0% found this document useful (0 votes)
111 views25 pages

Chapter 1 - 3

This chapter provides an overview of the project which aims to design and implement an online security information system. It discusses the background of the study, motivation, purpose and methodology. The background explains how information systems play a vital role in organizations by storing important data and security is crucial. The motivation discusses how manual security documentation can expose information and hinder programs. The purpose is to create a software system to manage security information for an organization in an online and tracked manner. The methodology used will be interviews, observation, HTML, CSS, JavaScript for the front-end and PHP and MySQL for the back-end and database.

Uploaded by

Kicave Blog
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
111 views25 pages

Chapter 1 - 3

This chapter provides an overview of the project which aims to design and implement an online security information system. It discusses the background of the study, motivation, purpose and methodology. The background explains how information systems play a vital role in organizations by storing important data and security is crucial. The motivation discusses how manual security documentation can expose information and hinder programs. The purpose is to create a software system to manage security information for an organization in an online and tracked manner. The methodology used will be interviews, observation, HTML, CSS, JavaScript for the front-end and PHP and MySQL for the back-end and database.

Uploaded by

Kicave Blog
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 25

CHAPTER ONE

INTRODUCTION
1.0 Preamble
This chapter gives an overall review of the project, it show details of what the project is

all about and how it will be implemented. It works upon the principle of introducing the

topic of research and setting it into a broad context, gradually narrowing down to

a research problem. This chapter involves the introduction to this project expressly the

background of the study, motivation, scope of the problem, purpose of the study,

methodology and definition of terms.

1.1 Background of the Study


Information system occupies a vital and unique position in any organization by virtue of

the data and information, which it contains. Security of information is of great

importance to any given organization this makes the information reliable since

information stored can be referenced whenever necessary access by unauthorized

persons. This project analysis the activities and importance of securing information in

any organizations and to see that the information is accurately maintained to help the

management in decision making and control of the diverse activities of the organization.

Therefore, for effective administration and management, the provision of computer based

information security for every source station is certainly inevitable, since it will take care

of all the problems and inadequacies of the manual system.

1.2 Motivation
Security information system has always played a vital role in the stability of any

organization, institution and the nation at large. Keeping security information manually
can hinder some defense program and delay passage of security information to the

appropriate body. Manual documentation of security information can lead to exposure of

the information thereby creating threat to the nation at large. Hence, there is need for an

automated security information system to guaranty safety of information.

1.3 Purpose of the Study

The main purpose of this project is to design and implement an online computerized

security information tracking system for Kaduna polytechnic. Other objectives include:

i. To develop a software for managing security information for Kaduna

polytechnic security.

ii. To provide a unique tracking id for easy information tracking.

iii. To provide a system for higher security efficiency of information and

quicker access to individual data.

1.4 Methodology
Methodology is the systematic, theoretical analysis of the methods applied to a field of

study. It comprises the theoretical analysis of the body of methods and principles

associated with a branch of knowledge. The research methodology used in this research

work include the following; interview, the internet, textbooks and direct observation from

people. These methods used provide reliable information of the required knowledge of

this research and proper guidance; HTML, CSS, Jscript as the front-end, PHP will be

employed as the back-end and MySQL as the database for the design of the system.

1.5 The Scope of Project


The scope of this project depends on the available facilities and resources both human

and material. The project will cover two broad aspects, those of staff and security
information within the limit of available facilities and information given by the Kaduna

polytechnic staff.

1.6 Definition of Terms


On-line processing - This is a method of processing that provides direct access to

information files used by user’s and so enables updating.

Operations – The action carried out on an activity or process.

Crime record sheet – This contains pertinent information on staff and services as input

to the computer system via the standard input device keyboard.

Data entry – This is the standard input device through which the system gets most of the

instructions and commands.

Processing unit – This is where all data are processed and commands from the user

carried out.

Password – This is being employed to restrict unauthorized access to information

contained in the system; in others it is a security check technique

Witness – This is a person who has actually present at an event and should for these

reason be able to describe it.

Accused – This is a person who has done wrong by breaking the law.

Information or informers – This is a person who detects offenders and informs the

authorities of their offences.

Suspect – This is when one has a feeling that someone is guilty.

Databases: A systematically arranged collection of computer data, structured so that it

can be automatically retrieved or manipulated. It is also called a databank.


Information Security: means protecting information and information systems from

unauthorized access, use, disclosure, disruption, modification, perusal, inspection,

recording, or destruction.
CHAPTER TWO
LITERATURE REVIEW
2.0 Preamble
Literature Review entails to examine the critical points of past and current knowledge in

a particular field of study. This is an objective, through summary and critical analysis of a

relevant research available, which includes findings and contribution to the topic Design

and implementation of an online security information system.

