality project topics, topic ideas, research guides and project materials. We’re reliable and trustworthy, and we really understand what is called “time factor”, that is why we’ve simplified the process so that students can get their research projects ready on time. Our platform provides more educational services, such as hiring a writer, research analysis, and software for computer science research and we also seriously adhere to a timely delivery.

TESTIMONIES FROM OUR CLIENTS


Please feel free to carefully review some written and captured responses from our satisfied clients.

  • "Exceptionally outstanding. Highly recommend for all who wish to have effective and excellent project defence. Easily Accessable, Affordable, Effective and effective."

    Debby Henry George, Massachusetts Institute of Technology (MIT), Cambridge, USA.
  • "I saw this website on facebook page and I did not even bother since I was in a hurry to complete my project. But I am totally amazed that when I visited the website and saw the topic I was looking for and I decided to give a try and now I have received it within an hour after ordering the material. Am grateful guys!"

    Hilary Yusuf, United States International University Africa, Nairobi, Kenya.
  • "Researchwap.org is a website I recommend to all student and researchers within and outside the country. The web owners are doing great job and I appreciate them for that. Once again, thank you very much "researchwap.org" and God bless you and your business! ."

    Debby Henry George, Massachusetts Institute of Technology (MIT), Cambridge, USA.
  • "Great User Experience, Nice flows and Superb functionalities.The app is indeed a great tech innovation for greasing the wheels of final year, research and other pedagogical related project works. A trial would definitely convince you."

    Lamilare Valentine, Kwame Nkrumah University, Kumasi, Ghana.
  • "I love what you guys are doing, your material guided me well through my research. Thank you for helping me achieve academic success."

    Sampson, University of Nigeria, Nsukka.
  • "researchwap.com is God-sent! I got good grades in my seminar and project with the help of your service, thank you soooooo much."

    Cynthia, Akwa Ibom State University .
  • "Sorry, it was in my spam folder all along, I should have looked it up properly first. Please keep up the good work, your team is quite commited. Am grateful...I will certainly refer my friends too."

    Elizabeth, Obafemi Awolowo University
  • "Am happy the defense went well, thanks to your articles. I may not be able to express how grateful I am for all your assistance, but on my honour, I owe you guys a good number of referrals. Thank you once again."

    Ali Olanrewaju, Lagos State University.
  • "My Dear Researchwap, initially I never believed one can actually do honest business transactions with Nigerians online until i stumbled into your website. You have broken a new legacy of record as far as am concerned. Keep up the good work!"

    Willie Ekereobong, University of Port Harcourt.
  • "WOW, SO IT'S TRUE??!! I can't believe I got this quality work for just 3k...I thought it was scam ooo. I wouldn't mind if it goes for over 5k, its worth it. Thank you!"

    Theressa, Igbinedion University.
  • "I did not see my project topic on your website so I decided to call your customer care number, the attention I got was epic! I got help from the beginning to the end of my project in just 3 days, they even taught me how to defend my project and I got a 'B' at the end. Thank you so much researchwap.com, infact, I owe my graduating well today to you guys...."

    Joseph, Abia state Polytechnic.
  • "My friend told me about ResearchWap website, I doubted her until I saw her receive her full project in less than 15 miniutes, I tried mine too and got it same, right now, am telling everyone in my school about researchwap.com, no one has to suffer any more writing their project. Thank you for making life easy for me and my fellow students... Keep up the good work"

    Christiana, Landmark University .
  • "I wish I knew you guys when I wrote my first degree project, it took so much time and effort then. Now, with just a click of a button, I got my complete project in less than 15 minutes. You guys are too amazing!."

    Musa, Federal University of Technology Minna
  • "I was scared at first when I saw your website but I decided to risk my last 3k and surprisingly I got my complete project in my email box instantly. This is so nice!!!."

    Ali Obafemi, Ibrahim Badamasi Babangida University, Niger State.
  • To contribute to our success story, send us a feedback or please kindly call 2348037664978.
    Then your comment and contact will be published here also with your consent.

    Thank you for choosing researchwap.com.