DESIGN AND IMPLEMENTATION OF A COMPUTERIZED SECURITY INFORMATION SYSTEM

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU2506
  • Access Fee: ₦5,000 ($14)
  • Pages: 11 Pages
  • Format: Microsoft Word
  • Views: 462
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

DESIGN AND

IMPLEMENTATION OF A COMPUTERIZED SECURITY INFORMATION SYSTEM





(A CASE

STUDY OF NIGERIA POLICE FORCE)





 





 





 





 





 





 





TABLE

OF CONTENTS





Cover

page





Title

page





Certification





Dedication





Acknowledgement





Abstract





Organization

of the work





Table

of contents





   





Introduction





1.1  

Background

of the study





1.2  

Statement

of problem





1.3  

Purpose

of study





1.4  

Scope of

study





1.5  

Limitations





1.6  

Assumption





1.7  

Definition

of terms





 





CHAPTER

ONE





INTRODUCTION





1.1  

BACKGROUND

OF STUDY





Information system occupies a vital and

unique position in any organization by virtue of the data and information,

which it contains. Security of information is of great importance to any given

organization this makes the information reliable since information stored can

be referenced whenever necessary access by unauthorized persons.





This project analysis the activities and

importance of securing information in any organizations and to see that the

information is accurately maintained to help the management in decision making

and control of the diverse activities of the organization.





The Nigeria police force is responsible for

security of live and property and as a result keeps record of vital information

given to them by any informant so as to enable them arrest activities or scenes

unpleasant to people residing in a particular district.





Therefore, for effective administration and

management, the provision of computer based information security for every

source station is certainly inevitable, since it will take care of all the

problems and inadequacies of the manual system.





 





 





1.2  

STATEMENT

OF THE PROBLEM





Inspite of the level of computation of

various organizations, this particular organization on discussion is still at

the grass root level. It requires a certain degree of protection especially of

vital equipments, properties and information and this cannot be realized

through the current system of operation, which is the manual system.





 





1.3  

PURPOSE

OF THE STUDY





The purpose of this study is to provide a

computer based, on line and interactive package that will accurately and

efficiently record all data and information about staff, informers, witnesses

and accused persons.





It will also eradicate the numerous problems

associated with the manual technique of securing information in order to

facilitate the transfer and retrieval of information between the various

departments of the organization,





 





 





1.4  

AIMS

AND OBJECTIVES





Having studied the activities of the police

station some benefits could be derived from the computerization of information

system and this includes:





1.     

Higher

security efficiency of information





2.     

Quicker

access to individual data





3.     

Faster

treatment of information security oriented cases.





4.     

Provision

of output information in a readily comprehensible form to those persons

involved in the activities of the organization. Provision of communication channels.

To compass formal and informal component.





To provide storage facilities

for data not immediately required or that may be required to be used more than

once.





 





1.5  

THE

SCOPE OF THE STUDY





The scope of this study is to eradicate the

numerous problems associated with the manual technique of securing information

in order to facilitate the retrieval of information.





 





1.6  

LIMITATIONS





A lot of militating constraints were

encountered during the course of this write up. They are:-





Inaccessibility to some documents, which

arose due to security, imposed on some of the organization documents by the

management. It was not also possible to make an in-dept study of these

documents, which would have helped in the development of the project work..





Time was a major limitation to this write up,

there wasn’t enough time to study the details of the various field of the

information department of the organization unavailability of textbook needed

for this write – up was not found in the institution library.





 





1.7  

ASSUMPTIONS





For easy implementation of this study some

assumption were made.





It is assumed that the software to be

designed for the study will help police stations in the effective storage of

vital information.





Finally, it is also assumed that by

computerizing this organization, information security has been implemented to

handle their day to day cases in a better and more organized manner.





 





1.8  

DEFINITION

OF TERMS





Q

– Basic    -   The programming language used in designing the project program





Modules  -   This

is the act of partitioning software’s logically into elements that performs

specific functions and sub functions.





