TABLE OF CONTENTS
Title Page- - -
Approval page- -
Certification- -
Dedication - -
Acknowledgement - Table of contents-
List of figures-
List of tables- -
Abstract- - -
CHAPTER ONE
- - - - - - - -i
- - - - - - - -ii
- - - - - - - -iii
- - - - - - - -iv
- - - - - - - -v
- - - - - - - -vi
- - - - - - - -x
- - - - - - - -xi
- - - - - - - -xii
1.0 INTRODUCTION- - - - - - - - -1
1.1 Statement of problem- - - - - - - -5
1.2 Objective of the study - - - - - - -5
1.3 Definition of terms/variables- - - - - - -6
CHAPTER TWO: LITERATURE REVIEW
2.1 Security Information system- - - - - - -6
2.2 Information security- - - - - - - -17
2.3 Cia as Information Security Watchword- - - - -18
2.4 Risk Management in Information Security- - - - -23
2.5 The Relevance of Cryptography to Security Information- -29
2.6 The Concept of “Due Care” In Security Information- - -31
CHAPTER THREE: METHODOLOGY AND ANALYSIS OF THE
EXISTING SYSTEM
31. Fact finding method- - - - - - - -33
3.2 Organizational structure- - - - - - -35
3.3 Objectives of the existing system- - - - - -36
3.4 Input, process, output analysis- - - - - -36
3.5 Information flow diagram- - - - - - -38
3.6 Problems of current system- - - - - - -39
3.7 Justification for the new system- - - - - -39
CHAPTER FOUR: DESIGN AND IMPLEMENTATION OF THE NEW SYSTEM
4.1 Output specification and design- - - - - -40
4.2 Input design and specification- - - - - -42
4.3 File Design - - - - - - - - -44
4.4 Procedure chart- - - - - - - - -47
4.5 System flowchart- - - - - - - -48
4.6 System requirement- - - - - - - -49
4.7 Program flowchart- - - - - - - -51
CHAPTER FIVE SUMMARY, RECOMMENDATION AND CONCLUSIONS
5.1 Summary- - - - - - - - - -53
5.2 Conclusion- - - - - - - - - -54
5.3 Recommendation- - - - - - - -55
REFERENCES- - - - - - - - - -58
APPENDIX- - - - - - - - - -61
ABSTRACT
The principal objective of this project is to help Security Information Systems (SIS) especially NIGERIAN POLICE which is my case study in the area they encounter problems in securing security data-processing and efficient information system. This will be the solution given to handle this problem by transforming the existing manual information system into an automated form and overcome the existing problems of insecurity and delay in data processing. I decided to use an automated database system to enhance information storage and keep track of security information. Again, doing this will ensure that there is an effective security information system computerization. To achieve this, Visual Basic 6.0 is used for its implementation.
Consults, E. (2022). DESIGN AND IMPLEMENTATION OF A SECURITY INFORMATION SYSTEM (A CASE STUDY OF THE NIGERIAN POLICE). Afribary. Retrieved from https://tracking.afribary.com/works/design-and-implementation-of-a-security-information-system-a-case-study-of-the-nigerian-police
Consults, Education "DESIGN AND IMPLEMENTATION OF A SECURITY INFORMATION SYSTEM (A CASE STUDY OF THE NIGERIAN POLICE)" Afribary. Afribary, 28 Jul. 2022, https://tracking.afribary.com/works/design-and-implementation-of-a-security-information-system-a-case-study-of-the-nigerian-police. Accessed 24 Nov. 2024.
Consults, Education . "DESIGN AND IMPLEMENTATION OF A SECURITY INFORMATION SYSTEM (A CASE STUDY OF THE NIGERIAN POLICE)". Afribary, Afribary, 28 Jul. 2022. Web. 24 Nov. 2024. < https://tracking.afribary.com/works/design-and-implementation-of-a-security-information-system-a-case-study-of-the-nigerian-police >.
Consults, Education . "DESIGN AND IMPLEMENTATION OF A SECURITY INFORMATION SYSTEM (A CASE STUDY OF THE NIGERIAN POLICE)" Afribary (2022). Accessed November 24, 2024. https://tracking.afribary.com/works/design-and-implementation-of-a-security-information-system-a-case-study-of-the-nigerian-police