Security Information System
Security Information System
BY
OCTOBER, 201
CERTIFICATION
I the undersigned hereby certified that this project work was carried out by
OKOTIE DAVID VIVIAN with matriculation number ICT/525160354 to the
department of Computer Science, Auchi Polytechnic, Auchi.
I also certify that the project work is adequate in scope and quality in
partial fulfillment for the award of National Diploma (ND) in Computer Science.
…………………………………………………….. ……………………………………...
MR. UMORU JOSEPH DATE
(Project Supervisor)
……………………………………….. ……………………………………….
MR. BAYO ADEDEJI DATE
(Head, Department of Computer Science)
DEDICATION
This project work is dedicated to God for His love, guidance, inspiration
My greetings and gratitude goes to my beloved parents Mr. And Mrs. OKOTIE as
well as my siblings, uncles and aunts for their insight, inspiration and motivation
for providing and enabling the writing of this project possible.
I am grateful to my project supervisor MR. UMORU JOSEPH who despite his tight
schedule of his duties still patiently took time to read and made necessary
correction. I want to say Sir, your useful suggestion and comment have been
carefully considered and acted on.
May God almighty richly bless and reward you all amen.
TABLE OF CONTENTS
Title Page i
Certification ii
Dedication iii
Acknowledgement iv
Table of content v
Abstract vi
CHAPTER ONE
1.0 INTRODUCTION 1
5.1 Summary 35
5.2 Conclusion 35
5.3 Recommendation 36
REFERENCES 37
APPENDIX II 38
ABSTRACT
The principal objective of this project is to help Criminal Face Identification
Systems. which is my case study in the area they encounter problems in securing
security data-processing and efficient information system. This will be the
solution given to handle this problem by transforming the existing manual
information system into an automated form and overcome the existing problems
of insecurity and delay in data processing. I decided to use an automated
database system to enhance information storage and keep track of security
information. Again, doing this will ensure that there is an effective security
information system computerization. To achieve this, Visual Basic 6.0 is used for
its implementation.
CAHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF THE STUDY
Information system occupies a vital and unique position in any
organization by virtue of the data and information, which it contains. Security of
information is of great importance to any given organization this makes the
information reliable since information stored can be referenced whenever
necessary access by unauthorized persons (Allen, 2007).
This project analysis the activities and importance of securing information
in any organizations and to see that the information is accurately maintained to
help the management in decision making and control of the diverse activities of
the organization
The Nigeria police force is responsible for security of live and property and
as a result keeps record of vital information given to them by any informant so
as to enable them arrest activities or scenes unpleasant to people residing in a
particular district (Saliu, 2016).
Therefore, for effective administration and management, the provision of
computer based information security for every source station is certainly
inevitable, since it will take care of all the problems and inadequacies of the
manual system (Saliu, 2016).
proven very difficulty and tedious to work upon. The problems faced here are:
2. Longer waiting time: The record clerk wastes so much time in bringing
victim folders. In case the management needs the record for a particular
victim, it takes the clerk time to manually organize the data and bring it to
little or no regard. This leads to detaching and tearing away of some of the
staff information.
security checks in most Police Stations, victim records which are main be
This project will therefore go a long way reducing the stress involved the
1.6 LIMITATIONS
A lot of militating constraints were encountered during the course of this write
up. They are:-
Inaccessibility to some documents, which arose due to security, imposed on
some of the organization documents by the management. It was not also
possible to make an in-dept study of these documents, which would have
helped in the development of the project work.
Time was a major limitation to this write up, there wasn’t enough time to
study the details of the various field of the information department of the
organization unavailability of textbook needed for this write – up was not
found in the institution library.
1.7 ASSUMPTIONS
For easy implementation of this study some assumption were made.
It is assumed that the software to be designed for the study will help police
stations in the effective storage of vital information.
Finally, it is also assumed that by computerizing this organization,
information security has been implemented to handle their day to day cases in a
better and more organized manner.
policing is the society’s social attitude opposed to war between states and in
called a databank.
state through the use of economic, policing, and political power and the
exercise of diplomacy.
Webster and Watson, (2004). The authors examined selected papers (no time
period constraint) from the information systems field using keywords capturing
security program involves two major elements, risk analysis and risk
management.
For each system, its value to the organization is established and the degree to
the other hand, involves selecting the controls and security measures that reduce
efficient and reflect common sense, risk management must be done within a
2009).
