DESIGN AND IMPLEMENTATION OF A COMPUTER-BASED SECURITY INFORMATION SYSTEM

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0045
  • Access Fee: ₦5,000 ($14)
  • Chapters: 1-7 Chapters
  • Pages: 75 Pages
  • Methodology: NIL
  • Reference: YES
  • Format: Microsoft Word
  • Views: 2.9K
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853
DESIGN AND IMPLEMENTATION OF A COMPUTER-BASED SECURITY INFORMATION SYSTEM
 ABSTRACT

Information is an important aspect of life. Vital information is the life wire or backbone of any organization. From sports statistics to the latest stock market price such facts keep people abreast of time.
          Computing, printing, photography and some recording are all forms of automatic information processing.
In all of these processed , the information as perceived by man, is captured, processed, transmitted and stored.
Finally it is reproduced in a form which can be easily understood by man.
          Next, there is a need to store the information so that it can be referenced when necessary . computers are unrivalled in their capacity to store data. Therein lies the importance of application software which configure the computer to act as an intelligent typewriter or entrepreneur, so long as the correct command are given.
          A database is one of the most acceptable business software application today. It is a collection of related information that is organized for case of reference.
This means that one could maintain a database on paper, stored in file holders that were kept in file cabinets.
That was the case before the advent of computers. File had to be pulled out of cabinets, forms filled and paper shuffled.
          This project describe how all these could be done electronically. It shows how information could be stored, modified and recalled instantly and accurately.
Information on staff of the establishment of case study is maintained, reports are lodged in and more reports are generated from these.     
 ORGANISATION OF WORK
           The project is made up of two section namely the write up and the program section. The write up section is made up of seven chapter each chapter with its sub-headings. Chapter one dealt with the problems, purpose, objective, scope constrains assumptions and definitions of terms used in the project. Chapter two talks about the literature review on the topic of the project chapter three discussed the existing system its problems, input, output and processing procedures. Chapter four dealt with the new system, its design, and implementation. Chapter five talks about the program design. Chapter six dealt with the documentation and finally the last chapter which  is chapter seven talks about the conclusion and recommendation.
 TABLE OF FIGURES
Input output process analysis
Organization chart
Design of the new system
Procedure chart
System flow chart
Program flow chart
 TABLE OF CONTENTS
 CHAPTER ONE
INTRODUCTION
STATEMENT OF THE PROBLEM
PURPOSE OF THE STUDY
AIMS AND OBJECTIVE
PROJECT SCOPE
MAJOR DESIGN CONSTRAINTS AND LIMITATION
MOJOR SOFTWARE FUNCTIONS
ASSUMPTIONS
DEFINITION OF TERMS
 
