Академический Документы
Профессиональный Документы
Культура Документы
INTRODUCTION
National security is the requirement to maintain the survival of the state through the use of
economic, security operatives especially police, political power and the exercise of
diplomacy. The concept developed mostly in the United States of America after World War
II focusing on the police and military might. Now, it encompasses a broad range of facets,
all of which impinge on the police and military for economic security of the nation, lives
property and values protected by national society. (Cynthia, 2008). Accordingly, in order
to possess national security, a nation needs to possess economic security, energy security,
environmental security, etc. Security threats involve not only conventional foes such as
other national states but also non state actors such as violent, narcotic cartels, multinational
disasters and events causing severe environmental change in this category. (Paleri, 2008).
stable nation state can be traced to the peace of Westphalia, wherein the concept of a
sovereign state, ruled by a sovereign, became the basis of a new international order of
phenomenon which was first introduced in the United States after World War II, and has
to some degree replaced other concepts that describe the struggle of states to overcome
various external and internal threats. The earliest mention of the term national security,
however, was made in Yale University in 1790 wherein was made to its relation with
in the United States when the National Security Act of 1947 was signed on July 26, 1947
by the U.S. President Harry S. Truman. Together with its 1949 amendment, this act created
American national security the important facets for American national security as the
precursor to the department of defense, subordinated the security operatives branches to the
new cabinet level position of the secretary of defense, established the National Security
council and the Central Intelligence Agency. The act did not define national security which
whenever issues threatened by other interests of the state, such as domestic concerns, came
up for discussion and decision making. The realization that national security encompasses
more than just security was present though understated, from the beginning itself. (Cynthia,
2008)
The US National Security Act of 1947 was set up to advise the president on the integration
of domestic security and foreign policies related to national security. Gen Maxwell
Taylors essay of 1947 titled The Legitimate claims of National Security has this to say;
The national valuables in this broad sense include current assets and national interests, as
well as the sources of strength upon which our future as a nation depends. Some valuables
are tangible and earthly; others are spiritual or intellectual. They range widely from political
assets such as the Bill of Rights, National Security and political institutions and
international relations to many economic assets which radiate worldwide from a highly
productive domestic economy supported by rich natural resources. It is the urgent need to
protect valuables such as these which legitimizes and makes essential the role of national
Security information system has always played a vital role in the stability of a nation.
Keeping security information manually can hinder some defense program and delay
information can lead to exposure of the information thereby creating threat to the nation at
large. Hence, there is need for an automated security information system to guaranty safety
of information.
The motivation of this work is to eliminate the manual process of processing security
information in the Nigeria Police through the use of a network based security information
system.
The aim of this research work is to develop a network base security information system
that holds a database for security information storage and retrieval. Specifically, the
The purpose of this study is to build a network base system that will add more security
measures to eradicate all forms of loss and manipulations of security information and automate
This project work is focused on designing of a network base security information system
that automates the processing of security information in the Nigerian Police that are
With the increasing rate of insecurity in the nation, the Nigerian Police management
deserve to inculcate a tight security means to ensure that these activities of processing
security information are fully automated and secured in other to avoid loss and
have seen the security sector suffer some serious forms of corruption due to the manual
i. Finance: This is a limiting factor to the project work. Because of the time required
to complete, I could not have the financial ability to conduct detailed research work
on the project.
ii. Materials that would have been available on desired areas have been denied access
This work is organized into four chapters; Chapter One: Introduction - Background of the
study. Chapter Two: Literatures review. Chapter Three: System design and analysis of both
the existing and proposed system. Chapter Four: It contains the design, implementation,
testing and results. Chapter Five: This chapter handle summary, conclusion,
Anti-policing: Anti-policing is the societys social attitude opposed to war between states
National Security: The requirement to maintain the survival of the nation-state through
the use of economic, policing, and political power and the exercise of diplomacy.
recording, or destruction.
