DESIGN AND IMPLEMENTATION OF A COMPUTER-BASED SECURITY INFORMATION SYSTEMDESIGN AND IMPLEMENTATION OF A COMPUTER-BASED SECURITY INFORMATION SYSTEMDESIGN AND IMPLEMENTATION OF A COMPUTER-BASED SECURITY INFORMATION SYSTEM

0
997

DESIGN AND IMPLEMENTATION OF A COMPUTER-BASED SECURITY INFORMATION SYSTEM

 

ABSTRACT

Information is an important aspect of life. Vital information is the life wire or backbone of any organization. From sports statistics to the latest stock market price such facts keep people abreast of time.

          Computing, printing, photography and some recording are all forms of automatic information processing.

In all of these processed , the information as perceived by man, is captured, processed, transmitted and stored.

Finally it is reproduced in a form which can be easily understood by man.

          Next, there is a need to store the information so that it can be referenced when necessary . computers are unrivalled in their capacity to store data. Therein lies the importance of application software which configure the computer to act as an intelligent typewriter or entrepreneur, so long as the correct command are given.

          A database is one of the most acceptable business software application today. It is a collection of related information that is organized for case of reference.

This means that one could maintain a database on paper, stored in file holders that were kept in file cabinets.

That was the case before the advent of computers. File had to be pulled out of cabinets, forms filled and paper shuffled.

          This project describe how all these could be done electronically. It shows how information could be stored, modified and recalled instantly and accurately.

Information on staff of the establishment of case study is maintained, reports are lodged in and more reports are generated from these.

ORGANISATION OF WORK

 

          The project is made up of two section namely the write up and the program section. The write up section is made up of seven chapter each chapter with its sub-headings. Chapter one dealt with the problems, purpose, objective, scope constrains assumptions and definitions of terms used in the project. Chapter two talks about the literature review on the topic of the project chapter three discussed the existing system its problems, input, output and processing procedures. Chapter four dealt with the new system, its design, and implementation. Chapter five talks about the program design. Chapter six dealt with the documentation and finally the last chapter which  is chapter seven talks about the conclusion and recommendation.

TABLE OF FIGURES

Input output process analysis

Organization chart

Design of the new system

Procedure chart

System flow chart

Program flow chart

TABLE OF CONTENTS

ABSTRACT

TABLE OF FIGURES

ORGANIZATION OF WORK

TABLE OF CONTENTS

CHAPTER ONE

INTRODUCTION

STATEMENT OF THE PROBLEM

PURPOSE OF THE STUDY

AIMS AND OBJECTIVE

PROJECT SCOPE

MAJOR DESIGN CONSTRAINTS AND LIMITATION

MOJOR SOFTWARE FUNCTIONS

ASSUMPTIONS

DEFINITION OF TERMS

CHAPTER TWO

LITERATURE REVIEW

CHAPTER THREE

DESCRIPTION AND ANALYSIS OF THE EXISTING

FACT FINDING USED

ORGNIAZATIONAL STRUCTURE

OBJECTIVE OF THE EXISTING SYSTEM

INPUT, PROCESS, OUTPUT ANALYSIS

INFORMATION FLOW CHART DIAGRAM

PROBLEMS FOR THE EXISTING SYSTEM

JUSTIFICAITON FOR A NEW SYSTEM

CHAPTER FOUR

DESIGN OF THE NEW SYSTEM

INPUT SPECIFICATION AND DESIGN

OUTPUT SPEICIFATION AND DESIGN

FILE DESIGN

PROCEDURE CHART

SYSTEM FLOW CHART

SYSTEM REQUIREMENT

CHAPTER FIVE

IMPLEMENTATION

PROGRAM DESIGN

PROGRAM FLOW CHART

PSEUDOCODE

SOURCE PROGRAM

TEST RUN

CHAPTER SIX

DOCUMENTATION

CHAPTER SEVEN

RECOMMENDATION AND CONCLUSION

REFERENCES

CHAPTER ONE

1.0       INTRODUCTION

The security is the design and implementation of a computer-based security information system act of protecting companies asset, personal image, personnel and collection lives groups of properties. The main function of this department is to secure the labs and the properties that belongs to this institution. They also settle some problems in between the student and the staff. Eg streting of life and other things. The security department, I.M.T Enugu (S D I E) started in this institution in 1977. in security department, there was a thing they called “ABEEAT ”. BEEAT is an area given to the security man to look after it, during the working hour, to see if there will be any problem around. They also have a communication system, such as telephone, working talking, radio message etc.

This project ray emphasis on the security department (SOLT) of I.M.T. the security is one of the department under the function called health safety and environment East (HSEE). The main function of this department is to project assets in terms of lives and project.

1.1    STATEMENT OF THE PROBLEMS

Security of data or information in many establishment is becoming a sources of concern to the management of the establishment due to problems normally encountered in each department of an organization, security its human, individual data, information and resources and its complexity and duplications some organizations prCefer having a security department where all the information’s about human and material resources are put into a data bank which allows for easier access and retrieval of information. However, due to large number of processes that goes on in the manual operation and loss of information associated with it, it therefore becomes necessary to automate the activities of the security department.

DOWNLOAD COMPLETE PROJECT MATERIAL

DESIGN AND IMPLEMENTATION OF A COMPUTER-BASED SECURITY INFORMATION SYSTEM

 

Leave a Reply