Design and Implementation of a Network-Based Security Information System for Police Department
The fundamental aim of this project titled Design and Implementation of a network based security information system is to provide means by which a system of information network will aid the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system. The current manual process of gathering information by the police over the years has not been very effective Because of so many challenges like: lost of file, lack of data security, slow collection and retrieval of information, mistake from recording etc. the new software conducted the network security weakness in router and firewall network devices, type of threats and responses to those threats, and the method to prevent the attacks and hackers from accessing the network. this project will provides a checklist to use in evaluating whether a network is adhering to best practices in network security and data confidentiality. It will also airs the different machines used in information processing system to reduce the much-engaged manual efforts. this proposed system will be of great advantage to the government and security agency because it will achieve proper data storage, handling of files, collect information faster for security analysis, store information for subsequent/future usage and also a standard for planning and control measure. This software is designed with visual basic 6.0
1.1 Background of the Study
Security on the Internet and on Local Area Networks is now at the forefront of computer network related issues. The evolution of networking and the Internet, the threats to information and networks have risen dramatically. Many of these threats have become cleverly exercised attacks causing damage or committing theft. The Internet continues to grow exponentially. Most times, government and business critical applications become more prevalent on the Internet, there are many immediate benefits.
However, these network-based applications and services can pose security risks to individuals as well as to the information resources of companies and government. In many cases, the rush to get connected comes at the expense of adequate network security. Information is an asset that must be protected. Without adequate protection or network security, many individuals, businesses, and governments will be at risk of losing that asset. Network security is the process by which digital information assets are protected, the goals of security are to protect confidentiality, maintain integrity, and assure availability. With this in mind, it is imperative that all networks be protected from threats and vulnerabilities in order for a business to achieve its fullest potential. Typically, these threats are persistent due to vulnerabilities, which can arise from mis-configured hardware or software, poor network design, inherent technology weaknesses, or end-user carelessness. A router is similar to many computers in that it has many services enabled by default. Many of these services are
Unnecessary and may be used by an attacker for information gathering or for exploitation. All unnecessary services should be disabled in the router configuration to prevent the attacker from using it to damage the network or to stealing the important information, or network devices configuration. In this paper a review of attacks on network, and how it can be prevented, or mitigating it will be described. Routers and firewall are very critical parts of network operations and network security. Careful management and diligent audit of router and firewall operations, can reduce network downtime, improve security, prevent the attacks and hackers, network threats decrease, and aid in the analysis of suspected security breaches.
Law enforcement administrations, Justice Systems, legislators and the government functionaries often need information to efficiently disseminate and fulfill their official responsibilities of ensuring maximum security for their subjects. To achieve this, a system of information technology network is needed to aid the management in decision taking about the security of lives and properties. In this work “Design and Implementation of a Network Based Security Information System” I will take a study of Police Department as an existing information network system in the police and analyze their process of data collection and hence design a new system which will enhance the output.
1.2 Statement of the Problem
The securing of individual information’s, data and business by the police is to an extent done manually and this reveals a number of problems, which are;
- Delay in Information dissemination
- Inaccuracies often ensure from human error.
- Large number of files to search from.
- Identification of individual data and information causes delay.
The manual system is quite tedious and can be reduced or eliminated with the introduction of the proposed system.
In a situation where the numbers of individuals in the country increases every year, the dissemination and management of individual data’s becomes extremely slow and time consuming but with this research project, ways of increasing efficiency will be made available, yielding documentation and speedy distribution of information to the society will be guaranteed.
1.4 Aims and Objectives
The aims of study are;
- To enhance tracking of information needed by the police where necessary.
- To develop software that will be able to manipulate all processes and procedures of securing individuals information and safety in the state.
- To enhance database for proper information and data security.
- To improve the system performance and efficiency.
- To save time, manpower and paper work.
- Provide an easily adopted (user friendly) system of networked security.
1.5 Purpose of the Study
The purpose of this research is to introduce networked based security information for the police department in order to improve accuracy in information handling and the automation of all the procedures and processes ensuring efficient use of time and manpower.
1.6 Significance of the Study
The significance of this study is to provide an efficient way of securing individuals information in the state by developing a network based security application better than the pre-existing system, creating overall security for the system and noticeable reduction in human error. This research work will also be useful to other law enforcement agency in securing their information. And also assist any student carrying out research in a related course.
1.7 Organisation of the work
This project was covered under five stages:
- Chapter 1; Deals with the background of the study, statement of the problem, motivation, Aim of the study, purpose of the study, significance of the study, organization of work and definition of Term.
- Chapter 2; This chapter is a review of related literature
- Chapter 3; Discusses system Investigation and Analysis. It deals with
detailed investigation and analysis of the existing system and problem
- Chapter 4; Treats the system design and implementation
- Chapter 5; The summary and conclusion of the project are finally treated in this chapter.
1.8 DEFINITION OF TERM
Police Force: A police force is a constituted body of persons empowered by the state to enforce the law, protect property, and limit civil disorder. Their powers include the legitimized use of force.
Network Security: Network Security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs to perform their permitted critical functions within a secure environment.
Firewall: This is a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
Router: A router is a networking device that forwards data packets between computer networks.
Cybercrime: Cybercrime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cybercrime also includes traditional crimes conducted through the Internet.
LAN: A local area network (LAN) is a group of computers and associated devices that share a common communications line or wireless link to a server. Typically, a LAN encompasses computers and peripherals connected to a server within a distinct geographic area such as an office or a commercial establishment.
WAN: A wide area network (WAN) is a geographically distributed private telecommunications network that interconnects multiple local area networks (LANs). WANs allow users to share access to applications, services and other centrally located resources. This eliminates the need to install the same application server, firewall or other resource in multiple locations.
MAN: A metropolitan area network (MAN) is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN).
Server: A computer or other device that manages a network service.An example is a print server, which is a device that manages network printing.