LITERATURE REVIEW
System is the degree of protection against danger, damage, loss and crime. Security as a
condition. The Institution for Security and Open Methodologies (ISECOM) in the
created between the assets and the threat. This includes but is not limited to the elimination
of either the asset or the threat. Security as a national condition was defined in a United
Nations study (1986) so that countries can develop and progress safely. Security has to
compare to related concepts: safety, continuity, and reliability, the key difference between
security and reliability is that security must take into account the actions of people
attempting to cause destruction. Different scenarios also give rise to the context in
which security is maintained. With respect to classified matter, the condition that prevents
unauthorized persons from having access to official information that is safeguarding in the
interest of the national security. (Paleri, 2008). Measures taken by a police unit, an activity
or installation to protect itself against all acts designed to, or which may, impair its
security. For example, the fear of earthquakes has been reported to be more common than
the fear of slipping on the bathroom floor although the latter kills more people than the
from the actual security provided by those measures. The presence of security protection
may even be taken for security itself. For example, two computer security programs could
be interfering with each other and even cancelling each others effect while the owner
raising subjective security in a population without a genuine commensurate concern for the
effects of that measure on and possibly decreasing objective security. Perception of security
can also increase objective security when it affects or deters malicious behavior, such with
the vital signs of security protections, such as video surveillance, alarm systems in a home,
or an anti-theft system in a car such as Lojack, signs. For example, approach a car, break
the window, and flee in response to an alarm being triggered. Either way, perhaps the car
itself or the objects inside arent stolen, but with perceived security even windows of the
car has a lower chance of being damaged, increasing the financial security of the owner(s).
(Romm, 1998). However, the non-profit, security research group, ISECOM, has
determined that such signs may actually increase the violence, daring, and desperation of
the intruder. This claim shows that perceived security works mostly on the provider and
not the security at all. It is important, however, for signs advertising security not to give
clues as to how to subvert that security, for example in the case whereby a home burglar
might be more likely to break into a certain home if he or she is able to learn beforehand
which company makes the security system. Private security and public provide some of the
same services and sometimes they even mirror each other, but there are distinct differences
among the similarities. The scopes of their duties are different and each has advantages and
Allen Pinkerton (1855) established the first private police organization (Northwest Police
Organization), by the end of the century, other organizations like Burns and Wackenhut
were also established. Contact security guards were used heavily by industrial companies
in the early part of the 20th century and were used as strikebreakers. In (1930), The Ford
Motor Company had a private force of 3,500 called The Ford Service. Private security is
contracted services to companies, people or organizations for the protection of personnel
and property. Private Security includes guard services, private investigators, bodyguards
any detail (in house) detectives as also mobile patrols. All of these positions have the power
of police on any property that is private or have an open contract. The reason behind this is
because public police have no power or jurisdiction of any kind on private property. Police
cant even go onto private property at all unless they have been invited on to that property
by the owner and has the owners ok to be there. In almost all cases security need
some training and licensing, but fewer restraints than public police on
the licensing and training. Americas law enforcement root can be traced back to English
police models that were colonial times up until (1800s). in 1800 America experienced
changes in law enforcement making not just a local responsibility, but also a country, state
and federal responsibility. This brought about forming the police department and
jurisdictions, with New York being the first city to establish police force in 1844. Other
social changes again forced changes in law enforcement (1960s), civil right and the 1980s
drug trafficking. Public police are part of the government entity-local, country state or
federal. All public police are based on a paramilitary model and have strict requirement,
training and certification. Public police are controlled by politics and government
establishments, and restrained by laws and rules, but their role is the safety and welfare of
the public. Private security and public police have their advantages and disadvantages.
Private security companies have less restrictions placed upon them, thus they can focus and
effectively carry out their contracted duties. Private security also gets paid by performance
and can negotiate salary. Also private security has more technical equipment available to
them depending on the employer. The main disadvantage of private security personnel is
lack of training or updated training and job retention, since they are salary employees they
have less negotiation power than security and they do not get extra compensation for
exceptional performance like security does. Police are also hampered by restrictions, legal
and political; they are understaffed and outnumbered by security 10-1 and not accessible to
newer technology due to budget restraints and hiring limits. Police does not have advantage
in training/advanced training and in job retention. Security on the other hand does not work
off a budget and can buy whatever they want, update their technology any time they
wish. Security can also pull its training from any source from government to private
an approach variously known as holistic security, all hazards management and other terms.
