Final Documentation 1
Final Documentation 1
BY
2023
APPROVAL FORM
1
The undersigned certify that they have supervised the student(s) Delight Chabata and Lillian
MAPOLISA, registration number M214UR and M21AST on dissertation entitled: MSUAS
CRIME MANAGEMENT SYSTEM, submitted in the partial fulfilment of the requirements of
the Bachelor of Science Honours in Information Systems at Manicaland State University of
Applied Sciences.
…………………………………………. ………………………………
Supervisor Date
…………………………………………. ………………………………
Chairperson Date
DECLARATION
2
We Delight Chabata and Lillian MAPOLISA confirm that this work is our original work and
it has been written by us in its entirety. We have duly acknowledged all the sources of
information which have been used in the dissertation.
ABSTRACT
3
For us to keep track of MSUAS records, it is still using the conventional technique of pen and
paper. This system takes a lengthy time to complete a single transaction, resulting in the loss of
information in some circumstances (crime files), insecurity, and data redundancy. Similarly,
certain situations have been documented in which jail employees conspire with clients (victims)
to falsify and conceal material or files, thereby jeopardizing the case's evidence. This has resulted
in time wasted handling cases, increased corruption and vulnerability of crucial files, and hence
raised the overall cost of the procedure. Also, when reports are required, particularly about
convicts, it takes a long time, making it difficult for Prison Management to make quick
judgments. This has resulted in numerous system flaws because there is no tracking and/or
monitoring of the information available in the various Departments, and there are no security
procedures in place to protect the available information. This demanded the system being
automated in order to be more efficient and effective. The present manual file-based system in
use was closely examined and compared to the proposed solution. A prototype of a proposed
system was created to facilitate data access, security, and retrieval for the prison administration's
quick report preparation. The prototype was created MySql database, PHP, CSS, JavaScript and
HTML
ACKNOWLEDGMENT
4
We would like to extend our heartfelt gratitude to our Supervisor Mrs C. Ruvinga for the
seamless support and guide throughout my endeavour. Throughout the writing of this project, we
have received great support from my lecturers in the department of Computer Science, I would
love to appreciate their effort towards guiding us from the first year to date. They provided me
with the tools that I needed to choose the right direction and successfully complete our project,
without them this project would never be a success. In addition, we would like to thank our
parents for their wise counsel and sympathy, there are our friends, who were of great support in
deliberating over our problems and findings, as well as providing a happy distraction to rest my
mind outside of our research. Finally, so much thanks to the Lord Almighty for backing me in
this great and challenging endeavour.
5
Table of Contents
DECLARATION i
ABSTRACT ii
CHAPTER 1: INTRODUCTION 1
1.0 Introduction 1
1.1 Background 1
1.2 Problem Statement 2
1.3 Objectives 2
1.4 Research Question 3
1.5 Instruments and Methods 3
1.6 Justification 4
CHAPTER 2: PLANNING PHASE 6
2.0 Introduction 6
2.1 Business Value 6
2.2 Technical and Social Feasibility 7
2.3 Economic and Operational Feasibility 8
2.4 Operational Feasibility 13
2.5 Risk Analysis 14
2.6 Develop work plan 15
2.7 Chapter Summary 18
CHAPTER 3: ANALYSIS PHASE 19
3.0 Introduction 19
3.1Analysis of Existing System 19
3.2 DFD and Activity Diagrams of existing system 19
3.3 Information Gathering technique(s) used 21
3.4 Context Diagram 22
3.5 Chapter Summary 23
CHAPTER 4: DESIGN PHASE 24
4.0 Introduction 24
4.1 DFD and Context diagram of the proposing system 24
4.2 ER-Diagrams/ Tables, Sequence, package 26
4.3 Main menu and submenu design 27
4.4 Interface design (Input forms/Output forms) 29
4.5 EER and Class diagrams 32
4.6 Pseudo code 33
4.7 Architectural design 33
4.8 Security design (Physical, network and operational) 37
4.9 Chapter Summary 42
CHAPTER 5: IMPLEMENTATION 43
5.0 Introduction 43
5.1 System Security 43
6
5.2 Testing 43
5.3 Maintenance 45
5.5 Conversion 46
5.6 Recommendations for future development 46
5.7 Conclusions and Reflection 46
5.8 Chapter Summary 47
References 48
CHAPTER 1 INTRODUCTION
1.0 Introduction
7
Over the past years MSUAS have been using a manualized system for managing security
records. The system was once considered as the best before technology. No-one ever thought
about having a computerized system until recently. We often see in films that they provide
security to the schools and Universities by installing sliding gates which can only be opened by
authorized personnel. This means not everyone has access to the system. These schools and
Universities also install CCTVs to monitor the activities of every student inside and outside their
premises. That means every activity they undertake is under surveillance. But have they ever
thought about a security management system. This is because they found the need to make sure
no criminal ever escapes and their records. But what happens if there is a fire outbreak and there
are handwritten documents with criminal details. With the computerized system our information
will be safe on cloud storage if there is a fire outbreak and even is earthquake where to attack the
University. No information can be lost no matter what happens. If our machines are to come
across different threatening situations. We can still get other machines and access our
information.