CHAPTER TWO
LITERATURE REVIEW
 CHAPTER THREE
DESCRIPTION AND ANALYSIS OF THE EXISTING
FACT FINDING USED
ORGNIAZATIONAL STRUCTURE
OBJECTIVE OF THE EXISTING SYSTEM
INPUT, PROCESS, OUTPUT ANALYSIS
INFORMATION FLOW CHART DIAGRAM
PROBLEMS FOR THE EXISTING SYSTEM
JUSTIFICAITON FOR A NEW SYSTEM
 CHAPTER FOUR
DESIGN OF THE NEW SYSTEM
INPUT SPECIFICATION AND DESIGN
OUTPUT SPEICIFATION AND DESIGN
FILE DESIGN
PROCEDURE CHART
SYSTEM FLOW CHART
SYSTEM REQUIREMENT
CHAPTER FIVE
IMPLEMENTATION
PROGRAM DESIGN
PROGRAM FLOW CHART
PSEUDOCODE
SOURCE PROGRAM
TEST RUN
CHAPTER SIX
DOCUMENTATION
CHAPTER SEVEN
RECOMMENDATION AND CONCLUSION
REFERENCES
CHAPTER ONE
 1.0       INTRODUCTION
The security is the act of protecting companies asset, personal image, personnel and collection lives groups of properties. The main function of this department is to secure the labs and the properties that belongs to this institution. They also settle some problems in between the student and the staff. Eg streting of life and other things. The security department, I.M.T Enugu (S D I E) started in this institution in 1977. in security department, there was a thing they called “ABEEAT ”. BEEAT is an area given to the security man to look after it, during the working hour, to see if there will be any problem around. They also have a communication system, such as telephone, working talking, radio message etc.
This project ray emphasis on the security department (SOLT) of I.M.T. the security is one of the department under the function called health safety and environment East (HSEE). The main function of this department is to project assets in terms of lives and project.
 1.1    STATEMENT OF THE PROBLEMS  
Security of data or information in many establishment is becoming a sources of concern to the management of the establishment due to problems normally encountered in each department of an organization, security its human, individual data, information and resources and its complexity and duplications some organizations prefer having a security department where all the information’s about human and material resources are put into a data bank which allows for easier access and retrieval of information. However, due to large number of processes that goes on in the manual operation and loss of information associated with it, it therefore becomes necessary to automate the activities of the security department.
 1.2    PURPOSE OF THE PROJECT
          Security department, IMT Enugu (SDIE) is the secure with many departments. One of such department is the security department although the operation of all this departments have not be computerized but security been vital to the development of I.M.T Enugu needs to be computerized at all cost. A continued manual operation of the security department of I.M.T Enugu will endanger or put the operation  of IMT in jeopardy, hence the purpose of this project is to automate the operation of the security department in order to ensure good co-ordinations.
 1.3    OBJECTIVE OF PROJECT]
          Inspite of the larges of I.M.T, the level of automation and computing done there, it may be a little surprising to discover that there are some areas where computing is still at the grassroots level. An one of such is the security department (SDIE0).
          SDIE is very crucial and sensitive. Its importance cannot be over emphasized. It required a certain degree of projection and secrecy, especially of vital information. These cannot be realized in their current system of operation, which is all manual. The aim of this project is to develop a computer software which will maintain a database for the operation of SIDE. It will also provide procedure for the management of other security related information.
 1.4       PROJECT SCOPE
The scope of this project depends on the available facilities and resources  both human and material. The project will cover two broad aspects, those of staff and security information within the limit of available facilities and information given by the IMT staff.
 1.5    MAJOR SOFTWARE FUNCTIONS
          This project will cover two broad area of security department.
 1.6    STAFF INFORMATION
          This should feature all pertinent information such as the staff name, the staff employment number, residential address, gender (male or female) etc. which might be useful in staff administration.
 2.      SECURITY INFORMATION
          This should have facilities for lodging field reports into the system. periodic reports can be generated at intervals, from these. Moreso, other security information can be obtained from this areas. The software will also incorporate  a facility for file maintenance, operations which would be used to update and modify the records whenever necessary.
 
DESIGN AND IMPLEMENTATION OF A COMPUTER-BASED SECURITY INFORMATION SYSTEM
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0045
  • Access Fee: ₦5,000 ($14)
  • Chapters: 1-7 Chapters
  • Pages: 75 Pages
  • Methodology: NIL
  • Reference: YES
  • Format: Microsoft Word
  • Views: 2.9K
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU0045
    Fee ₦5,000 ($14)
    Chapters 1-7 Chapters
    No of Pages 75 Pages
    Methodology NIL
    Reference YES
    Format Microsoft Word

    Related Works

    ABSTRACT Information is an important aspect of life. Vital information is the life wire or backbone of any organization. From sports statistics to the latest stock market price such facts keep people abreast of time. Computing, printing, photography and some recording are... Continue Reading
    ABSTRACT Information is an important aspect of life. Vital information is the life wire or backbone of any organization. From sports statistics to the latest stock market price such facts keep people abreast of time. Computing, printing, photography and some recording are all forms of automatic information processing. In all of these processed ,... Continue Reading
    ABSTRACT Information is an important aspect of life. Vital information is the life wire or backbone of any organization. From sports statistics to the latest stock market price such facts keep people abreast of time. Computing, printing, photography and some recording are all forms of automatic information processing. In all of these processed ,... Continue Reading
    ABSTRACT Information is an important aspect of life. Vital information is the life wire or backbone of any organization. From sports statistics to the latest stock market price such facts keep people abreast of time. Computing, printing, photography and some recording are all forms of automatic information processing. In all of these processed ,... Continue Reading
    CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF THE STUDY The world is becoming a smaller place in which to live and work. A technological revolution in communications and information exchange has taken place within business, industry and homes. Most developed and developing countries are substantially more invested in information processing and... Continue Reading
    ABSTRACT The fundamental aim of this project is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system. It also airs the... Continue Reading
    ABSTRACT The fundamental aim of this project “Design and Implementation of Network Based Security Information System” is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system. It... Continue Reading
    DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION SYSTEM  CHAPTER TWO LITERATURE REVIEW 1.0            SECURITY CONCEPT Security is defined in many ways due to the many contexts of its existence.  In other words, security generally has to do with protection.  It might be protection from undue access.  Some attributes... Continue Reading
    ABSTRACT The fundamental aim of this project is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system. It also airs the different machines used in information processing system to reduce the... Continue Reading
    ABSTRACT The fundamental aim of this project is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system. It also airs the different machines used in information processing system to reduce the... Continue Reading
    Call Us
    Get this work
    whatsappWhatsApp Us