digital video surveillance technologies and the digitization and networking of physical
2005 creation of the Alliance for Enterprise Security Risk Management, a joint venture
Information Systems Security Association), and IT audit (ISACA, the Information Systems
Standardization (ISO) released ISO 28000-Security Management Systems for the supply
chain. Although the title supply chain is included, this standard specifies the requirements
for a security management system, including those aspects critical to security assurance for
any organization or enterprise wishing to management the security of the organization and
its activities. ISO 28000 is the foremost risk based system and is suitable for managing both
public and private regulatory security, customs and industry based security schemes and
The terms information security, computer security and information assurance are
frequently incorrectly used interchangeably. These fields are interrelated often and share
information; however, there are some subtle differences between them. These differences
lie primarily in the approach to the subject, the methodologies used, and the areas of
availability and correct operation of a computer system without concern for the
financial institutions, hospitals, and private businesses amass a great deal of confidential
information about their employees, customers, products, research and financial status. Most
of this information is now collected, processed and stored on electronic computers and
some basic terminology and a commonly used process for risk management.
The CISA Review manual (2006) provides the following definition of risk management.
deciding what countermeasures, if any, to take in reducing risk to an acceptable level, based
on the value of the information resources to the organization. There are two things in this
definition that may need some clarification. First, the process of risk management is an
constantly changing and new threats and vulnerability emerge every day. Second, the
choice of countermeasure (computer) (controls) used to manage risks must strike a balance
between productivity, cost, effectiveness of the countermeasure, and the value of the
Risk is the likelihood that something bad will happen that causes harm to an informational
asset (or the loss of the asset). Vulnerability is a weakness that could be used to endanger
that has the potential to cause harm. The likelihood that a threat will use a vulnerability to
inflict harm, it has an impact. In the context of information security, the impact is a loss of
availability, integrity, and confidentiality, and possibly other losses (lost income, loss of
life, loss of real property). It should be pointed out that it is not possible to identify all risks,
nor is it possible to eliminate all risk. The remaining risk is called residual risk. A risk
assessment is carried out by a team of people who have knowledge of specific areas of the
business. Membership of the team may vary over time as different parts of the business are
assessed (Ping , 2010). The assessment may use some qualitative analysis based on
informed opinion, or where reliable dollar figure and historical information is available, the
analysis may use quantitative analysis. When management chooses to mitigate a risk, they
will do so by implementing one or more of three different types of controls. Administrative
controls (also called procedural controls) consist of approved written policies, procedures,
standards and guidelines. Administrative controls form the framework for running the
business and managing people. They inform people on how the business is to be run and
how day to day operations are to be conducted. Laws and regulations created by
government bodies are also a type of administrative control because they inform the
business. Some industry sectors have policies, procedure, standard and guidelines that must
be followed the payment card industry (PCI) Data Security Standard required by Visa and
Master Card is such an example. Other examples of administrative controls include the
corporate security policy, password policy, hiring policies, and disciplinary policies.
Administrative controls form the basis for the selection and implementation of logical and
physical controls. Logical and physical controls are manifestation of administrative control.
Administrative controls are used for paramount importance. Logical controls are (also
called technical controls) use software and data to monitor and control access to
information and computing systems. For example, password, network and host based
firewalls; network intrusion detection systems, access control lists, and data encryption are
Information security uses cryptography to transform usable information into a form that
renders it unusable by anyone other than an authorized user; this process is called
encryption. Information that has been encrypted (rendered unusable) can be transformed
back into its original usable form by an authorized user, who possesses the cryptography
repudiation, and encrypted network communications. Older less secure applications such
as telnet and ftp are slowly being replaced with more applications such as that use encrypted
as WPA/WPA2 or the older (and less secure) WEP. Wired communications (such as ITU-
T G.hn) are secured using AES for encryption and X.1035 for authentication and key
exchange. Software applications such as GnuPG or PGP can be used to encrypt data files
cryptography. The length and strength of the encryption key is also an important
consideration. A key that is weak or too short will produce weak encryption. The keys used
for encryption and decryption must be protected with the same degree of rigor as any other
destruction and they must be available when needed. PKI solutions address many of the
System and network technology is a key technology for a wide variety of applications.
requirement in emerging networks, there is a significant lack of security methods that can
process that is based on the Open Systems Interface (OSI) model. The OSI model has
and standardization of protocols. The protocols of different layers can be easily combined
layers can be changed later without making other adjustments, allowing flexibility in
Secure network design does not contain the same advantages as network design. (Bhavya,
2012).
