- The Complete Research Material is averagely 85 pages long and it is in Ms Word Format, it has 1-5 Chapters.
- Major Attributes are Abstract, All Chapters, Figures, Appendix, References.
- Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.
- Full Access Fee: ₦6,000
Get the complete project »
CHAPTER ONE
1.0 INTRODUCTION
National security is the requirement to maintain the survival of the state through the use of economic, security operatives especially police, political power and the exercise of diplomacy. The concept developed mostly in the United States of America after World War II focusing on the police and military might. Now, it encompasses a broad range of facets, all of which impinge on the police and military for economic security of the nation, lives property and values protected by national society. Accordingly, in order to possess national security, a nation needs to possess economic security, energy security, environmental security, etc. Security threats involve not only conventional foes such as other national states but also non state factors such as violent non-state actors, narcotic cartels, multinational corporations and non-governmental organizations; some authorities include natural disasters and events causing severe environmental change in this category.
The origin of the modern concept of “national security” as a philosophy of maintaining a stable nation state can be traced to the peace of Westphalia, wherein the concept of a sovereign state, ruled by a sovereign, became the basis of a new international order of nation states.
As an academic concept, national security can be seen as a recent phenomenon which was first introduced in the United States after World War II, and has to some degree replaced other concepts that describe the struggle of states to overcome various external and internal threats. The struggle of states to overcome various external and internal threats. The earliest mention of the term national security, however, was made in Yale University in 1790 wherein was made to its relation with domestic industries.
The concept of the national security became an official guiding principle of foreign policy in the United States when the National security Act of 1947 was signed on July 26, 1947 by the U.S. President Harry S. Truman. Together with its 1949 amendment, this act create American national security d important facets for American national security as the precursor to the department of defense, subordinated the security operatives branches to the new cabinet level position of the secretary of defense, established the National Security council and the Central Intelligence Agency. The Act did not define national security which was conceivably advantageous as it’s ambiguity made it a powerful phrase to invoke whenever issues threatened by other interests of the state, such as domestic concerns, came up for discussion and decision making.
The realization that national security encompasses more than just security was present though understated, from the beginning itself.
The US National Security Act of 1947 was set up “to advise the president on the integration of domestic security and foreign policies related to national security”.
Gen Maxwell Taylor’s essay of 1947 titled “The Legitimate claims of
National Security” has this to say;
The national valuables in this broad sense include current assets and national interests, as well as the sources of strength upon which our future as a nation depends. Some valuables are tangible and earthly; others are spiritual or intellectual. They range widely from political assets such as the Bill of Rights, National Security and political institutions and international relations to many economic assets which radiate worldwide from a highly productive domestic economy supported by rich natural resources. It is the urgent need to protect valuables such as these which legitimizes and makes essential the role of national security.
1.1 STATEMENT OF THE PROBLEM
Database Security system has always played a vital role in the stability of a nation. Keeping security information manually can hinder some defense program and delay passage of security information to the appropriate body. Manual documentation of security information can lead to exposure of the information thereby creating threat to the nation at large. Hence, there is need for an automated Database Security System to guaranty safety of information.
1.2 OBJECTIVES OF THE STUDY
The general objective of the study is to develop a database for security information storage and retrieval.
Specifically, the following objectives are also considered:
i. To build a database system for police security information.
ii. To develop a software for managing security information.
iii. To determine the effectiveness of Nigerian police in managing signal.
1.3 DEFINITION OF TERMS/VARIABLES
Policing: Policing is another way of depicting the police.
Anti-policing: Anti-policing is the society’s social attitude opposed to war between states and in particular countering arguments based on policism.
Databases: A systematically arranged collection of computer data, structured so that it can be automatically retrieved or manipulated. It is also called a databank.
National Security: The requirement to maintain the survival of the nation-state through the use of economic, policing, and political power and the exercise of diplomacy.
Information Security: means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction.
Classified Information is sensitive information to which the access is restricted by law or regulation to particular groups of persons.
Security Management is a broad field of management related to asset management, physical security and human resource safety functions.
