PASS 2024 UTME WITHOUT STRESS:- DOWNLOAD and PRACTICE with 2024 UTME CBT APP 📱👈
😂 GUARANTEE|:| STUDY, WORK AND LIVE IN THE UK >>>.:- STUDY IN UK! Here is How to Apply to Study and Work In the United Kingdom in 2024

Network Base Security Surveillance System

Network Base Security Surveillance System is a complete computer science project materials from chapter one to five with references and abstract

CLICK HERE TO DOWNLOAD THE COMPLETE MATERIAL (CHAPTER 1 -5)

Abstract

This project titled “NETWORK BASE SECURITY SURVEILLANCE SYSTEM” is so design to help security information system especially for the management of the present porous security system in the campuses. Presently the polytechnic is not armed with modern data processing and security information system.

To help wake it up from its stagnation, my solution is to transform the existing age-long manual information system and embrace latest technology that will avert loss of information, insecurity and delay in data processing. Consequently, I have decided to use an automated data base system for storing and keeping track of security information.

As a result, CCTV (Close-Circuit Television) security cameras will be mounted around the polytechnic premises during the course of project implementation to enhance high security for the compound and its communities. This will ensure that there is an efficient and effective computerized information system within the institution and likely to be first of its kind in any higher institution of learning in West Africa sub-region thank you.

TABLE OF CONTENT

Title page

Certification Page

Dedication

Acknowledgement

Abstract

Table of content

CHAPTER ONE: INTRODUCTION

1.1 Background Of The Study

1.2 Statement Of The Problem

1.3 Significance Of The Study

1.4 Aims and Objectives Of The Study

1.5 Scope And Limitation Of The Study

1.6 Definition Of Terms

CHAPTER TWO: LITERATURE REVIEW

CHAPTER THREE: SYSTEM ANALYSIS AND DESIGN

3.1  Introduction

3   Analysis Of The Existing System

3.3  Weakness Of The Existing System

3.4  Data Collection Techniques

3.5  Analysis Of The Proposed System

3.5.1  Algorithm

3.5.2  System Flowchart

3.6   Database Design

CHAPTER FOUR: SYSTEM IMPLEMENTATION AND EVALUATION

4.1  Program Development

4.2  System Requirement

4.2.1  Software Requirement

4.2.2 Hardware Requirement

4.3 System Interface

4.3.1 Input Interface

4.3.2 Output Interface

4  System Performance

4.5  System Training

4.6  Conversion To The Proposed System

4.7  System Documentation

4.7.1  Operational Manual

4.7.2  User’s Manual

4.8  System Maintenance

CHAPTER FIVE:      

Summary, Recommendation and Conclusion

5.1 Summary

5.2 Recommendation

5.3 Conclusion

Reference

Appendix I

CHAPTER ONE

INTRODUCTION

  • BACKGROUND OF STUDY

Information system occupies a vital and unique position in any organization by virtue of the data and information, which it contains. Security of information is of great importance to any given organization this makes the information reliable since information stored can be referenced whenever necessary access by unauthorized persons.

This project “NETWORK BASE SECURITY SURVEILLANCE SYSTEM” is so design to help security information system especially for the management of the present porous security system in the campuses. Presently the polytechnic is not armed with modern data processing and security information system. To help wake it up from its stagnation, my solution is to transform the existing age-long manual information system and embrace latest technology that will avert loss of information, insecurity and delay in data processing.

The management and security unite is responsible for security of live and property and as a result keeps record of vital information given to them by any informant so as to enable them arrest activities or scenes unpleasant to people residing in a particular district.

Therefore, for effective administration and management, the provision of computer based information security for every source station is certainly inevitable, since it will take care of all the problems and inadequacies of the manual system.

As a result, CCTV (Close-Circuit Television) security cameras will be mounted around the polytechnic premises during the course of project implementation to enhance high security for the compound and its communities

  • STATEMENT OF THE PROBLEM

In spite of the level of computation of various institution, this particular institution on discussion is still at the grass root level. It requires a certain degree of protection especially of vital equipment’s, properties and information and this cannot be realized through the current system of operation, which is the manual system.

  • SIGNIFICANCE OF THE STUDY

The purpose of this study is to provide a computer based, on line and interactive package that will accurately and efficiently record all data and information about staff, informers, witnesses and accused persons.

It will also eradicate the numerous problems associated with the manual technique of securing information in order to facilitate the transfer and retrieval of information between the various departments of the institution.

The research is intended not only to support the premise that an information security program is a Necessity in any computing environment, but also to offer practical advice on the design and implementation of such a program.

It is not the intent of this paper to endorse any particular product or technology, only to offer suggestions and guidance to computer users who are concerned about their security and privacy as related to computer use.