When considering network security, it must be emphasized that the whole network is
secure. Network security does not only concern the security in the computers at each end
of the communication chain. When transmitting data the communication channel should
not be vulnerable to attack. A possible hacker could target the communication channel,
obtain the data, decrypt it, and reinsert a false message. Securing the network is just as
important as securing the computers and encrypting the message. When developing a
secure network, the following need to be considered (Dowd & McHenry, 2002):
i. Access: Authorized users are provided the means to communicate to and from a
particular network
iii. Authentication: Ensure the users of the network are who they say they are
iv. Integrity: Ensure the message has not been modified in transit
v. Nonrepudiation: Ensure the user does not refute that he used the network
An effective network security plan is developed with the understanding of security issues,
potential attackers, needed level of security, and factors that make a network vulnerable to
attack (Dowd & McHenry, 2002). The steps involved in understanding the composition of
lessen the vulnerability of the computer to the network there are many products available.
management and firewalls. Businesses throughout the world are using a combination of
some of these tools. Intranets are both connected to the internet and reasonably protected
from it. The internet architecture itself leads to vulnerabilities in the network.
Understanding the security issues of the internet greatly assists in developing new security
technologies and approaches for networks with internet access and internet security itself.
The types of attacks through the internet need to also be studied to be able to detect and
guard against them. Intrusion detection systems are established based on the types of
attacks most commonly used. Network intrusions consist of packets that are introduced to
The last reason for a network intrusion is most commonly guarded against and considered
by most as the only intrusion motive. The other reasons mentioned need to be thwarted as
well. Typical security currently exists on the computers connected to the network. Security
protocols sometimes usually appear as part of a single layer of the OSI network reference
model. Current work is being performed in using a layered approach to secure network
design. The layers of the security model correspond to the OSI model layers. This security
approach leads to an effective and efficient design which circumvents some of the common
Recent interest in security was fueled by the crime committed by Kevin Mitnick. Kevin
Mitnick committed the largest computerrelated crime in U.S. history (Dowd & McHenry,
2002). The losses were eighty million dollars in U.S. intellectual property and source code
from a variety of companies (Dowd & McHenry, 2002). Since then, information security
came into the spotlight. Public networks are being relied upon to deliver financial and
personal information. Due to the evolution of information that is made available through
the internet, information security is also required to evolve. Due to Kevin Mitnicks
offense, companies are emphasizing security for the intellectual property. Internet has been
a driving force for data security improvement. Internet protocols in the past were not
protocols are not implemented. This leaves the internet open to attacks. Modern
Data security is the aspect of security that allows a clients data to be transformed into
unintelligible data for transmission. Even if this unintelligible data is intercepted, a key is
needed to decode the message. This method of security is effective to a certain degree.
Strong cryptography in the past can be easily broken today. Cryptographic methods have
will allow for the cipher text to be protected, so that it is less likely for many people to even
attempt to break the code. A secure network will also prevent someone from inserting
unauthorized messages into the network. Therefore, hard ciphers are needed as well as
Figure 2.1: Based on the OSI model, data security and network security have a different
The relationship of network security and data security to the OSI model is shown in Figure
2.1. It can be seen that the cryptography occurs at the application layer; therefore the
application writers are aware of its existence. The user can possibly choose different
methods of data security. Network security is mostly contained within the physical layer.
Layers above the physical layer are also used to accomplish the network security required
mechanisms to create intranets that are connected to the internet but protected from it at
Intranet is a private computer network that uses internet protocols. Intranets differ from
"Extranets" in that the former are generally restricted to employees of the organization
parties. There does not necessarily have to be any access from the organization's internal
network to the Internet itself. When such access is provided it is usually through a gateway
with a firewall, along with user authentication, encryption of messages, and often makes
use of virtual private networks (VPNs). Although intranets can be set up quickly to share
data in a controlled environment, that data is still at risk unless there is tight security. The
disadvantage of a closed intranet is that vital data might not get into the hands of those who
need it. Intranets have a place within agencies. But for broader data sharing, it might be
better to keep the networks open, with these safeguards (Marin, 2005):
are often used. Intranets that exist across multiple locations generally run over separate
leased lines or a newer approach of VPN can be utilized. VPN is a private network that
uses a public network (usually the Internet) to connect remote sites or users together.