The MSUAS SECURITY Management System would allow us to have information of those
with criminal records and damages at the University. Instead of the personnel having to flip over
pages to identify the crime and criminals we have.
After its completion, the MSUAS SECURITY Management System must be able to give us
crime index in the form of reports where we are going to have information on the number of
people with crimes and for what crime.
1.1 Background
In the current system, there is the slower retrieval of records that is if a criminal is to be be given
a judgement , it takes time to look through the manual records. This is because, the officers will
be looking through into each and every records kept.
Moreover, with this current manualized system, MSUAS continue to have more criminals. This
is because, with the use of manual records it is hard to determine which crimes are being done
makes it even more difficult to manage. Overpopulation has led to a difficulty in managing the
day-to-day activities of the crimes. Then lastly, with the u use system being used to manage the
crimes, some criminals are actually going free because of lack of proper record keeping. If there
are records of an individual stating the crimes , it will be easier to know were security is needed
most.
8
replacement of the manual system, which is more secure, enhances record backups, it is going
help reducing the costs incurred by the organisation in the case of stationary, help reduce
overpopulation, among others.
1.3 Objectives
● To maintain statistical records of crimes based on category.
● To facilitate effective crime recording and tracking.
● To enable timeous allocation of officers to cases reported.
Hardware
Processor – intel dual core processor, 2.0 GHz or higher
RAM – minimum 4Gb
Network interface chip
Hard drive – 160 GB
Software
Operating system: windows XP or higher
Front end: c# (visual studio 2013 or higher)
Back end: SQL Server
1.6 Justification
The main users of the system will basically be the Chief of records, Admin or security guards.
The users and the system will be interacting through a Graphical User Interface supported by
Microsoft.Net framework 3.0 or latter. The MSUAS SECURITY management will give solution
to accurate and consistent handling of bulk criminal records without redundancy. The system
will also provide real time reports concerning university overall population, crime done.
The system is also going to reduce too much paper work at the same time strengthening data
security and backup. The University has been facing a problem of records disappearance. If in
any case they have a system to manage criminal records, there would be little to no risk of
records loss. This is because if records are being stored in a database, the probability that the
information is backed up. So, in any case, if the manual record is to disappear there would be a
backup, be it an online backup facility or a physical backup facility. Adding on, system will
9
enhance security for the records of the criminals. The problem comes after the case, where an
individual student after stealing a printer, the security guards took him to the adim and they gave
him to the police. But, the problem came when they noticed that there were no records regarding
the name of the security guard who caught him, the records had mysteriously disappeared . So,
our system aims to avoid such a problem from occurring at the University. Where there is
security there is little to no chance of records disappearing. These two work hand-in-hand.
Thus, the introduction of the MSUAS SECURITY Management System, would reduce the risk
of the disappearance of criminal records.
Add criminal
Update criminals
Criminal information
View reports:
i) Crime index report
ii) Criminal categories
iii)Cleared Criminals
Print report
Profile
View file
Print file
Of course, the system is designed to provide advantages to the users, but there is a however side
to everything. This system can only be edited by personnel who are computer literate. Thus, it
will definitely be expensive for the organization to empower the officers with the required skills
so they can be able to edit, access and delete records.
Adding on, there may be duplications, the skipping of records that may be of importance to the
organization in question.
In this chapter we are finding out the problems being faced by university and how to address
those problems. We then go on to define the requirements so that we have a successful system.
To have a successful system that meets the required functionalities we should define the
Problem, objectives, requirements and we justify. These are essential in the first stage of the
system development.
10
CHAPTER 2 : PLANNING PHASE
2.0 INTRODUCTION
This chapter is going to explain various concepts including Business Value, which gives an
overview on the benefits that will come by the development of a new system, Technical and
Social Feasibility, Economic and Operational Feasibility and Stakeholders Analysis. It will also
11
look into the development of a work plan which is essential for smooth management, monitoring
and evaluation of the project.
Technical Feasibility
According to Dennis. A (2012), technical feasibility is a tool used to evaluates project‘s potential
for success by specifying the hardware and software equipment that will successfully satisfy the
user requirement. This concept measures the practicality of the technical solution and the
availability of technical resources and expertise. It is carried out to assess whether the
organisation is technically feasible to support the project in terms of hardware, software and
technical expertise. Technical feasibility is inclined on the technical expertise and the availability
of the equipment to be used.