Review of Related Literature

2.1 Security Information System

System is the degree of protection against danger, damage, loss and crime. Security as a

form of protection is structures and processes that provide or improve security as a

condition. The Institution for Security and Open Methodologies (ISECOM) in the

OSSTMM 3 defines security as a “form of protection where a separation is created

between the assets and the threat”. This includes but is not limited to the elimination of

either the asset or the threat. Security as a national condition was defined in a United

Nations study (2017) so that countries can develop and progress safely.

Security has to compare to related concepts: safety, continuity, and reliability, the key

difference between security and reliability is that security must take into account the

actions of people attempting to cause destruction. Different scenarios also give rise to the

context in which security is maintained. With respect to classified matter, the condition

that prevents unauthorized persons from having access to official information that is

safeguarding in the interest of the national security.

Measures taken by a police unit, an activity or installation to protect itself against all acts

designed to, or which may, impair its effectiveness.


Perception of security may be poorly mapped to measurable objective security. For

example, the fear of earthquakes has been reported to be more common than the fear of

slipping on the bathroom floor although the latter kills more people than the former.

Similarly, the perceived effectiveness of security measures is sometimes different from

the actual security provided by those measures. The presence of security protection may

even be taken for security itself. For example, two computer security programs could be

interfering with each other and even cancelling each other’s effect while the owner

believes he/she is getting double of the protection.

Security Theater is a critical form for the deployment of measures primarily aimed at

raising subjective security in a population without a genuine commensurate concern for

the effects of that measure on- and possibly decreasing- objective security.

Perception of security can also increase objective security when it affects or deters

malicious behavior, such with the vital signs of security protections, such as video

surveillance, alarm systems in a home, or an anti-theft system in a car such as Lojack,

signs.

For example, approach a car, break the window, and flee in response to an alarm being

triggered. Either way, perhaps the car itself or the objects inside aren’t stolen, but with

perceived security even windows of the car has a lower chance of being damaged,

increasing the financial security of the owner(s).

However, the non-profit, security research group, ISECOM, has determined that such

signs may actually increase the violence, daring, and desperation of the intruder. This

claim shows that perceived security works mostly on the provider and not the security at

all. It is important, however, for signs advertising security not to give clues as to how to
subvert that security, for example in the case whereby a home burglar might be more

likely to break into a certain home if he or she is able to learn beforehand which company

makes the security system.

Private security and public provide some of the same services and sometimes they even

mirror each other, but there are distinct differences among the similarities. The scopes of

their duties are different and each has advantages and disadvantages.

America’s law enforcement root can be traced back to English police models that were

colonial times up until (1800’s). in 1800 America experienced economic and social

changes-industrialization, urbanization and immigration that forced changes in law

enforcement making not just a local responsibility, but also a country, state and federal

responsibility. This brought about forming the police department and jurisdictions, with

New York being the first city to establish police force in 1844. Other social changes

again forced changes in law enforcement-(1960s), civil right and the 1980s drug

trafficking.

Public police are part of the government entity-local, country state or federal. All public

police are based on a paramilitary model and have strict requirement, training and

certification. Public police are controlled by politics and government establishments, and

restrained by laws and rules, but their role is the safety and welfare of the public.

Private security and public police have their advantages and disadvantages. Private

security companies have less restrictions placed upon them, thus they can focus and

effectively carry out their contracted duties. Private security also gets paid by

performance and can negotiate salary. Also private security has more technical equipment

available to them depending on the employer. The main disadvantage of private security
personnel is lack of training or updated training and job retention, since they are salary

employees they have less negotiation power than security and they do not get extra

compensation for exceptional performance like security does. Police are also hampered

by restrictions, legal and political; they are understaffed and outnumbered by security 10-

1 and not accessible to newer technology due to budget restraints and hiring limits. Police

does not have advantage in training/advanced training and in job retention. Security on

the other hand does not work off a budget and can buy whatever they want, update their

technology any time they wish. Security can also pull its training from any source from

government to private agencies.

In the corporate world, various aspects of security were historically addressed separately

– notably by distinct and often non-communicating departments for IT security, physical

security and fraud prevention. Today there is a greater recognition of the interconnected

nature of security requirements, an approach variously known as holistic security, all

hazards management and other terms.

Inciting factors in the convergence of security disciplines include the development of

digital video surveillance technologies and the digitization and networking of physical

control systems. Greater interdisciplinary cooperation is further evidenced by the

February

2017 creation of the Alliance for Enterprise Security Risk Management, a joint venture

including leading associations in security (ASIS), information security (ISSA, the

Information Systems Security Association), and IT audit (ISACA, the Information

Systems Audit and Control Association).