Instead of using a dedicated, realworld connection such as leased line, a VPN uses "virtual"
connections routed through the Internet from the company's private network to the remote
Figure 2.2: A typical VPN might have a main LAN at the corporate headquarters of a
company, other LANs at remote offices or facilities and individual users connecting from
The network security field is continuing down the same route. The same methodologies are
being used with the addition of biometric identification. Biometrics provides a better
method of authentication than passwords. This might greatly reduce the unauthorized
access of secure systems. New technology such as the smart card is surfacing in research
on network security. The software aspect of network security is very dynamic. Constantly
new firewalls and encryption schemes are being implemented. The research being
Hardware developments are not developing rapidly. Biometric systems and smart cards are
the only new hardware technologies that are widely impacting security. The most obvious
use of biometrics for network security is for secure workstation logons for a workstation
connected to a network. Each workstation requires some software support for biometric
identification of the user as well as, depending on the biometric being used, some hardware
device. The cost of hardware devices is one thing that may lead to the widespread use of
a low budget. Hardware device such as computer mice with built in thumbprint readers
would be the next step up. These devices would be more expensive to implement on several
computers, as each machine would require its own hardware device. The main use of
Biometric network security will be to replace the current password system. Maintaining
password security can be a major task for even a small organization. Passwords have to be
changed every few months and people forget their password or lock themselves out of the
system by incorrectly entering their password repeatedly. Very often people write their
password down and keep it near their computer. This is of course completely undermines
any effort at network security. Biometrics can replace this security identification method.
The use of biometric identification stops this problem and while it may be expensive to set
up at first, these devices save on administration and user assistance costs (Majid & Christian
, 2013)
The software aspect of network security is very vast. It includes firewalls, antivirus, vpn,
intrusion detection, and much more. The research development of all security software is
not feasible to study at this point. The goal is to obtain a view of where the security software
is heading based on emphasis being placed now. The improvement of the standard security
software still remains the same. When new viruses emerge, the antivirus is updated to be
able to guard against those threats. This process is the same for firewalls and intrusion
detection systems. Many research papers that have been skimmed were based on analyzing
attack patterns in order to create smarter security software. As the security hardware
transitions to biometrics, the software also needs to be able to use the information
networks. The objective of the research is to use neural networks for the facial recognition
software. Many small and complex devices can be connected to the internet. Most of the
current security algorithms are computational intensive and require substantial processing
power. This power, however, is not available in small devices like sensors. Therefore, there
is a need for designing lightweight security algorithms (Majid & Christian , 2013).
CHAPTER THREE
3.1 INTRODUCTION
Methodology is the systematic, theoretical analysis of the methods applied to address the
process that could lead to the solution of the problem being solved. In this project, it
comprises the theoretical analysis and principles that addressed the problem. Typically, it
offers the theoretical underpinning for understanding which method, set of methods, or so
called best practices can be applied to specific case, for example, to calculate a specific
result. In this work we look at the framework which underpinned our set objectives.
The existing system is manually carried out. Information on military signals is stored in an
office file. Their personal data are being collected and each person has a file created for
him or her. Search on these files takes time. One has to go through the whole files in search
of a particular record. This is cumbersome, hence the need for the computerization of the
system.
Different methods adopted in the collection and gathering Data and Information for the
Interview Method
This was done between the researcher and the Nigerian police authorities. Reliable
facts were gotten based on the questions posed to them by the researcher.
Reference To Written Text
concerning the system in question was obtained. Some forms that are necessary and
available were assessed. Also internet downloads was made to obtain some text
materials.
The input to the system is the security information form. This form is used for recording
The information gathered was processed into a more meaningful format for entry into the
system. These personnel data are processed to find out their areas of specialization and
The output from the system is generated from the system inputs. More of the output
The proposed system is a network based system that eliminates the manual process of
processing security information in the Nigeria Police through the use of a network based
security information system. The new system will help to solve all the problems inherent
in the existing system. The justification for the new system includes:
System design refers to those task that focus on detailed computer based solution. It has to
do with designing a new system or one to replace / complement the existing one. Systems
implementation of the system that is how technology will be used in the system.
Flowchart symbols are graphic tools in which symbols and shapes are used to document
the flow of control within a program or system. This also involves use in the logical
The network base security information system has a database that comprise of two tables
which include the; Police Information and Signal Information. The attributes of each of the
tables include Field Name, Datatype, Length and Description. The number of fields in each
table varies depending on the information to be stored. Below are the various tables
Table 3.1: Police Information
ID VarChar 20 Personnel
Identification
Number
Date Date / Time 10 Date
An Entity-Relationship (E-R) diagram shows the relationship between the various entities
in the system, their attributes and their relationship with other entities. The diagram below
is the E-R diagram for the proposed network base security information system.