Hardware
12
● Processor – intel dual core processor, 2.0 GHz or higher
● RAM – minimum 4Gb
● Network interface chip
● Hard drive – 160 GB
●
Software
● Operating system: windows XP or higher
● Front end: c# (visual studio 2013 or higher)
● Back end: SQL Server
To conclude on the Technical Feasibility most of the requirements are readily available and the
organization is willing to purchase the items and update specific software.
Economic Feasibility
Social Feasibility looks at how the new system will affect the environment with interest on how
society can benefit from the system. According to Matthew J. Franchetti (August 23rd, 2011),
economic feasibility study is the financial evaluation of the project to analyse alternatives. Social
Feasibility looks at how the new system will affect the environment with interest on how society
can benefit from the system.
There are number of social changes that are brought about by the adoption of the proposed
system which will affect the operations, admin performance and prospects as well as user
confidence. In other terms the social feasibility clarifies the fact that, will the proposed system
influence working practices in a favourable way and show improvements on working conditions
of employees.
The system will reduce the need of numerous physical meetings thereby reducing time to
socialise during work hours hence that time is reserved for other activities. MSUAS CRIME
MANAGEMENT SYSTEM physical interaction with the criminal is monitored. The system can
collect and maintain accurate and consistent crime's information hence improving safety and
security of the University.
DEVELOPMENT COST
13
1 Visual Studio Free Free
Total 19 700
.
RUNNING Cost
Total 2000
Tangible Benefits
In the old system there we almost 20 workers in disciplinary committee who were responsible
for organizing documents, with the introduction of the new system those 20 workers will be
reduced and thus, giving us benefits.
Benefits Cost ($)
Total 17 000
Intangible Benefits
These are benefits that cannot be easily measured in monetary terms (Aizcorbe, Moylan,
Robbins ,2009)
● Improve Less human errors thereby increasing efficiency
● Job satisfaction due to reduced labor.
● Improved staff moral since the allocation will now be computerized
14
Cost Benefit Analysis
On cost-benefit analysis Sustain, 2005 alluded that the most appropriate method of carrying out
an economic assessment of a proposed information system is by comparing the expected costs of
development and operation of the system with the benefits of having it in place. The assessment
is centred on checking whether estimated costs are exceeded by the estimated income and other
benefits. It is necessary to ask whether or not the project under consideration is the best of a
number of options. There might be more candidate projects that can be undertaken at any one
time and, in any case, projects will need to be prioritized so that any scarce resources may be
allocated effectively.The standard way of evaluating the economic benefits of any project is to
carry out a cost-benefit analysis which involves:
● Identifying and estimating all of the costs and benefits of carrying out the project.
● Expressing these costs and benefits in common units that is in monetary terms.
Tangible 14000
Payback Period
Payback Period is the period of time it takes for investments to yield profits. It can also be a
period needed to break even. The time value is considered as it measures how long an investment
takes to pay itself.
The longer the payback period the riskier the project is and the period should never go above
acceptable payback period. The period found by adding the inflows to the cumulative flow is
zero, the project is deemed the project period.
15
Year Expected cash flow Cumulative Cash Flow
0 (11600) (11600)
1 6000 (5600)
2 6500 900
3 8000 8900
Payback Period
= A+B/C
= 1+(5600/6500)
= 0,9 years
If Net Present Value of a prospective project is positive, it should be accepted, and when it is
negative, the project should probably be rejected:
0 (11600)
1 6000
2 6500
3 8900
16
Initial investment is $15000
6000/ (1+0.1) ^1 + 6500/ (1+0.1) ^2 + 8900/(1+0.1) ^3
=$5913.15
Calculated as follows:
12400/15000*100
=51%
The system also bring satisfaction to all stakeholders because instead of doing manual adding,
releasing, updating and information retrieval these processes are computerized thereby saving
time and effort.
However, the computerized system may be a threat to employees and society. To the society the
system can reduce demand for labour therefore increasing unemployment rate. To the existing
employees some will have fear on losing their jobs. It can also be a monster to those employees
who are computer illiterate. In order to solve this problem there will be a minimum retrenchment
rate if employees are thoroughly trained to enhance necessary computer skills. Training will also
motivate them at the same time helping them to understand that technology is not a tool to be
afraid of but rather it comes to make work easier for them.
In conclusion on social feasibility, it can be deemed feasible since the analysis highlighted more
of positive effects the change will bring
Economic feasibility measures the cost-effectiveness of the project and the system can be
deemed feasible if the projected benefits of the proposed system outweigh the estimated costs in
developing, installing and operating it. In dealing with economic feasibility, cost benefit analysis
is done to evaluate the expected costs and the benefits. In economic feasibility cost benefit
analysis is a pre-requisite. Quantification and identification of all the benefit expected to be
brought about is included. The benefits can either be tangible or intangible.