On-line

processing    - This is a method of

processing that provides direct access to information files used by user’s and

so enables updating.





Operations

– The action carried out on an activity or process.





Crime

record sheet – This contains pertinent information on staff and services as

input to the computer system via the standard input deice keyboard





Data

entry – This is the standard input device through which the system gets most of

the instructions and commands.





Old

file – This contains previous information on the staff and crime record and is

updated each time on operation is carried out.





Display

unit – An output device where systems display mosts outputs on request.





New

file – This is an update of the old file and is stored on line in the system

hard disk or a floppy diskette.





Storage

unit – This is where files are stored and retrieved when needed, it could be

the hard – disk, floppy disk, drums e.t.c.





Processing

unit – This is where all data are processed and commands from the user carried

out.





Password

– This is being employed to restrict unauthorized access to information

contained in the system; in others it is a security check technique





Witness

– This is a person who has actually present at an event and should for these

reason be able to describe it.





Accused

– This is a person who has done wrong by breaking the law. Information or

informers – This is a person who detects offenders and informs the authorities

of their offences





Suspect

– This is when one have a feeling that someone is guilty.





Search

warrant – This is an official authority given to policemen when it is necessary

to enter and search a building for any stolen property.





Exhibit

– This is a document produced in a law court and referred to in evidence.





Conviction

– This is the act of convicting a person for crime.





 





 

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED SECURITY INFORMATION SYSTEM
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU2506
  • Access Fee: ₦5,000 ($14)
  • Pages: 11 Pages
  • Format: Microsoft Word
  • Views: 462
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU2506
    Fee ₦5,000 ($14)
    No of Pages 11 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT Security of life and property is an essential need of an individual as well as a generate body. This calls for the need for a well-organized information security system. Before the advent of computers, there was no security of vital information’s, files where pulled out from  cabinets from sections, which might result to... Continue Reading
    ABSTRACT Security of life and property is an essential need of an individual as well as a generate body. This calls for the need for a well-organized information security system. Before the advent of computers, there was no security of vital information’s, files where pulled out from cabinets from sections, which might result to... Continue Reading
    A CASE STUDY OF LEECON FINANCE AND INVESTMENT LTD ABSTRACT Having discovered the importance of computers in al ranks and aspects of life, computer system is applicable to almost all human activities and has been employed to automats most activities especially in areas were management... Continue Reading
    ABSTRACT Having discovered the importance of computers in al ranks and aspects of life, computer system is applicable to almost all human activities and has been employed to automats most activities especially in areas were management data is of outmost importance. Due to unauthorized access to data in database, repose disclosure or modification... Continue Reading
    (A CASE STUDY OF THE NIGERIAN POLICE) ABSTRACT The principal objective of this project is to help Security Information Systems (SIS) especially NIGERIAN POLICE which is my case study in the area they encounter problems in securing security data-processing and efficient information system.... Continue Reading
    ABSTRACT Having discovered the importance of computers in al ranks and aspects of life, computer system is applicable to almost all human activities and has been employed to automats most activities especially in areas were management data is of outmost importance. Due to unauthorized access to data in database, repose disclosure or modification... Continue Reading
    ABSTRACT Having discovered the importance of computers in al ranks and aspects of life, computer system is applicable to almost all human activities and has been employed to automats most activities especially in areas were management data is of outmost importance.  Due to unauthorized access to data in database, repose disclosure or modification... Continue Reading
    ABSTRACT The fundamental aim of this project “Design and Implementation of Network Based Security Information System†is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system. It also... Continue Reading
    ABSTRACT The fundamental aim of this project is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system. It also airs the... Continue Reading
    ABSTRACT The fundamental aim of this project “Design and Implementation of Network Based Security Information System” is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system. It... Continue Reading
    Call Us
    whatsappWhatsApp Us