FIELD NAME
ID
FIELD NAME
ID Date
Dob
Sex
Age
Status
Height
Date
Recruited
Qualification
Department
Rank
Next of Kin
Remark
4.1 INTRODUCTION
This chapter discusses the stages involved in the implementation of the new system, system
further discusses the procedures for the installation of the new system and some system test
plans.
Computer is designed in such a way that sometimes it is call GIGO denoting that what
goes in is what comes out. The input forms are designs generally based on the necessary
data that needs to be entered into the system. The data are captured through the keyboard
The new system is composed mainly of two input forms, they include:
The output design was based on the inputs. The report generated gives a meaningful report
and delivery of that system into production. It is the process of moving an idea from concept
to reality. System implementation has several major activities. Five major tasks will be
and training. The purpose of this phase is to convert the physical system specifications into
working and reliable software and hardware, document the work that have been done and
4.3.1 Coding
This is the process whereby the physical specifications created in the previous phases are
turned into working computer codes by the Programming Team. It is an activity where all
the design done in the previous phases are coded using PHP as the programming language.
4.3.2 Testing
In this stage, each program module of network base security information system will be
tested in order to make sure that it functions correctly. Later, the programs are then tested
in groups, and then the testing of the entire system is performed. The first step in testing is
to compile the program to detect any syntax errors. The testing performed are unit testing,
4.3.3 Installation
Installation is the process of moving from the current system to the new or enhanced
system. This is also refer to conversion activity; converting an old system to a new system.
At this stage, all users must give up their reliance on the current system and begin to rely
on a new system. There are four approaches of installation; direct, parallel, single-location
and phased installation. Which approaches will be used is depends on the organizations and
4.3.4 Documentation
4.3.5 Training
Although the documentation is prepared to assist the Users throughout the systems life
cycle, it is important to train users on how to use the new system. The documentation
prepared is used in training the users. Converting from old to new system necessitates that
the system users be trained and provided with documentation that will guide them through
System requirements are the components needed for the new system to be used efficiently.
These are the physical computer resources that are needed for the new system to work
v. CD/DVD-ROM Drive
The following software requirements are necessary for the deployment of the web
system. The programming language used in the development of network base security
information system is PHP and MySQL is used for the database. PHP is a powerful tool for
making dynamic and interactive web pages. It is widely used, free and efficient alternative
to competitors such as Microsofts Active Server Page (ASP). The followings are some of
ii. It is compatible with almost all web server used today (Apache, IIS, etc.)
iii. PHP is FREE to download from the official PHP resource: www.php.net
MySQL is the world's most popular open source database software. With its superior speed,
reliability, and ease of use, MySQL has become the preferred choice for Web, Web 2.0,
Soft as a Service (SaaS), Independent Software Vendors (ISVs), Telecom companies and
applications.
4.6 MAINTENANCE
(IEEE) Standard for Software Maintenance, IEEE 1219 [IEEE 1219], as the modification
opinion that software maintenance sustains the software product throughout its life cycle.
effective support to a software system. Activities are performed during the pre-delivery
stage as well as the post-delivery stage. The Maintenance Phase occurs once the system is
period of time, or implementation of new requirements after the software is deployed at the
customer location. The maintenance phase also includes handling the residual errors that
may exist in the software even after the testing phase. This phase also monitors system
of-mind protection by keeping you covered for bugs and software problems.
Maintenance programs allow your software to stay in warranty so you do not have
usually once per year. These upgrades often address issues reported by other
the overall cost of upgrades over time, this component of software maintenance is
are the two of the fastest changing aspects of our world. It is increasingly important
to make sure that your business is always taking advantage of the best that your
software has to offer and that your software matches the business requirements of
the time. Regular updates and maintenance will allow you to keep up with market
trends and ensure your business is as efficient and effective as it can be.
iv. Predictive Cash Flow: The last benefit, but one of the most significant from a
financial perspective, is the ability to gain control over your software expenditure.