AIMS AND OBJECTIVES

Having studied the activities of the institution some benefits could be derived from the computerization of information system and this includes:

  1. Higher security efficiency of information
  2. Quicker access to individual data
  3. Faster treatment of information security oriented cases.
  4. Provision of output information in a readily comprehensible form to those persons involved in the activities of the organization. Provision of communication channels. To compass formal and informal component.
  5. Detecting security violations.
  6. Re-creating security incidents.
  7. To disallow unauthorized users.
  8. To safeguard the organizational data/information.
  9. To computerized the organizational security.
  10. To enhance the organizational security.
  11. To eliminate all forms of mistakes associated with security control.

To provide storage facilities for data not immediately required or that may be required to be used more than once.

SCOPE OF STUDY AND LIMITATION OF THE STUDY

The scope of this study is to eradicate the numerous problems associated with the manual technique of securing information in order to facilitate the retrieval of information. This research work will access the design and implementation of “NETWORK BASE SECURITY SURVEILLANCE SYSTEM” in kogi state polytechnic lokoja. It will look into the operations of this institution in the aspect of computerizing their security control system.

This study will cover three main areas:

  1. Identification of security weaknesses
  2. Assessment of risk associated with those weaknesses
  3. Development of a plan to reduce or eliminate that risk

These three points will be dealt with in a general manner, as opposed to an in-depth treatment of every exploit, or of every possible solution.

First, in order to delineate between the varied needs of individuals and businesses, it is important to keep the discussion on a level where both environments can be examined equally.

Second, detailed research and studies have been done on most, if not all, of these weaknesses and exploits – it would be redundant to delve too deeply into those details in this study. Where applicable, these other more detailed studies are included by reference. For those readers who wish to do additional research, or require more detailed information, a list of security resources is included in Appendix A.

Actual implementation of an information security plan is likewise treated in a general manner. The disparities between environments, and even between individual computers, put detailed technical discussions outside the scope of this study.

This study focuses on the Microsoft Windows® computing environment. While the processes and procedures identified herein are, in many cases, also valid for other operating systems and environments, the Microsoft family of operating systems and applications is the system most widely used in business, and is all but exclusive in the home environment, making it a common factor upon which to draw comparisons and develop processes. Therefore, discussions of Unix, Linux, Macintosh, and other operating systems and environments will not be included unless the technology used to propagate or prevent an attack is based on one of these systems, in which case the system will be included by reference only. Again, for those wishing to do further research into these, and other operating systems and environments, a list of security vendors is included in Appendix A.

This paper will not discuss the relative strengths and weaknesses of individual pieces of technology or of multiple methodologies. Where a formula, process, or method is recognized as the preferred or most common, sufficient documentation to support that claim will be presented; alternatives, if they exist, will be included.

This study will result in a treatment of the subject sufficient for an individual or

Business person to make an informed decision on whether to pursue an information security program, and how to proceed with the planning and design of that program.

Guidance will be given to direct the reader to the appropriate resources to complete and implement their plan.

LIMITATION OF THE STUDY

Delimitations are the factors which affect the result of the study. There is hardly any research project without some limitation affecting it in one-way or the other. The limitations encountered during the course of this research are as follow:

  1. Collection of Information: There were limitations in getting all the required information needed for the research as some of the information’s where not forth coming due to lack of co-operation and secrecy the part of the respondents.
  2. Financial Limitation: There was also financial limitation, because to carry out a research of any kind you need money and being a student my finances are limited.
  3. Time Constraints: The time required to get the research done is limited being an academic requirement to finish your studies and research takes a considerable amount of time e.g two years.
  4. Secrecy: The respondents being questioned were reluctant in giving relevant information needed for the research work. They see the questions being asked as trying to probe them.
  5. Illiteracy: There was limitation of illiteracy on the part of some of the respondent. It is difficult for people who cannot read and write to appreciate the need to supply relevant research information.

DEFINITION OF TERMS

In order to provide a common understanding of the terms and phrases used in information security, and in an effort to adhere to industry standard terminology, many of the following terms and definitions were taken from the SANS Institute website (SANS Institute, 2013)

CLICK HERE TO DOWNLOAD THE COMPLETE MATERIAL (CHAPTER 1 -5)

>GUARANTTEE|:| Score 280 Above in 2024 UTME👉 DOWNLOAD FREE JAMB CBT APP HERE:.: GURRANTTEE Score 280 Above in 2022 UTME👉 DOWNLOAD FREE JAMB CBT APP HERE 📱👈
WISH TO STUDY & LIVE in UK?:- STUDY, WORK AND LIVE IN the UK Application Form NOW OUT. Call 08030447894

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.