In (2018) the International Organization for Standardization (ISO) released ISO 28000-

Security Management Systems for the supply chain.

Although the title supply chain is included, this standard specifies the requirements for a

security management system, including those aspects critical to security assurance for

any organization or enterprise wishing to management the security of the organization

and its activities. ISO 28000 is the foremost risk based system and is suitable for

managing both public and private regulatory security, customs and industry based

security schemes and requirements.

2.2 Information Security

Information security means protecting information and information systems from

unauthorized access, use, disclosure, disruption, modification, perusal, inspection,

recording or destruction (Julia, 2018).

The terms information security, computer security and information assurance are

frequently incorrectly used interchangeably. These fields are interrelated often and share

the common goals of protecting the confidentiality, integrity and availability of

information; however, there are some subtle differences between them.

These differences lie primarily in the approach to the subject, the methodologies used,

and the areas of concentration. Information security is concerned with the confidentiality,

integrity and availability and correct operation of a computer system without concern for

the information stored or processed by the computer.

Government, police, corporations, financial institutions, hospitals, and private businesses

amass a great deal of confidential information about their employees, customers,

products, research and financial status. Most of this information is now collected,
processed and stored on electronic computers and transmitted across networks to other

computers.

2.3 Risk Management in Information Security

A comprehensive treatment of the topic of risk management will be provided as well as

some basic terminology and a commonly used process for risk management.

The CISA Review manual provides the following definition of risk management. “Risk

management is the process of identifying vulnerabilities and threats to the information

resources used by an organization in achieving business objectives and deciding what

countermeasures, if any, to take in reducing risk to an acceptable level, based on the

value of the information resources to the organization” (Vines, 2019). There are two

things in this definition that may need some clarification. First, the process of risk

management is an ongoing iterative process. It must be repeated indefinitely. The

business environment is constantly changing and new threats and vulnerability emerge

every day. Second, the choice of countermeasure (computer) (controls) used to manage

risks must strike a balance between productivity, cost, effectiveness of the

countermeasure, and the value of the informational asset being protected.

Risk is the likelihood that something bad will happen that causes harm to an

informational asset (or the loss of the asset). Vulnerability is a weakness that could be

used to endanger or cause harm to an informational asset. A threat is anything (manmade

or act of nature) that has the potential to cause harm.

The likelihood that a threat will use a vulnerability to inflict harm, it has an impact. In the

context of information security, the impact is a loss of availability, integrity, and


confidentiality, and possibly other losses (lost income, loss of life, loss of real property).

It should be pointed out that it is not possible to identify all risks, nor is it possible to

eliminate all risk. The remaining risk is called residual risk.

A risk assessment is carried out by a team of people who have knowledge of specific

areas of the business. Membership of the team may vary over time as different parts of

the business are assessed. The assessment may use some qualitative analysis based on

informed opinion, or where reliable dollar figure and historical information is available,

the analysis may use quantitative analysis. When management chooses to mitigate a risk,

they will do so by implementing one or more of three different types of controls.

Administrative controls (also called procedural controls) consist of approved written

policies, procedures, standards and guidelines. Administrative controls form the

framework for running the business and managing people. They inform people on how

the business is to be run and how day to day operations are to be conducted. Laws and

regulations created by government bodies are also a type of administrative control

because they inform the business. Some industry sectors have policies, procedure,

standard and guidelines that must be followed – the payment card industry (PCI) Data

Security Standard required by Visa and Master Card is such an example. Other examples

of administrative controls include the corporate security policy, password policy, hiring

policies, and disciplinary policies. Administrative controls form the basis for the selection

and implementation of logical and physical controls. Logical and physical controls are

manifestation of administrative control. Administrative controls are used for paramount

importance. Logical controls are (also called technical controls) use software and data to

monitor and control access to information and computing systems. For example,
password, network and host based firewalls; network intrusion detection systems, access

control lists, and data encryption are logical controls.

An important aspect of information security and risk management is recognizing the

value of information and defining appropriate procedure and protection requirements for

the information. Not all information is equal and so not information requires the same

degree of protection. This requires information to be assigned a security classification.

The first step in information classification is to identify a member of senior management

as the owner of the particular information to be classified. Next, developed a

classification policy, the policy should describe the different classification labels, define

the criteria for information to be assigned a particular label, and list the required security

control for each classification. Some factors that influence which classification

information should be assigned include how much value that information has to the

organization, how old the information is and whether or not the information has become

obsolete. Laws and other regulatory requirements are also important consideration when

classifying information.