If you are covered for software bugs and receive regular upgrades, your overall IT
expenditures will be reduced to a single monthly (or yearly) fee your maintenance
fee. This eliminates the guessing game of IT expenditure and eliminates large
The products working form is tested for defects. Testing is mostly the final part in the
development process. The last minutes adjustments are made in the application before
giving the software to the End-user for deployment. The person responsible for testing the
Program Dry Run is the term that refers to program testing without the use of a computer
system. The program testing is performed on paper. On the other hand, Program Execution
is running of the program using a computer system so as to detect errors that are likely to
exist.
Debugging is the art of detecting, diagnosing and eliminating run-time errors in a program.
"Bugs" come in a variety of forms, including: coding errors, design errors, complex
interactions, poor user interface designs, and system failures. Bugs are found throughout
the software life cycle. The Programmer may find an issue, a Software Tester might identify
involves using the appropriate techniques to get necessary information from the different
5.1 SUMMARY
Information in its most restricted technical sense is an ordered sequence of symbols that
Information is any kind of event that affects the state of a dynamic system. As a concept,
entropy. The measures adopted to maintain national security in the face of threats to society
has led to ongoing dialectic, particularly in the liberal democracies, on the appropriate scale
Tension exists between the preservation of the state (by maintaining self-determination and
sovereignty) and the rights and freedoms of individuals. Although national security
measures are imposed to protect society as a whole, many such measures will restrict the
rights and freedoms of all individuals in society. The concern is that where the exercise of
national security laws and powers I not subject to good governance, the rule of law, and
strict checks and balances, there is a risk that national security may simply serve as a
For much of police history the armed forces were considered to be for use by the heads of
their societies, until recently, the crowned heads of states. In a democracy of other political
The relationship between the police and the society it serves is a complicated and ever-
evolving one. Much depends on the nature of the society itself and whether it sees the police
5.3 RECOMMENDATION
That this system be implemented by Nigeria police to enable them go into computerized
information system. Also schools should expose students to some more relevant
programming languages like visual basic so as to enable them carry out their projects on
their own.
Libraries should be well equipped to simplify the work for the students and especially
during the research phase. These relationships are seen from the perspective of political
police relations, the police industrial complex mentioned above, and the socio-police
relationship. Police often function as societies within societies, by having their own police
society. Although a police is not limited to nations in of itself as many private police
companies (or PPCs) can be used or hired by organizations and figures as security,
escort, to other means of protection where police, agencies, or militaries are absent or not
trusted.
REFERENCES
Bhavya, D. (2012). Network Security: History, Importance, and Future. University of Florida
Cynthia, A. (2008). U.S. National Security. A Reference Handbook. India: Pretience Hall, 223.
Dowd, P., & McHenry, J. (2002). Network security: it's time to take it seriously. Computer,
31(9), 24 28.
guide/chsgsov.html
Kayode, F. J. (2003). Governing The Security Sector in a Democratizing Polity. Niger: Zed
Books.
LII. (2013). legal information institute. Retrieved from U.S. Code collection
http://www.law.cornell.edu/uscode/44/3542.html
MAIER, C. S. (1990). Peace & Security For the 1990s. New York: Oxford Press. 132-134.
Majid , A., & Christian , B. (2013). Defense Mechanisms for Computer Based Information
Systems. International Journal of Network Security & Its Applications (IJNSA), 5(5),
107-113.
Marin, G. (2005). Network security basics. Security & Privacy, IEEE, 3(6), 6872.
Paleri, P. (2008). National Security. Imperatives and Challenges. New delhi: Tata McGraw-Hill,
321.
Ping , W. A. (2010). Information security knowledge and behavior: An adapted model of
Romm, J. J. (1998). Defining National Security: The Non-military Aspects. Pew Project on
Americas Task in a Changed World (Pew Project Series). Council On foreign relations.
Sattarova , F. Y., & Prof.Tao-hoon , K. (2007). IT Security Review: Privacy, Protection, Access
Taylor, G. M. (1994). The Legitimate Claims of National Security. Lacaste: Yehn Publishers.
