ABSTRACT
The
principal objective of this project is to help Security Information Systems
(SIS) especially NIGERIAN POLICE which is my case study in the area they
encounter problems in securing security data-processing and efficient
information system. This will be the solution given to handle this problem by
transforming the existing manual information system into an automated form and
overcome the existing problems of insecurity and delay in data processing. I
decided to use an automated database system to enhance information storage and
keep track of security information. Again, doing this will ensure that there is
an effective security information system computerization. To achieve this,
Visual Basic 6.0 is used for its implementation
TABLE
OF CONTENTS
Title Page i
Certification ii
Dedication iii
Acknowledgement iv
Abstract v
Table of contents vi
List of figures viii
List of tables viii
CHAPTER ONE
1.0 INTRODUCTION 1
1.1 Statement of problem 3
1.2 Objective of the
study 3
1.3 Definition of
terms/variables 3
CHAPTER TWO: LITERATURE
REVIEW
2.1 Security Information
system 5
2.2 Information security 10
2.3 Cia as Information
Security Watchword 10
2.4 Risk Management in
Information Security 13
2.5 The Relevance of
Cryptography to Security Information 16
2.6 The Concept of “Due
Care” In Security Information 17
CHAPTER THREE:
METHODOLOGY AND ANALYSIS OF THE EXISTING SYSTEM
31. Fact finding method 19
3.2 Organizational
structure 20
3.3 Objectives of the
existing system 21
3.4 Input, process,
output analysis 21
3.5 Information flow
diagram 22
3.6 Problems of current
system 22
3.7 Justification for the
new system 23
CHAPTER FOUR: DESIGN AND
IMPLEMENTATION OF THE NEW SYSTEM
4.1 Output specification
and design 24
4.2 Input design and
specification 25
4.3 File Design 26
4.4 Procedure chart 28
4.5 System flowchart 29
4.6 System requirement 29
4.7 Program flowchart 31
CHAPTER FIVE SUMMARY,
RECOMMENDATION. AND CONCLUSIONS
5.1 Summary 33
5.2 Conclusion 33
5.3 Recommendation 34
REFERENCES 35
APPENDIX 36
LIST OF FIGURES
Fig 3.2 Organization
Structure 20
Fig 3.5 Information Flow
Diagram 22
Fig 4.1.1 Security Signal
Report 24
Fig 4.1.2 Police
Personnel Information 25
Fig 4.4 Procedure Chart 28
Fig 4.5 System Flowchart 29
4.7 Program Flowchart 31
Fig 5.1 Program Flowchart 32
LIST OF TABLES
Table 4.3.1 Structure for
“Police Information” 27
Table 4.3.2 Structure for
File “Signal” 27
CHAPTER ONE
1.0
INTRODUCTION
National
security is the requirement to maintain the survival of the state through the
use of economic, security operatives especially police, political power and the
exercise of diplomacy. The concept developed mostly in the United States of
America after World War II focusing on the police and military might. Now, it
encompasses a broad range of facets, all of which impinge on the police and
military for economic security of the nation, lives property and values
protected by national society. Accordingly, in order to possess national
security, a nation needs to possess economic security, energy security,
environmental security, etc. Security threats involve not only conventional
foes such as other national states but also non-state actors such as violent non-state
actors, narcotic cartels, multinational corporations and non-governmental
organizations; some authorities include natural disasters and events causing
severe environmental change in this category.
The
origin of the modern concept of “national security” as a philosophy of
maintaining a stable nation state can be traced to the peace of Westphalia,
wherein the concept of a sovereign state, ruled by a sovereign, became the
basis of a new international order of nation states.
As
an academic concept, national security can be seen as a recent phenomenon which
was first introduced in the United States after World War II, and has to some
degree replaced other concepts that describe the struggle of states to overcome
various external and internal threats. The struggle of states to overcome
various external and internal threats. The earliest mention of the term
national security, however, was made in Yale University in 1790 wherein was
made to its relation with domestic industries. The concept of the national
security became an official guiding principle of foreign policy in the United
States when the National security Act of 1947 was signed on July 26, 1947 by
the U.S. President Harry S. Truman. Together with its 1949 amendment, this act
create American national security d important facets for American national
security as the precursor to the department of defense, subordinated the
security operatives branches to the new cabinet level position of the secretary
of defense, established the National Security council and the Central
Intelligence Agency. The Act did not define national security which was
conceivably advantageous as it’s ambiguity made it a powerful phrase to invoke
whenever issues threatened by other interests of the state, such as domestic
concerns, came up for discussion and decision making.
The
realization that national security encompasses more than just security was
present though understated, from the beginning itself. The US National Security
Act of 1947 was set up “to advise the president on the integration of domestic
security and foreign policies related to national security”.
Gen
Maxwell Taylor’s essay of 1947 titled “The Legitimate claims of National
Security” has this to say;
The national valuables in this broad
sense include current assets and national interests, as well as the sources of
strength upon which our future as a nation depends. Some valuables are tangible
and earthly; others are spiritual or intellectual. They range widely from
political assets such as the Bill of Rights, National Security and political
institutions and international relations to many economic assets which radiate
worldwide from a highly productive domestic economy supported by rich natural
resources. It is the urgent need to protect valuables such as these which
legitimizes and makes essential the role of national security.
1.1
STATEMENT OF THE PROBLEM
Security
information system has always played a vital role in the stability of a nation.
Keeping security information manually can hinder some defense program and delay
passage of security information to the appropriate body. Manual documentation
of security information can lead to exposure of the information thereby
creating threat to the nation at large. Hence, there is need for an automated
security information system to guaranty safety of information.
1.2
OBJECTIVES OF THE STUDY
The
general objective of the study is to develop a database for security
information storage and retrieval.
Specifically,
the following objectives are also considered:
i.
To build a database system for police security information.
ii.
To develop a software for managing security information.
iii.
To determine the effectiveness of Nigerian police in managing signal.
1.3
DEFINITION OF TERMS/VARIABLES
Policing:
Policing
is another way of depicting the police.
Anti-policing:
Anti-policing
is the society’s social attitude opposed to war between states and in
particular countering arguments based on policism.
Databases:
A
systematically arranged collection of computer data, structured so that it can
be automatically retrieved or manipulated. It is also called a databank.
National
Security: The requirement to maintain the survival of the
nation-state through the use of economic, policing, and political power and the
exercise of diplomacy.
Information
Security: means protecting information and information systems
from unauthorized access, use, disclosure, disruption, modification, perusal,
inspection, recording, or destruction.
Classified
Information is sensitive information to which the
access is restricted by law or regulation to particular groups of persons.
Security
Management is a broad field of management related to
asset management, physical security and human resource safety functions.
Buyers has the right to create
dispute within seven (7) days of purchase for 100% refund request when
you experience issue with the file received.
Dispute can only be created when
you receive a corrupt file, a wrong file or irregularities in the table of
contents and content of the file you received.
ProjectShelve.com shall either
provide the appropriate file within 48hrs or
send refund excluding your bank transaction charges. Term and
Conditions are applied.
Buyers are expected to confirm
that the material you are paying for is available on our website
ProjectShelve.com and you have selected the right material, you have also gone
through the preliminary pages and it interests you before payment. DO NOT MAKE
BANK PAYMENT IF YOUR TOPIC IS NOT ON THE WEBSITE.
In case of payment for a
material not available on ProjectShelve.com, the management of
ProjectShelve.com has the right to keep your money until you send a topic that
is available on our website within 48 hours.
You cannot change topic after
receiving material of the topic you ordered and paid for.
Login To Comment