Design And Implementation Of A Computerized Security Information System

(A Case Study Of Nigeria Police Force Enugu State)

A Computerized Security Information System (CSIS) is a comprehensive and dynamic platform designed to safeguard digital assets and sensitive information within an organization. It serves as a centralized hub for monitoring, analyzing, and responding to security threats and breaches across various layers of the IT infrastructure. By integrating advanced technologies such as machine learning, encryption, and intrusion detection, Computerized Security Information System empowers organizations to proactively identify vulnerabilities, detect anomalous activities, and mitigate risks in real-time. This system encompasses a range of functionalities including access control, threat intelligence integration, incident management, and compliance reporting, ensuring continuous protection against evolving cyber threats. With its robust features and adaptive capabilities, Computerized Security Information System plays a fundamental role in fortifying the cyber defenses of modern enterprises, enhancing resilience, and fostering a proactive security posture.

ABSTRACT

Security of life and property is an essential need of an individual as well as a generate body. This calls for the need for a well-organized information security system.
Before the advent of computers, there was no security of vital information’s, files where pulled out from cabinets from sections, which might result to misplacement of individual files, and documents as a result this project was implemented.
This project emphasis on information which is produced in a way understandable by man and the need to store this information so that need to store this information so that it can be referenced when necessary, it also describes how all these could be done electronically. It shows how information could be stored, modified and recalled instantly and accurately through computerization with out access by authorized persons.

 

 

 

 

 

TABLE OF CONTENT

Cover page
Title page
Certification
Dedication
Acknowledgement
Abstract
Organization of the work
Table of contents

CHAPTER ONE
Introduction
1.1 Background of the study
1.2 Statement of problem
1.3 Purpose of study
1.4 Scope of study
1.5 Limitations
1.6 Assumption
1.7 Definition of terms

CHAPTER TWO
Literature review

CHAPTER THREE
Descriptions and analysis of the existing system
3.1 General description of the existing system
3.2 Methods of fact finding used
3.3 The organizational structure
3.4 Objectives of the existing system
3.5 Input, process, and output analysis
3.6 Information flow diagram
3.7 Problem of the existing system
3.8 Justification for the new system

CHAPTER FOUR
Design of the new system
4.1 Output specifications and design
4.2 Input specifications and design
4.3 File design
4.4 Procedure chart
4.5 System flowchart
4.6 System requirements

CHAPTER FIVE
Implementation
5.1 Program design
5.2 Program flow chart
5.3 Psendocodes
5.4 Sources programs
5.5 Test run

CHAPTER SIX
Documentation
6.1 System documentation
6.2 Program documentation
6.3 User documentation

CHAPTER SEVEN
Conclusion and Recommendation
7.1 Conclusion
7.2 Recommendation
Bibliography

CHAPTER ONE

INTRODUCTION
1.1 BACKGROUND OF STUDY
Information system occupies a vital and unique position in any organization by virtue of the data and information, which it contains. Security of information is of great importance to any given organization this makes the information reliable since information stored can be referenced whenever necessary access by unauthorized persons.
This project analysis the activities and importance of securing information in any organizations and to see that the information is accurately maintained to help the management in decision making and control of the diverse activities of the organization.
The Nigeria police force is responsible for security of live and property and as a result keeps record of vital information given to them by any informant so as to enable them arrest activities or scenes unpleasant to people residing in a particular district.
Therefore, for effective administration and management, the provision of computer based information security for every source station is certainly inevitable, since it will take care of all the problems and inadequacies of the manual system.

1.2 STATEMENT OF THE PROBLEM
Inspite of the level of computation of various organizations, this particular organization on discussion is still at the grass root level. It requires a certain degree of protection especially of vital equipments, properties and information and this cannot be realized through the current system of operation, which is the manual system.

