TABLE OF CONTENTS
Cover page
Title page
Certification
Dedication
Acknowledgement
Abstract
Table of contents
1.0 INTRODUCTION1.1 Security information
1.2 Objectives
1.3 Justification
CHAPTER TWO
2.0 Security concept2.1 Definition of security
2.2 Security threats
2.3 Security & Information
CHAPTER THREE
3.0 Description of the exiting security information system3.1 Organizational structure
3.2 Fact finding method
3.3 Objective of the existing system
3.4 Programs of the existing system
3.5 Equipment of the existing system
3.6 Forms
CHAPTER FOUR
4.0 Design of the network-based security information system4.1 Method of data collection
4.2 System design – input, processing, output, information storage and retrieval
CHAPTER FIVE
5.0 Implementation of the new system5.1 Choice of programming language
5.2 Program flowchart of security record system
CHAPTER SIX6.0 Output interpretation
CHAPTER SEVEN
7.0 Conclusion 7.1 Recommendation