Risk management becomes a senior management issue. A balance has to
be reached between the values of the information to the organization on the one
hand and the cost of the personnel, administrative and technological security
measures on the other hand. The security measures put in place need to be less
availability of precise threat frequencies that may be beyond the reach of many
audit offices, at least initially. The objective is to build up over time the
This research study will build upon the body of work by Shannon and
Weaver and Mason develop a model for predicting IS security success within an
information. Second, the semantic level relates to the success of the information
effectiveness level is the result the information actually has on the user’s
behavior. Mason adapted the work by Shannon and Weaver in order to relate it
security policies dealing with all aspects of physical security, personnel security
and information security. There should be clear roles and responsibilities for
administrative, computer and information system levels. They must all work
any level can threaten the security at other levels. If personnel security policies,
for instance, are not well designed and implemented, information security could
elsewhere. Encryption, for instance, adds an extra layer of protection for data
the information should simply be created and carried otherwise. For those
departments, the cost and the constraints of the appropriate security controls
and measures may just not be acceptable, given the small volume of information
(Newsome, 2013)
One of the Organization’s key resources is its information. The first step to
being protected;
recent years. There are many ways of gaining entry into the field as a career. It
offers many areas for specialization including: security network(s) and allied
science etc. For over twenty years, information security has held
sometimes been proposed for addition-it has been out that issues such as Non-
Repudiation do not fit well within the three core concepts, and as
installations. Don Parker, (2002) proposed an alternative model for the classic
CIA triad that he called the six atomic elements of information. The elements are
number to be transmitted from the buyer to the merchant and from the
by limiting the places where it might appear (databases, log files, backups,
printed receipts, and so on), and by restricting access to the places where it is
the privacy of the people whose personal information a system holds (McCarthy,
2006).
when needed. This means that the computing systems used to store and
process the information, the security control used to protect it, and the
physical) are genuine. It is also important for authenticity to validate that both
parties involved are who they claim they are. In law, non-repudiation implies
one’s intention to fulfill their obligations to a contract. It also implies that one
security policy set out by senior management and to identify changes made
necessary by developments in the organization’s information systems or the
DEPUTY DEPUTY
ASSISTANT
POLICE POLICE
COMMISSIONER OF
COMMISSIONER COMMISSIONER
POLICE
(CRIME)
ID………………………………………………………………………………………..
NAME…………………………………………………………………………………
ADDRESS…………………………………………………………………………..
DATE OF BIRTH…………………………………………………………………..
SEX…………………………………………………………………………………….
AGE…………………………………………………………………………………..
STATUS…………………………………………………………………………….
HEIGHT………………………………………………………………………………
DATE RECRUITED……………………………………………………………….
QUALIFICATION…………………………………………………………………
DEPARTMENT…………………………………………………………………….
RANK…………………………………………………………………………………
\ OF KIN……………………………………………………………………..
NEXT
Main Menu
FIG 4.4
Search by About the
rank Signal Software
Report
Signal
Search by
Dept
Exit
3.9 SYSTEM FLOWCHART
Security Information
Processor
Disk storage
Output
start
Enter password
Enter password
NO
Valid password?
Valid password?
YES
Option information?
Option information? A
YES
NO
Option Report? YES
Option Report? PRINT REPORT
NO
NO
DATABASE ADMINISTRATOR
AND
DATABASE MANAGER
IG
OF POLICE
AIG OF POLICE
IN THE ZONE
COMMISSIONER
OF
POLICE
OTHER
OFFICERS
SYSTEM IMPLEMENTATION
4.0 INTRODUCTION
testing and eventually change over to the new system. It also spells out how the
entire system or program is and how not works both the arrangement of the
program flowchart and pseudo code and equally the program design itself. The
source program is also attached a well as some print outs from the program.
program. Some of the programming language are machine language (low level
language. High level language include; Basic, FORTRAN, Visual Basic, COBOL,
VB.Net, CH etc.
6.0. This language is chosen because of its object oriented nature. Visual Basic
6.0 has functions for dealing with database problems. With Visual Basic 6.0,
records can be sent to database, records can be searched out of database, and
Graphical User Interface (GUI) as the name suggests, uses illustrations for text,
which enables users to interact with an application. This feature makes it easier
The system requirements to aid the efficient and effective utilization the
Hardware and
Software
HARDWARE REQUIREMENT:
1.44MB, 512MB (or below) flash disk storage capacity with density format.