1.3 PURPOSE OF THE STUDY
The purpose of this study is to provide a computer based, on line and interactive package that will accurately and efficiently record all data and information about staff, informers, witnesses and accused persons.
It will also eradicate the numerous problems associated with the manual technique of securing information in order to facilitate the transfer and retrieval of information between the various departments of the organization,

1.4 AIMS AND OBJECTIVES
Having studied the activities of the police station some benefits could be derived from the computerization of information system and this includes:
1. Higher security efficiency of information
2. Quicker access to individual data
3. Faster treatment of information security oriented cases.
4. Provision of output information in a readily comprehensible form to those persons involved in the activities of the organization. Provision of communication channels. To compass formal and informal component.
To provide storage facilities for data not immediately required or that may be required to be used more than once.

1.5 THE SCOPE OF THE STUDY
The scope of this study is to eradicate the numerous problems associated with the manual technique of securing information in order to facilitate the retrieval of information.

1.6 LIMITATIONS
A lot of militating constraints were encountered during the course of this write up. They are:-
Inaccessibility to some documents, which arose due to security, imposed on some of the organization documents by the management. It was not also possible to make an in-dept study of these documents, which would have helped in the development of the project work..
Time was a major limitation to this write up, there wasn’t enough time to study the details of the various field of the information department of the organization unavailability of textbook needed for this write – up was not found in the institution library.

1.7 ASSUMPTIONS
For easy implementation of this study some assumption were made.
It is assumed that the software to be designed for the study will help police stations in the effective storage of vital information.
Finally, it is also assumed that by computerizing this organization, information security has been implemented to handle their day to day cases in a better and more organized manner.

1.8 DEFINITION OF TERMS
Q – Basic – The programming language used in designing the project program
Modules – This is the act of partitioning software’s logically into elements that performs specific functions and sub functions.
On-line processing – This is a method of processing that provides direct access to information files used by user’s and so enables updating.
Operations – The action carried out on an activity or process.
Crime record sheet – This contains pertinent information on staff and services as input to the computer system via the standard input deice keyboard
Data entry – This is the standard input device through which the system gets most of the instructions and commands.
Old file – This contains previous information on the staff and crime record and is updated each time on operation is carried out.
Display unit – An output device where systems display mosts outputs on request.
New file – This is an update of the old file and is stored on line in the system hard disk or a floppy diskette.
Storage unit – This is where files are stored and retrieved when needed, it could be the hard – disk, floppy disk, drums e..t.c.
Processing unit – This is where all data are processed and commands from the user carried out.
Password – This is being employed to restrict unauthorized access to information contained in the system; in others it is a security check technique
Witness – This is a person who has actually present at an event and should for these reason be able to describe it.
Accused – This is a person who has done wrong by breaking the law. Information or informers – This is a person who detects offenders and informs the authorities of their offences
Suspect – This is when one have a feeling that someone is guilty.
Search warrant – This is an official authority given to policemen when it is necessary to enter and search a building for any stolen property.
Exhibit – This is a document produced in a law court and referred to in evidence.
Conviction – This is the act of convicting a person for crime.

 

Save/Share This On Social Media:
MORE DESCRIPTION:

Computerized Security Information System:

A Computerized Security Information System is a specialized software or hardware system designed to manage and enhance security measures within an organization or for a specific application. A Computerized Security Information System is a specialized software or hardware system designed to manage and enhance security measures within an organization or for a specific application. CSIS is used to collect, store, analyze, and disseminate security-related information to support decision-making and protect assets, people, and information from various threats.

Key components and functionalities of a Computerized Security Information System typically include:

Data Collection: Computerized Security Information System gathers data from various sources, such as surveillance cameras, access control systems, intrusion detection systems, biometric scanners, and more. This data may include video footage, access logs, alarm triggers, and sensor readings.

Data Storage: The system stores collected data in a secure and organized manner. It often uses databases or cloud-based storage solutions to ensure data integrity and accessibility.

Data Analysis: Computerized Security Information System processes and analyzes the collected data to identify patterns, anomalies, and potential security threats. This analysis may involve machine learning algorithms to recognize unusual behaviors or trends.

Alerts and Notifications: When the system detects security breaches or suspicious activities, it generates alerts and notifications. Security personnel or administrators are then alerted to take appropriate actions.

