Title Page- - -
Approval page- -
Certification- -
Dedication - -
Acknowledgement
-
Table of contents-
List of figures- -
List of tables- -
Abstract- - -
CHAPTER ONE
1.0
|
INTRODUCTION-
-
|
| |
|
-
|
-
|
-
|
-1
|
1.1
|
Statement of problem- | |
|
-
|
-
|
-
|
-5
|
1.2
|
Objective of
the study -
|
| | -
|
-
|
-
|
-5
|
1.3
|
Definition of terms/variables- | | | -
|
-
|
-6
|
CHAPTER TWO: LITERATURE REVIEW
2.1
|
Security
Information system | |
|
-
|
-
|
-6
|
2.2
|
Information
security | |
| | |
|
-
|
-17
|
2.3
|
Cia as
Information Security Watchword-
|
-
|
-
|
-
|
-18
|
2.4
|
Risk
Management in Information Security- -
|
-
|
-
|
-23
|
2.5
|
The Relevance
of Cryptography to Security Information-
|
-29
|
2.6
|
The Concept
of “Due Care” In Security Information-
|
-
|
-31
|
CHAPTER THREE: METHODOLOGY AND ANALYSIS OF THE
|
EXISTING SYSTEM
|
|
|
|
|
|
|
|
31.
|
Fact finding
method-
|
-
|
-
|
-
|
-
|
-
|
-
|
-33
|
3.2
|
Organizational
structure-
|
-
|
-
|
-
|
-
|
-
|
-35
|
3.3
|
Objectives of
the existing system-
|
-
|
-
|
-
|
-
|
-36
|
3.4
|
Input,
process, output analysis-
|
-
|
-
|
-
|
-
|
-36
|
3.5
|
Information
flow diagram- -
|
-
|
-
|
-
|
-
|
-38
|
3.6
|
Problems of
current system- -
|
-
|
-
|
-
|
-
|
-39
|
3.7
|
Justification
for the new system-
|
-
|
-
|
-
|
-
|
-39
|
CHAPTER
FOUR: DESIGN AND
IMPLEMENTATION OF THE NEW SYSTEM
4.1
|
Output
specification and design | | | -
|
-
|
-40
|
4.2
|
Input design
and specification-
|
-
|
-
|
-
|
-
|
-42
|
4.3
|
File Design -
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-44
|
4.4
|
Procedure
chart- -
|
-
|
-
|
-
|
-
|
-
|
-
|
-47
|
4.5
|
System
flowchart-
|
-
|
-
|
-
|
-
|
-
|
-
|
-48
|
4.6
|
System
requirement-
|
-
|
-
|
-
|
-
|
-
|
-
|
-49
|
4.7
|
Program
flowchart-
|
-
|
-
|
-
|
-
|
-
|
-
|
-51
|
CHAPTER
FIVE
|
SUMMARY,
|
RECOMMENDATION.
|
AND
|
CONCLUSIONS
|
|
|
|
|
|
|
|
|
|
5.1
|
Summary-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-53
|
5.2
|
Conclusion- -
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-54
|
5.3
|
Recommendation-
|
-
|
-
|
-
|
-
|
-
|
-
|
-55
|
REFERENCES-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-58
|
APPENDIX-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-61
|
LIST OF FIGURES
Fig 3.2
Organization Structure-
|
-
|
-
|
-
|
-
|
-
|
-35
|
Fig 3.5
|
Information
Flow Diagram- -
|
-
|
-
|
-
|
-
|
-38
|
Fig 4.1.1 Security Signal Report-
|
-
|
-
|
-
|
-
|
-
|
-41
|
Fig 4.1.2 Police Personnel Information-
|
-
|
-
|
-
|
-
|
-42
|
Fig 4.4
|
Procedure
Chart-
|
-
|
-
|
-
|
-
|
-
|
-
|
-47
|
Fig 4.5
|
System
Flowchart-
|
-
|
-
|
-
|
-
|
-
|
-
|
-48
|
4.7 Program Flowchart-
|
-
|
-
|
-
|
-
|
-
|
-
|
-51
|
Fig 5.1
|
Program
Flowchart-
|
-
|
-
|
-
|
-
|
-
|
-
|
-52
|
LIST OF TABLES
Table 4.3.1
|
Structure for
“Police Information” -
|
-
|
-
|
-45
|
Table 4.3.2
|
Structure for
File “Signal” - -
|
-
|
-
|
-
|
-46
|
|
|
|
|
|
|
ABSTRACT
The
principal objective of this project is to help Security Information Systems
(SIS) especially NIGERIAN POLICE which is my case study in the area they
encounter problems in securing security data-processing and efficient
information system. This will be the solution given to handle this problem by
transforming the existing manual information system into an automated form and
overcome the existing problems of insecurity and delay in data processing. I
decided to use an automated database system to enhance information storage and
keep track of security information. Again, doing this will ensure that there is
an effective security information system computerization. To achieve this,
Visual Basic 6.0 is used for its implementation.
