DESIGN AND IMPLEMENTATION OF A SECURITY INFORMATION SYSTEM
(A CASE STUDY OF THE NIGERIAN POLICE)
ABSTRACT
The principal objective of this project is to help Security Information Systems (SIS) especially NIGERIAN POLICE which is my case study in the area they encounter problems in securing security data-processing and efficient information system. This will be the solution given to handle this problem by transforming the existing manual information system into an automated form and overcome the existing problems of insecurity and delay in data processing. I decided to use an automated database system to enhance information storage and keep track of security information. Again, doing this will ensure that there is an effective security information system computerization. To achieve this, Visual Basic 6.0 is used for its implementation.
TABLE OF CONTENTS
CHAPTER ONE
1.0 INTRODUCTION- - -
1.1 Statement of problem- -
1.2 Objective of the study - -
1.3 Definition of terms/variables- -
CHAPTER TWO: LITERATURE REVIEW
2.1 Security Information system- -
2.2 Information security- - -
2.3 Cia as Information Security Watchword- -
2.4 Risk Management in Information Security- -
2.5 The Relevance of Cryptography to Security Information-
2.6 The Concept of “Due Care” In Security Information- -
CHAPTER THREE: METHODOLOGY AND ANALYSIS OF THE
EXISTING SYSTEM
31. Fact finding method- - -
3.2 Organizational structure- -
3.3 Objectives of the existing system-
3.4 Input, process, output analysis-
3.5 Information flow diagram- -
3.6 Problems of current system- -
3.7 Justification for the new system-
CHAPTER FOUR: DESIGN AND IMPLEMENTATION OF THE NEW SYSTEM
4.1 Output specification and design-
4.2 Input design and specification-
4.3 File Design - - - -
4.4 Procedure chart- - - -
4.5 System flowchart- -
4.6 System requirement- -
4.7 Program flowchart-
CHAPTER FIVE SUMMARY, RECOMMENDATION. AND
CONCLUSIONS
5.1 Summary- - -
5.2 Conclusion- - -
5.3 Recommendation-
REFERENCES- - -
APPENDIX- - -
LIST OF FIGURES
Fig 3.2 Organization Structure- -
Fig 3.5 Information Flow Diagram- -
Fig 4.1.1 Security Signal Report- -
Fig 4.1.2 Police Personnel Information-
Fig 4.4 Procedure Chart- -
Fig 4.5 System Flowchart- -
4.7 Program Flowchart- -
Fig 5.1 Program Flowchart- -
LIST OF TABLES
Table 4.3.1 Structure for “Police Information” -
Table 4.3.2 Structure for File “Signal” - - -
CHAPTER ONE
1.0 INTRODUCTION
National
security is the requirement to maintain the survival of the state
through the use of economic, security operatives especially police,
political power and the exercise of diplomacy. The concept developed
mostly in the United States of America after World War II focusing on
the police and military might. Now, it encompasses a broad range of
facets, all of which impinge on the police and military for economic
security of the nation, lives property and values protected by national
society. Accordingly, in order to possess national security, a nation
needs to possess economic security, energy security, environmental
security, etc. Security threats involve not only conventional foes such
as other national states but also non-state actors such as violent
non-state actors, narcotic cartels, multinational corporations and
non-governmental organizations;
some authorities include natural disasters and events causing severe environmental change in this category.
The
origin of the modern concept of “national security” as a philosophy of
maintaining a stable nation state can be traced to the peace of
Westphalia, wherein the concept of a sovereign state, ruled by a
sovereign, became the basis of a new international order of nation
states