Access Control: Computerized Security Information System often includes access control features to manage who can access the system and its data. Role-based access control (RBAC) is commonly used to restrict access to authorized personnel only.

Incident Management: It assists in incident management by providing tools to document and track security incidents, investigations, and responses. This helps organizations maintain a record of security events for auditing and compliance purposes.

Reporting and Dashboards: Computerized Security Information System typically offers reporting and dashboard features that allow users to generate reports and visualize security data. This helps in monitoring security status and making informed decisions.

Integration: Computerized Security Information System can integrate with other security systems and tools, such as fire alarms, identity management systems, and physical security devices. Integration enables a holistic approach to security management.

Compliance and Auditing: Many Computerized Security Information System solutions offer features to support compliance with regulatory standards and industry best practices. They assist in preparing for security audits and maintaining compliance records.

User Training and Support: Computerized Security Information System may include training materials and support resources to ensure that security personnel can effectively use the system.

Scalability: The system should be scalable to accommodate the changing security needs of an organization as it grows or faces evolving threats.

Data Privacy and Security: Computerized Security Information System must adhere to strict data privacy and security standards to protect sensitive information. Encryption, user authentication, and secure access controls are essential components.

Backup and Disaster Recovery: Regular data backup and disaster recovery mechanisms are crucial to ensure that security information is not lost in case of system failures or cyberattacks.

Computerized Security Information System is commonly used in various industries, including government, healthcare, finance, critical infrastructure, and corporate security. It helps organizations proactively manage security risks, respond to incidents, and improve overall security posture by providing real-time information and analysis. is used to collect, store, analyze, and disseminate security-related information to support decision-making and protect assets, people, and information from various threats.

Key components and functionalities of a Computerized Security Information System typically include:

  1. Data Collection: Computerized Security Information System gathers data from various sources, such as surveillance cameras, access control systems, intrusion detection systems, biometric scanners, and more. This data may include video footage, access logs, alarm triggers, and sensor readings.
  2. Data Storage: The system stores collected data in a secure and organized manner. It often uses databases or cloud-based storage solutions to ensure data integrity and accessibility.
  3. Data Analysis: Computerized Security Information System processes and analyzes the collected data to identify patterns, anomalies, and potential security threats. This analysis may involve machine learning algorithms to recognize unusual behaviors or trends.
  4. Alerts and Notifications: When the system detects security breaches or suspicious activities, it generates alerts and notifications. Security personnel or administrators are then alerted to take appropriate actions.
  5. Access Control: Computerized Security Information System often includes access control features to manage who can access the system and its data. Role-based access control (RBAC) is commonly used to restrict access to authorized personnel only.
  6. Incident Management: It assists in incident management by providing tools to document and track security incidents, investigations, and responses. This helps organizations maintain a record of security events for auditing and compliance purposes.
  7. Reporting and Dashboards: Computerized Security Information System typically offers reporting and dashboard features that allow users to generate reports and visualize security data. This helps in monitoring security status and making informed decisions.
  8. Integration: Computerized Security Information System can integrate with other security systems and tools, such as fire alarms, identity management systems, and physical security devices. Integration enables a holistic approach to security management.
  9. Compliance and Auditing: Many Computerized Security Information System solutions offer features to support compliance with regulatory standards and industry best practices. They assist in preparing for security audits and maintaining compliance records.
  10. User Training and Support: Computerized Security Information System may include training materials and support resources to ensure that security personnel can effectively use the system.
  11. Scalability: The system should be scalable to accommodate the changing security needs of an organization as it grows or faces evolving threats.
  12. Data Privacy and Security: Computerized Security Information System must adhere to strict data privacy and security standards to protect sensitive information. Encryption, user authentication, and secure access controls are essential components.
  13. Backup and Disaster Recovery: Regular data backup and disaster recovery mechanisms are crucial to ensure that security information is not lost in case of system failures or cyberattacks.

Computerized Security Information System is commonly used in various industries, including government, healthcare, finance, critical infrastructure, and corporate security. It helps organizations proactively manage security risks, respond to incidents, and improve overall security posture by providing real-time information and analysis.