CHAPTER ONE
1.0 INTRODUCTION
National security is the
requirement to maintain the survival of the state through the use of economic,
security operatives especially police, political power and the exercise of
diplomacy. The concept developed mostly in the United States of America after
World War II focusing on the police and military might. Now, it encompasses a
broad range of facets, all of which impinge on the police and military for
economic security of the nation, lives property and values protected by
national society. Accordingly, in order to possess national security, a nation
needs to possess economic security, energy security, environmental security,
etc. Security threats involve not only conventional foes such as other national
states but also non-state actors such as violent non-state actors, narcotic
cartels, multinational corporations and non-governmental organizations;
some
authorities include natural disasters and events causing severe environmental
change in this category.
The origin of the modern
concept of “national security” as a philosophy of maintaining a stable nation
state can be traced to the peace of Westphalia, wherein the concept of a
sovereign state, ruled by a sovereign, became the basis of a new international
order of nation states.
As an academic concept,
national security can be seen as a recent phenomenon which was first introduced
in the United States after World War II, and has to some degree replaced other
concepts that describe the struggle of states to overcome various external and
internal threats. The struggle of states to overcome various external and
internal threats. The earliest mention of the term national security, however,
was made in Yale University in 1790 wherein was made to its relation with
domestic industries.
The
concept of the national security became an official guiding principle of
foreign policy in the United States when the National security Act of 1947 was
signed on July 26, 1947 by the U.S. President Harry S. Truman. Together with
its 1949 amendment, this act create American national security d important
facets for American national security as the precursor to the department of
defense, subordinated the security operatives branches to the new cabinet level
position of the secretary of defense, established the National Security council
and the Central Intelligence Agency. The Act did not define national security
which was conceivably advantageous as it’s ambiguity made it a powerful phrase
to invoke whenever issues threatened by other interests of the state, such as
domestic concerns, came up for discussion and decision making.
The realization that
national security encompasses more than just security was present though
understated, from the beginning itself.
The US
National Security Act of 1947 was set up “to advise the president on the
integration of domestic security and foreign policies related to national
security”.
Gen Maxwell Taylor’s essay
of 1947 titled “The Legitimate claims of National Security” has this to say;
The national valuables in
this broad sense include current assets and national interests, as well as the
sources of strength upon which our future as a nation depends. Some valuables
are tangible and earthly; others are spiritual or intellectual. They range
widely from political assets such as the Bill of Rights, National Security and
political institutions and international relations to many economic assets
which radiate worldwide from a highly productive domestic economy supported by
rich natural resources. It is the urgent need to protect valuables such as
these which legitimizes and makes essential the role of national security.
1.1 STATEMENT
OF THE PROBLEM
Security information system
has always played a vital role in the stability of a nation. Keeping security
information manually can hinder some defense program and delay passage of
security information to the appropriate body. Manual documentation of security
information can lead to exposure of the information thereby creating threat to
the nation at large. Hence, there is need for an automated security information
system to guaranty safety of information.
1.2 OBJECTIVES OF THE STUDY
The general objective of
the study is to develop a database for security information storage and
retrieval.
Specifically, the following objectives are also
considered:
i.
To build a database system for police security
information.
ii.
To develop a software for managing security
information.
iii.
To determine
the effectiveness of Nigerian police in managing signal.
1.3
DEFINITION OF
TERMS/VARIABLES
Policing: Policing
is another way of depicting the police.
Anti-policing: Anti-policing is the society’s social attitude
opposed to war between states and in particular countering arguments
based on policism.
Databases: A systematically arranged collection of
computer data, structured so that it can be automatically retrieved or
manipulated. It is also called a databank.
National Security: The requirement to maintain the survival of the
nation-state through the use of economic, policing, and political power and
the exercise of diplomacy.
Information
Security: means protecting
information and information systems from unauthorized access, use,
disclosure, disruption, modification, perusal, inspection, recording, or
destruction.
Classified Information is sensitive information to which the access
is restricted by law or regulation to particular groups of persons.
Security Management is a broad field of management related to asset
management, physical security and human resource safety functions.
Click “DOWNLOAD NOW” below to get the complete Projects
FOR QUICK HELP CHAT WITH US NOW!
+(234) 0814 780 1594
Buyers has the right to create
dispute within seven (7) days of purchase for 100% refund request when
you experience issue with the file received.
Dispute can only be created when
you receive a corrupt file, a wrong file or irregularities in the table of
contents and content of the file you received.
ProjectShelve.com shall either
provide the appropriate file within 48hrs or
send refund excluding your bank transaction charges. Term and
Conditions are applied.
Buyers are expected to confirm
that the material you are paying for is available on our website
ProjectShelve.com and you have selected the right material, you have also gone
through the preliminary pages and it interests you before payment. DO NOT MAKE
BANK PAYMENT IF YOUR TOPIC IS NOT ON THE WEBSITE.
In case of payment for a
material not available on ProjectShelve.com, the management of
ProjectShelve.com has the right to keep your money until you send a topic that
is available on our website within 48 hours.
You cannot change topic after
receiving material of the topic you ordered and paid for.
Login To Comment