http://www.howstuffworks.com/vpn.htm
APPENDIX
If UnloadMode<> 1 Then
Cancel = True
End If
End Sub
End
End Sub
End Sub
End Sub
End Sub
frmbehaviour.cmbid.Clear
With frmrecuitment.memberdata
.Refresh
.Recordset.MoveFirst
Do Until .Recordset.EOF
frmbehaviour.cmbid.AddItem .Recordset.Fields("id")
.Recordset.MoveNext
Loop
End With
frmbehaviour.ShowvbModal
End Sub
frmbehreport.cmbid.Clear
With frmrecuitment.memberdata
.Refresh
.Recordset.MoveFirst
Do Until .Recordset.EOF
frmbehreport.cmbid.AddItem .Recordset.Fields("id")
.Recordset.MoveNext
Loop
End With
frmbehreport.list1.Clear
frmbehreport.ShowvbModal
End Sub
frmquery.Optdept.Value = True
frmquery.cmbquery.Clear
frmquery.cmbquery.AddItem "Admin"
frmquery.cmbquery.AddItem "Engineering"
frmquery.cmbquery.AddItem "Legal"
frmquery.cmbquery.AddItem "Account"
frmquery.cmbquery.AddItem "Production"
frmquery.ShowvbModal
frmquery.Dataquery.Refresh
frmquery.DBGrid1.Refresh
End Sub
Private Sub mnuExit_Click()
End
End If
End Sub
End Sub
With frmreport.Datareport
.Refresh
frmreport.DBGrid1.Refresh
End With
frmreport.ShowvbModal
End Sub
frmquery.optrank.Value = True
frmquery.cmbquery.Clear
frmquery.cmbquery.AddItem "Conel"
frmquery.cmbquery.AddItem "Captain"
frmquery.cmbquery.AddItem "Major"
frmquery.cmbquery.AddItem "General"
frmquery.cmbquery.AddItem "Brigadier"
frmquery.ShowvbModal
frmquery.Dataquery.Refresh
frmquery.DBGrid1.Refresh
End Sub
With frmrecuitment
.Show vbModal
End With
End Sub
frmquery.Optid.Value = True
frmquery.cmbquery.Clear
With frmrecuitment.memberdata
.DatabaseName = App.Path& "\Reportsheet.mdb"
.Refresh
.Recordset.MoveFirst
Do Until .Recordset.EOF
frmquery.cmbquery.AddItem .Recordset.Fields("id")
.Recordset.MoveNext
Loop
End With
frmquery.ShowvbModal
frmquery.Dataquery.Refresh
frmquery.DBGrid1.Refresh
End Sub
searchfound = True
Unload Me
frmMainMenu.ShowvbModal
Else
searchfound = False
trial = trial + 1
End
End If
End If
txtPassword.Text = ""
txtPassword.SetFocus
End If
End Sub
End
End Sub
With datLogin
.Refresh
End With
txtName.Text = "USER"
cmdEnter.Enabled = False
End Sub
End Sub
With frmrecuitment
.Hide
End With
End Sub
With frmrecuitment.memberdata
.Refresh
.Recordset.MoveFirst
Do Until .Recordset.EOF
If frmrecuitment.txtid.Text = .Recordset.Fields("id") Then
GoTo 20
Exit Do
End If
.Recordset.MoveNext
Loop
End With
With memberdata
.Refresh
.Recordset.AddNew
.Recordset.Fields("id").Value = frmrecuitment.txtid.Text
.Recordset.Fields("name").Value = frmrecuitment.txtName.Text
.Recordset.Fields("address").Value = frmrecuitment.txtaddress.Text
.Recordset.Fields("sex").Value = frmrecuitment.Combsex.Text
.Recordset.Fields("age").Value = Val(frmrecuitment.txtage.Text)
.Recordset.Fields("status").Value = frmrecuitment.Combstatus.Text
End With
frmrecuitment.txtid.Text = ""
frmrecuitment.txtName.Text = ""
frmrecuitment.txtaddress.Text = ""
frmrecuitment.txtbirth.Text = ""
frmrecuitment.txtage.Text = ""
frmrecuitment.txtheight.Text = ""
frmrecuitment.txtdate.Text = ""
frmrecuitment.txtqaul.Text = ""
frmrecuitment.txtkin.Text = ""
20
End Sub
frmPassword.Show
frmPassword.txtPassword.SetFocus
'frmMainMenu.Show
Unload Me
End Sub
frmPassword.Show
frmPassword.txtPassword.SetFocus
'frmMainMenu.Show
Unload Me
End Sub
frmreport.PrintForm
End Sub
frmreport.Hide
End Sub
frmreport.Datareport.Recordset.Delete
End Sub
With datLogin
.Refresh
End With
txtName.Text = "USER"
cmdEnter.Enabled = False
End Sub