CHAPTER ONE
1.0
INTRODUCTION- - - - -
- -
- -1
1.1
Statement of problem- - - - -
- -
-5
1.2 Objective of the study - -
-5
1.3 Definition of terms/variables- - -6
CHAPTER TWO: LITERATURE REVIEW
2.1 Security
Information system- - - - -
- -6
2.2
Information security- - - - -
- -
-17
2.3 Cia as Information Security
Watchword- - - - -18
2.4 Risk Management in
Information Security- - - - -23
2.5 The Relevance of Cryptography to Security
Information- -29
2.6 The Concept of “Due Care” In Security
Information- - -31
CHAPTER THREE: METHODOLOGY AND ANALYSIS OF
THE EXISTING SYSTEM
31. Fact
finding method- - - - -
- -
-33
3.2
Organizational structure- - - -
- -
-35
3.3 Objectives
of the existing system- -36
3.4 Input, process, output analysis- -36
3.5
Information flow diagram- - - -
- -
-38
3.6 Problems of
current system- - - - -
- -39
3.7 Justification for the
new system- - - - -
-39
CHAPTER FOUR: DESIGN AND IMPLEMENTATION OF
THE NEW SYSTEM
4.1 Output specification and
design- - - - -
-40
4.2 Input design and
specification- - - -
- -42
4.3
File Design - - -
- -
- -
- -44
4.4
Procedure chart- - - - -
- -
- -47
4.5
System flowchart- - - -
- -
- -48
4.6
System requirement- - - - -
- -
-49
4.7 Program flowchart- - - -51
CHAPTER FIVE
SUMMARY, RECOMMENDATION AND CONCLUSIONS
5.1
Summary- - - - -
- -
- -
-53
5.2
Conclusion- - - - -
- -
- -
-54
5.3
Recommendation- - - -
- -
- -55
REFERENCES- - - - - -
- -
- -58
APPENDIX- - - - -
- -
- -
-61
Fig 3.2 Organization Structure- - -35
Fig 3.5 Information
Flow Diagram- - - - -
- -38
Fig 4.1.1 Security
Signal Report- - - - -
- -41
Fig 4.1.2 Police Personnel
Information- - - - -
-42
Fig 4.4 Procedure
Chart- - - - - -
- -47
Fig 4.5 System Flowchart- - - -
- -
- -48
4.7
Program Flowchart- - - -
- -
- -51
Fig 5.1
Program Flowchart- - - - -
- -
-52
Table 4.3.1 Structure for “Police Information” -45
Table 4.3.2 Structure for
File “Signal” - - - - -
-46
CHAPTER ONE
1.0 INTRODUCTION
National security is the requirement
to maintain the survival of the state through the use of economic, security
operatives especially police, political power and the exercise of diplomacy.
The concept developed mostly in the United States of America after World War II
focusing on the police and military might. Now, it encompasses a broad range of
facets, all of which impinge on the police and military for economic security
of the nation, lives property and values protected by national society.
Accordingly, in order to possess national security, a nation needs to possess
economic security, energy security, environmental security, etc. Security
threats involve not only conventional foes such as other national states but
also nonstate actors such as violent non-state actors, narcotic cartels,
multinational corporations and non-governmental organizations; some authorities
include natural disasters and events causing severe environmental change in
this category.
The origin of the modern concept of “national
security” as a philosophy of maintaining a stable nation state can be traced to
the peace of Westphalia, wherein the concept of a sovereign state, ruled by a
sovereign, became the basis of a new international order of nation states.
As an academic concept, national
security can be seen as a recent phenomenon which was first introduced in the
United States after World War II, and has to some degree replaced other
concepts that describe the struggle of states to overcome various external and
internal threats. The struggle of states to overcome various external and
internal threats. The earliest mention of the term national security, however,
was made in Yale University in 1790 wherein was made to its relation with
domestic industries.
The concept of the national security
became an official guiding principle of foreign policy in the United States
when the National security Act of 1947 was signed on July 26, 1947 by the U.S.
President Harry S. Truman. Together with its 1949 amendment, this act create American
national security d important facets for American national security as the precursor to the
department of defense, subordinated the security operatives branches to the new
cabinet level position of the secretary of defense, established the National
Security council and the Central Intelligence Agency. The Act did not define
national security which was conceivably advantageous as it’s ambiguity made it
a powerful phrase to invoke whenever issues threatened by other interests of
the state, such as domestic concerns, came up for discussion and decision
making.
The realization that national
security encompasses more than just security was present though understated,
from the beginning itself.
The US National Security Act of 1947
was set up “to advise the president on the integration of domestic security and
foreign policies related to national security”.
Gen Maxwell Taylor’s essay of 1947 titled “The
Legitimate claims of
National Security” has this to say;
The
national valuables in this broad sense include current assets and national
interests, as well as the sources of strength upon which our future as a nation
depends. Some valuables are tangible and earthly; others are spiritual or
intellectual. They range widely from political assets such as the Bill of
Rights, National Security and political institutions and international
relations to many economic assets which radiate worldwide from a highly
productive domestic economy supported by rich natural resources. It is the
urgent need to protect valuables such as these which legitimizes and makes
essential the role of national security.
1.1 STATEMENT OF THE
PROBLEM
Security information system has
always played a vital role in the stability of a nation. Keeping security
information manually can hinder some defense program and delay passage of
security information to the appropriate body. Manual documentation of security
information can lead to exposure of the information thereby creating threat to
the nation at large. Hence, there is need for an automated security information
system to guaranty safety of information.
1.2 OBJECTIVES OF THE
STUDY
The general objective of the study is
to develop a database for security information storage and retrieval.
Specifically, the following objectives are also considered:
i.
To build a database system for police security
information.
ii.
To develop a software for managing security
information.
iii.
To determine the effectiveness of Nigerian
police in managing signal.
1.3 DEFINITION OF
TERMS/VARIABLES
Policing: Policing
is another way of depicting the police.
Anti-policing:
Anti-policing is the society’s social attitude opposed to war between
states and in particular countering arguments based on policism.
Databases:
A systematically arranged collection of computer data, structured so that
it can be automatically retrieved or manipulated. It is also called a databank.
National
Security: The requirement to maintain the survival of the nation-state
through the use of economic, policing, and political power and the exercise of
diplomacy.
Information
Security: means protecting information and information systems from
unauthorized access, use, disclosure, disruption, modification, perusal,
inspection, recording, or destruction.
Classified
Information is sensitive information to which the access is restricted by
law or regulation to particular groups of persons.
Security
Management is a broad field of management related to asset management,
physical security and human resource safety functions.
Click “DOWNLOAD NOW” below to get the complete Projects
FOR QUICK HELP CHAT WITH US NOW!
+(234) 0814 780 1594
Buyers has the right to create
dispute within seven (7) days of purchase for 100% refund request when
you experience issue with the file received.
Dispute can only be created when
you receive a corrupt file, a wrong file or irregularities in the table of
contents and content of the file you received.
ProjectShelve.com shall either
provide the appropriate file within 48hrs or
send refund excluding your bank transaction charges. Term and
Conditions are applied.
Buyers are expected to confirm
that the material you are paying for is available on our website
ProjectShelve.com and you have selected the right material, you have also gone
through the preliminary pages and it interests you before payment. DO NOT MAKE
BANK PAYMENT IF YOUR TOPIC IS NOT ON THE WEBSITE.
In case of payment for a
material not available on ProjectShelve.com, the management of
ProjectShelve.com has the right to keep your money until you send a topic that
is available on our website within 48 hours.
You cannot change topic after
receiving material of the topic you ordered and paid for.
Login To Comment