You either get what you want or your money back. T&C Apply
You can find more project topics easily, just search
-
SIMILAR COMPUTER SCIENCE FINAL YEAR PROJECT RESEARCH TOPICS
-
1. DESIGN AND IMPLEMENTATION OF EXPERT MANAGEMENT SYSTEM FOR AUTOMOBILE FAULT DETECTION AND DIAGNOSIS
» CHAPTER ONE 1.0 INTRODUCTION In present time most households own at least one car. This figure shows that a car is very important to people’s lives ...Continue Reading »Item Type & Format: Project Material - Ms Word | 78 pages | Instant Download | Chapter 1-5 | COMPUTER SCIENCE DEPARTMENT
-
2. DESIGN AND IMPLEMENTATION OF A FIXED ASSET MANAGEMENT INFORMATION SYSTEM (A CASE STUDY OF UNITED AFRICAN COMPANY OF NIGERIA (UACN) DEVELOPMENT COMPAN...
» CHAPTER ONE INTRODUCTION Fixed asset management information system is a sub operation in financial accounting that take care of the degeneration of as...Continue Reading »Item Type & Format: Project Material - Ms Word | 75 pages | Instant Download | Chapter 1-5 | COMPUTER SCIENCE DEPARTMENT
-
3. DESIGN AND IMPLEMENTATION OF WEB-BASED EMPLOYEE RECORD SYSTEM
» CHAPTER ONEINTRODUCTION1.1 IntroductionAll organizations, however large or small, need to keep certain records, some because the law requires them, an...Continue Reading »Item Type & Format: Project Material - Ms Word | 65 pages | Instant Download | Chapter 1-5 | COMPUTER SCIENCE DEPARTMENT
-
4. DESIGN AND IMPLMENETATION OF A COMPUTERISED BANKING SYSTEM (A CASE STUDY OF UNITED BANK FOR AFRICA)
» ABSTRACT In this world of competitive resource application and technological development, the banks have been totally computerized. This project work ...Continue Reading »Item Type & Format: Project Material - Ms Word | 74 pages | Instant Download | Chapter 1-5 | COMPUTER SCIENCE DEPARTMENT
-
5. INTRODUCTION TO ARTIFICIAL INTELLIGENCE APPLICATION AND BENEFITS TO HUMAN LIFE
» ABSTRACT This study was intended to examine the historical development of artificial intelligence. This study was guided by the following objectives; ...Continue Reading »Item Type & Format: Project Material - Ms Word | 52 pages | Instant Download | Chapter 1-5 | COMPUTER SCIENCE DEPARTMENT
-
6. ONLINE LIBRARY MANAGEMENT SYSTEM (A CASE STUDY OF MATHEMATICD DEPARTMENT KASU)
» ABSTRACT This work designs and implements an online library management System a case study of Mathematics Department. The system allows people to read...Continue Reading »Item Type & Format: Project Material - Ms Word | 52 pages | Instant Download | Chapter 1-5 | COMPUTER SCIENCE DEPARTMENT
-
7. STAFF SERVICE SUPPORT DESK (CASE STUDY OF ITD PEUGEOT AUTOMOBILE NIGERIA LIMITED KADUNA)
» CHAPTER ONE: INTRODUCTION 1.1 Background Of The Study A helpdesk is a res0urce intended t0 pr0vide the cust0mer 0r end user with inf0rmation and supp0...Continue Reading »Item Type & Format: Project Material - Ms Word | 55 pages | Instant Download | Chapter 1-5 | COMPUTER SCIENCE DEPARTMENT
-
8. DESIGN AND IMPLEMENTATION OF FILE TRACKING SYSTEM
» ABSTRACT Large volumes of data are usually generated in most institutions of learning today. Locating files among tons of others can thus be tedious a...Continue Reading »Item Type & Format: Project Material - Ms Word | 50 pages | Instant Download | Chapter 1-5 | COMPUTER SCIENCE DEPARTMENT
-
9. DESIGN AND IMPLEMENTATION OF A COMPUTER-BASED SECURITY INFORMATION SYSTEM
» ABSTRACTInformation is an important aspect of life. Vital information is the life wire or backbone of any organization. From sports statistics to the ...Continue Reading »Item Type & Format: Project Material - Ms Word | 75 pages | Instant Download | Chapter 1-5 | COMPUTER SCIENCE DEPARTMENT
-
10. A CARD BASED SECURITY SYSTEM
» ABSTRACTThis project was centered on card based security system. The current process of security is being operated manually and due to this procedure ...Continue Reading »Item Type & Format: Project Material - Ms Word | 65 pages | Instant Download | Chapter 1-5 | COMPUTER SCIENCE DEPARTMENT