DESIGN AND IMPLEMENTATION OF A POLICE DATABASE SECURITY SYSTEM


  • Department: Computer Science
  • Project ID: CPU0258
  • Access Fee: ₦5,000
  • Pages: 75 Pages
  • Chapters: 5 Chapters
  • Methodology: Nil
  • Reference: YES
  • Format: Microsoft Word
  • Views: 1,601
Get this Project Materials

DESIGN AND IMPLEMENTATION OF A SECURITY INFORMATION SYSTEM
(A CASE STUDY OF THE NIGERIAN POLICE)

ABSTRACT

The principal objective of this project is to help Security Information Systems (SIS) especially NIGERIAN POLICE which is my case study in the area they encounter problems in securing security data-processing and efficient information system. This will be the solution given to handle this problem by transforming the existing manual information system into an automated form and overcome the existing problems of insecurity and delay in data processing. I decided to use an automated database system to enhance information storage and keep track of security information. Again, doing this will ensure that there is an effective security information system computerization. To achieve this, Visual Basic 6.0 is used for its implementation. 

TABLE OF CONTENTS
CHAPTER ONE
1.0    INTRODUCTION- -    -                       
1.1    Statement of problem- -                       
1.2    Objective of the study -    -                   
1.3    Definition of terms/variables- -                   
CHAPTER TWO: LITERATURE REVIEW
2.1    Security Information system- -                   
2.2    Information security-    -    -                   
2.3    Cia as Information Security Watchword-    -           
2.4    Risk Management in Information Security- -           
2.5    The Relevance of Cryptography to Security Information-   
2.6    The Concept of “Due Care” In Security Information-    -   
CHAPTER THREE:  METHODOLOGY AND  ANALYSIS OF THE
EXISTING SYSTEM                           
31.    Fact finding method-    -    -                   
3.2    Organizational structure-    -                   
3.3    Objectives of the existing system-                   
3.4    Input, process, output analysis-                   
3.5    Information flow diagram-   -                   
3.6    Problems of current system- -                   
3.7    Justification for the new system-                   
CHAPTER FOUR: DESIGN AND IMPLEMENTATION OF THE NEW SYSTEM
4.1    Output specification and design-                   
4.2    Input design and specification-                   
4.3    File Design -    -    -    -                   
4.4    Procedure chart- -    -    -                   
4.5    System flowchart-    -                       
4.6    System requirement-    -                       
4.7    Program flowchart-                           
CHAPTER   FIVE    SUMMARY,    RECOMMENDATION.    AND
CONCLUSIONS                                   
5.1    Summary-    -    -                           
5.2    Conclusion- -    -                           
5.3    Recommendation-                           
REFERENCES-    -    -                           
APPENDIX-    -    -                           
LIST OF FIGURES
Fig 3.2 Organization Structure-    -                   
Fig 3.5    Information Flow Diagram- -                   
Fig 4.1.1 Security Signal Report-    -                   
Fig 4.1.2 Police Personnel Information-                   
Fig 4.4    Procedure Chart-    -                       
Fig 4.5    System Flowchart-    -                       
4.7 Program Flowchart-    -                       
Fig 5.1    Program Flowchart-    -                       
LIST OF TABLES
Table 4.3.1    Structure for “Police Information” -           
Table 4.3.2    Structure for File “Signal” -  -    -           
CHAPTER ONE

1.0 INTRODUCTION 
National security is the requirement to maintain the survival of the state through the use of economic, security operatives especially police, political power and the exercise of diplomacy. The concept developed mostly in the United States of America after World War II focusing on the police and military might. Now, it encompasses a broad range of facets, all of which impinge on the police and military for economic security of the nation, lives property and values protected by national society. Accordingly, in order to possess national security, a nation needs to possess economic security, energy security, environmental security, etc. Security threats involve not only conventional foes such as other national states but also non-state actors such as violent non-state actors, narcotic cartels, multinational corporations and non-governmental organizations; 

some authorities include natural disasters and events causing severe environmental change in this category. 

The origin of the modern concept of “national security” as a philosophy of maintaining a stable nation state can be traced to the peace of Westphalia, wherein the concept of a sovereign state, ruled by a sovereign, became the basis of a new international order of nation states

  • Department: Computer Science
  • Project ID: CPU0258
  • Access Fee: ₦5,000
  • Pages: 75 Pages
  • Chapters: 5 Chapters
  • Methodology: Nil
  • Reference: YES
  • Format: Microsoft Word
  • Views: 1,601
Get this Project Materials
whatsappWhatsApp Us