There are three different types of information that can be used for authentication:

something you know, something you have, or something you are. Examples of something

you know include such things as a PIN, a password, or your mother’s maiden name.

Examples of something you have include a driver’s license or a magnetic swipe card.

Something you are refers to biometrics. Examples of biometrics include palm prints,

finger prints, voice prints and retina (eye) scans. Authentication requires providing

information from two of three different types of authentication information. For example,

something you know or something you have. This is called two factor authentications. On
computer system in use today, the Username is the most common form of identification

and the password is the most common form of authentication. Username and password

has served their purpose but in our modern world they are no longer adequate. Username

and password are slowly being replaced with more sophisticated authentication

mechanisms.

To be effective, policies and other security controls must be enforceable and upheld.

Effective policies ensure that people are held accountable for their actions. All failed and

successful authentication attempts must be logged and all access to information must

leave some type of audit trail.

2.4 The Relevance of Cryptography to Security Information

Information security uses cryptography to transform usable information into a form that

renders it unusable by anyone other than an authorized user; this process is called

encryption. Information that has been encrypted (rendered unusable) can be transformed

back into its original usable form by an authorized user, who possesses the cryptography

key, through the process of decryption. Cryptography is used in information security to

protect information from unauthorized or accidental disclosure while the information is in

transit (either electronically or physically) and while information is in storage.

Cryptography provides information security with other useful applications as well

including improved authentication methods, message digests, digital signature, non-

repudiation, and encrypted network communications. Older less secure applications such

as telnet and ftp are slowly being replaced with more applications such as that use

encrypted network communications. Wireless communications can be encrypted using

protocols such as WPA/WPA2 or the older (and less secure) WEP. Wired
communications (such as ITU-T G.hn) are secured using AES for encryption and X.1035

for authentication and key exchange. Software applications such as GnuPG or PGP can

be used to encrypt data files and Email. Cryptography solutions need to be implemented

using industry accepted solutions that have undergone rigorous peer review by

independent experts in cryptography. The length and strength of the encryption key is

also an important consideration. A key that is weak or too short will produce weak

encryption. The keys used for encryption and decryption must be protected with the same

degree of rigor as any other confidential information. They must be protected from

unauthorized disclosure and destruction and they must be available when needed. PKI

solutions address many of the problems that surround key management.

2.5 The Concept of “Due Care” in Security Information

In the field of information security, Harris S. (2017) offers the following definitions of

due care and due diligence:

“Due care are steps that are taken to show that a company has taken responsibility for the

activities that takes place within the corporation and has taken the necessary steps to help

protect the company, its resources and employees.” And [Due diligence are the]

“continual activities that make sure the protection mechanisms are continually maintained

and operational.”

Attention should be made to two important points in these definitions. First, in due care,

steps are taken to show – this means that steps can be verified, measured, or even produce

tangible artifacts. Second, in due care, there are continual activities – this means that

people are actually doing things to monitor and maintain the protection mechanisms, and

these activities are ongoing.


Preparing food with heat or fire is an activity unique to humans. It may have started

around 2 million years ago, though archaeological evidence for it reaches no more than 1

million years Ago. The expansion of agriculture, commerce, trade, and transportation

between civilizations in different regions offered cooks many new ingredients. New

inventions and technologies, such as the invention of pottery for holding and boiling

water, expanded cooking techniques. Some modern cooks apply advanced scientific

techniques to food preparation to further enhance the flavor of the dish served (Chris,

2018).
CHAPTER THREE
METHODOLOGY AND DESIGN
3.1 Preamble

Research methodology is a careful study or investigation, especially in order to discover

new fact or information, that is, the method used by the researcher to collect data or

information; hence, research methodology should be sound enough to make attainment of

the set objectives possible with specific components such as phases, tasks, methods.

Techniques and tools can also be defined as the analysis of the principle of methods, rules

and postulates employed by a discipline. This chapter entails the method of data

collection, system modelling, database design, input and output specification for the

design and implementation of an online security information as well as the system

requirement etc.

3.2 Method of Data Collection

There are different methods of data collection but the method of data collection used in

this project work is Documentation Method.

Documentation method is a secondary method of data collection. This method involves

the use of journals, handbooks, newspapers and projects. This method of data collection

was used because it serves as a basis of reference to existing research work. This

includes: Internet, Past Projects and text books.

3.3 System Modeling


System Modeling can be done using several Modeling Language, but in this project

work, we are using the Unified Modeling Language (UML).