SOFTWARE REQUIREMENT
Visual Basic
PEOPLE:
The people required to this software are those who have a basic
understanding of computing. That is, computer literacy is criteria for using this
software.
Hardware Specification
Any IBM compatible with reasonable conventional memory and two drives
will be able to run this software packages. A monitor is required to display the
information while a get or dot matrix printer is needed to produce the hardcopy
Software Specification
The installation aspect is to fix the required software and hardware for the
effective operation of the system. When installing the software, one should make
sure that the different hardware of the computer system is functioning also with
box will appear on the monitor, which will now guide the user in which step to
At the testing stag, every statement must be tested to ensure that there
are no errors in program. If this is not done, an error in the program may go
undetected for months and the objective of the system will not be achieved. The
opportunities for injection of human facilities are enormous error may begin to
occur at the inception of the process where the objectives may be imperfectly
expect 40% of the total project effort on testing. Testing a program is the
Syntax Error
Logical Error
Runtime Error
Compilation Error
operators acquainted with the operations of the system. Explain all aspect of the
procedure will allow the institution to still maintain the conventional files in
the beginning with such a time when the present conventional files should
have been transferred to the new system. This is to guard the staff past
records
In making use of the system, the user who wishes to carry out any operations
has to first boot the system. And before using the software, he/she has to make
The software is developed in such a way that anybody, whether with the
knowledge of computer or not, he/she can access it. Meaning that the software
CHAPTER FIVE
SUMMARY, RECOMMENDATION AND CONCLUSIONS
5.1 SUMMARY
Information in its most restricted technical sense is an ordered sequence
of symbols that record or transmit a message. It can be recorded as signs, or
conveyed as signals by waves. Information is any kind of event that affects the
state of a dynamic system. As a concept, however, information has numerous
meanings. Moreover, the concept on information is closely related to motions of
constraint, communication, control, data, form, instruction, knowledge, meaning,
mental stimulus, pattern, perception, representation, and especially entropy.
The measures adopted to maintain national security in the face of threats
to society has led to ongoing dialectic, particularly in the liberal democracies, on
the appropriate scale and role of authority in matters of civil and human rights.
Tension exists between the preservation of the state (by maintaining self-
determination and sovereignty) and the rights and freedoms of individuals.
Although national security measures are imposed to protect society as a whole,
many such measures will restrict the rights and freedoms of all individuals in
society. The concern is that where the exercise of national security laws and
powers I not subject to good governance, the rule of law, and strict checks and
balances, there is a risk that “national security” may simply serve as a pretext for
suppressing unfavorable political and social views.
5.2 CONCLUSION
For much of police history the armed forces were considered to be for use
by the heads of their societies, until recently, the crowned heads of states. In a
democracy of other political system run in the public interest, it is a public force.
The relationship between the police and the society it serves is a
complicated and ever-evolving one. Much depends on the nature of the society
itself and whether it sees the police as important, as for example in time of
threat or war, or a burdensome expense typified by defense cuts in time of
peace
5.3 RECOMMENDATION
The following recommendations are made:
That this system be implemented by Nigeria police to enable them go into
computerized information system.
Also schools should expose students to some more relevant programming
languages like visual basic so as to enable them carry out their projects on their
own.
Libraries should b well equipped to simplify the work for the students and
especially during the research phase.
These relationships are seen from the perspective of political police
relations, the police industrial complex mentioned above, and the socio-police
relationship. The last can be divided between those segments of society that
offer for the police, those who voice oppositions to the police, the voluntary and
involuntary civilians in the police forces, the populations of civilians in combat
zone, and of course the police self-perception.
Police often function as societies within societies, by having their own
police communities, economies, education, medicine and other aspects of a
functioning civilian society. Although a police is not limited to nations of itself as
many private police companies (or PPC’s) can be used or “hired” by organizations
and figures as security, escort, to other means of protection where police,
agencies, or militaries are absent or not trusted
REFERENCES
Cynthia, A. (2008). U.S. National Security: A Reference Handbook. India:
Pretience Hall. pp.223.
MAIER, C. S. (1990). Peace & Security For the 1990’s. New York Oxford
Press.pp.132-134
Paleri, P. (2008). National Security: Imperatives and Challenges. New delhi: Tata
McGraw-Hill.pp.321.
Yeun, F. (2006). Human Security And The UN: A Critical History, United Nations
Intellectual History project (Illustrated ed.). Indiana University Press.pp.203..