3.3.1 Use Case Diagram

Use Cases are services or functions provided by the system to its users and to identify the

primary elements and processes that form the system. The primary elements are termed

as “actors” and the processes are called “Use cases”. The Use Case diagram shows which

actors interact with each use case and the purpose of a Use Case diagram is to provide a

graphical view of the functionality provided by the system in terms of actors, goals of

actors (represented as Use cases) and dependencies between Use cases.


Fig. 3.1 System Use Case Diagram

3.3.2 Activity Diagram

An activity diagram illustrates the dynamic nature of a system by modeling the flow of control

from activity to activity. An activity represents an operation on some class in the system that

results in a change in the state of the system. Typically, activity diagrams are used to model

workflow or business processes and internal operations. Because an activity diagram is a special

kind of state chart diagram, it uses some of the same modeling conventions.
Figure 3.3: Add Record Activity Diagram

Open Database

Accept ID

Invalid?
Display Error Message
Valid

Display Details

Accept Entries

Save Editing Cancel Editing


Save

Close Database

Figure 3.4: Edit Record Activity Diagram


Open Database

Invalid
Accept ID

Valid

Display Details

Cancel Deletion

Proceed with deletion

Delete Record

Close Database

Figure 3.5: Delete Record Activity Diagram


3.3.3 Class Diagrams

Class diagrams are visual representations of the static structure and composition of a particular

system using the conventions set by the Unified Modeling Language (UML). Out of all the UML

diagrams types, it is one of the most used ones. System designers use class diagrams as a way of

simplifying how objects in a system interact with each other. Using class diagrams, it is easier to

describe all the classes, packages, and interfaces that constitute a system and how these

components are interrelated.

i. The top partition contains the name of the class.

ii. The middle part contains the class’s attributes.

iii. The bottom partition shows the possible operations that are associated with the

class.
Figure 3.9: System Class Diagram

3.4 Database Design

A database is a collection of information that is organized so that it can be easily


accessed, managed and updated.
Table 3.1 Name: Login

FIELD NAME DATA TYPE LENGTH DESCRIPTION


Username Character 10 Username
Password Character 15 Password
Primary key: password

Table 3.2 Name: Personnel


Field Name Data Type Size Field Name
ID Integer 20 ID
NAME Character 40 NAME
ADDRESS Character 100 ADDRESS
DATE OF BIRTH Date\Time 8 DATE OF BIRTH
SEX Character 10 SEX
AGE Integer 2 AGE
STATUS Character 20 STATUS
HEIGHT Character 10 HEIGHT
DATE RECRUITED Date\Time 8 DATE RECRUITED
QUALIFICATION Character 50 QUALIFICATION
Primary Key = ID

3.3 Table: Posting


Field name Data type Size Description
POST_ID Integer 8 LESSON NO
PERSONNEL_NAM Character 30 PERSONNEL NAME
E
DUTY_POST Character 30 DUTY POST
INSTRUCTIONS Character 6 INSTRUCTION
TIME Character 7 TIME
DATE Date 6 DATE
Primary Key = POST_ID

3.5 Output Design


This declares and show the result obtained from the input specified. The output product by the

automated system depends on the input. Below is the output specification.

USERNAME

PASSWORD

Login Clear

Figure 3.5.1: Login


PERSONNEL INFORMATION X

FIRSTNAME:
LASTNAME

PHOTO
:
PHONE
NO:
MARITAL
STATUS:
QUALIFICATI RAN
ON: K
DATE OF Browse
BIRTH
GENDER

EMAIL ADD

Figure 3.5.2: Staff Registration


X

POSTING

NAME
Post

DUTY POST

TIME

DATE

Figure 3.5.4: Posting

3.6 System Requirements


System requirement is a combination of hardware and software components that makes

work to be carried out. The system requirement for this research work is subdivided into

Hardware and Software requirements.


3.6.1 Hardware Requirements

Hardware is the computer equipment and devices that are involved in the function of a computer

system together with the software components. Hardware are the physical components of the

computer system assembled together to interact with the software in order to form a composite

system.

The minimum hardware requirements are:

i. CPU Core i3 processor

ii. 100MB available disks space

iii. RAM (1 GB)

iv. Keyboard

v. Mouse

vi. 14’SVGA Colored Monitor

vii. U.P.S 650va (uninterrupted power supply)

viii. Hard Disk Drive (HDD) of 60GB

3.6.2 Software Requirement

The software requirements are:

i. Minimum of Window 7 (Remote standalone system)

3.7 Choice of programming Language

PHP is a server scripting language, and a powerful tool for making dynamic and

interactive Web pages, is a widely-used, free, and efficient alternative to competitors such

as Microsoft's ASP. Client computers accessing the PHP scripts require web browser only.

You might also like