17
These are benefits in relation to qualitative feature expected of the new system. The benefits
include:
● Increased security
● Organizational standards, professionalism and values are improved.
● Enhanced decision making by the disciplinary committee management.
Operational Feasibility
It is mainly concerned with the usability of the system if it is developed and in place. It takes into
account the reactions from users. The following questions help in trial of the operability of the
system:
According to Ian Sommerville (2015) risk analysis is the process of identifying risks that are
associated with developing and deploying the project and drawing up plans to minimize their
effect.A considerable number of risks may be confronted during the new system development.
This analysis identifies important risks in association with the project.
.Technical risks
● The system may not be able to meet the expectations set in terms of the graphical user
interface taking into mind that some users could have used varying types of systems with
different interfaces before.
● System maintenance can be a problem.
● The system will need backup and full support until the system can comfortably run.
● System Delivery requires parallel conversion in implementation until risks are done with.
Social Risks
The reimbursements of the crimes initiatives accrue mostly to university. The chances are that
the new system will face rejection as criminals may feel that they are not being allowed their
18
right of doing what they want at the University . Employees may be afraid to lose their jobs and
fear of the unknown.
Economic Risks
These risks are mainly associated with the cost of the project.
● As a result of the poor economic situation the country is rolling in, the project can be
terminated at any given time since it will be funded by the government unless a third
hand takes interest.
● The government and regulatory bodies have the rationale, power and opportunity to
improve competitive conditions through promoting standards, lessening network
externalities at community level.
It records and keeps track of tracks in need to be done over life project. It gives account of tasks
and their durations. The author is going to use the System Development Life Cycle to model the
sequential activities involved in the development of the project. The Gantt shows the project time
allocation for each phases involved.In scheduling feasibility, an organization or a project team
estimates how much time the project will take to complete. Schedule feasibility of a project can
be shown using the Gantt chart and Critical path. The following is the work plan of the security
management system development.
Gantt chart
PHASE| Week 1 2 3 4 5 6 7 8 9 10
Proposal
19
Feasibility
Study
Planning
Design
(UI, UX)
Coding
Testing
Implementation
Documentation
Maintenance
At this stage we are planning how we are going to develop our system taking into consideration
the related stakeholders and how they are going to benefit from the introduction of the system
and how they are going to be affected.
20
CHAPTER 3: ANALYSIS PHASE
3.0 Introduction
The analysis phase addresses the most crucial questions that the stakeholders are keen to know
the answers to while venturing into the development of the system. According to A. Dennis and
BH Wixom (2015) the analysis phase answers the questions of who will use the system, what the
system will do, and where and when it will be used. The analysis phase takes a glare at
operations of the current system, how processes are linked to the proposed system and how
activities are going to be coordinated. In this phase a set of information gathering methods were
used to collect data, and to help to find out how the system would work. The collected data was
analysed pointing out the weaknesses and strength of the current system and providing solutions
to the system weaknesses. A victorious development and completion of a suitable information
system depends on the achievement of the system analysis phase.
When a criminal has been added,. The admin have to go through the process of adding the
criminal records manually. Keeping inmate information is time-consuming and leaves a long
trail of paperwork. With the manual system, which is the current system, there was the risk of
loss of records of criminals . According to what we searched at MSUAS University there was a
situation were a student was supposed to pay fine for breaking a window pane but, the
punishment was not done because no record was found from the criminal list.
DFD
It shows the flow of information in the old MSUAS crime management system .
21
Activity Diagram
A few activities were undertaken in the system that is going to be replaced. The system only
allowed Conviction.
22
3.3 Information Gathering technique(s) used
A. Kahate (2004) compares requirements gathering to the way the doctors examine the patient
before prescribing the medication or to the way the lawyers study the case before they defend,
which means at this stage the analyst is studying the problems (as a doctor) with the current
system to clearly understand what demands for changing the current system.
During the analysis of the system we come up with a clear comprehension of the current system
operations. After we analysed, we came up with a system that satisfies the user requirements.
This gives a detailed explanation of the current system, how the processes are linked within the
current system and how activities are going to be linked in the new system. A set of information
gathering techniques were used to gather data to help us find out how the system works. The
techniques help in collecting data, but like any other concept they have weaknesses. The
techniques used include;
● Interviews
Interviews
An interview according to Fontana and Frey (2005) is a conversation between two people (the
interviewer and the interviewee). The interviwer will designed some questions written on papers.
Questions will be asked to the interviewees who will be selected.
The interview was carried out with the organisations stakeholders, which are the admin
(disciplinary committee), security guards and some of the criminals. Stakeholders perceptions,
attitudes and behaviours were noted during the interview.
Advantages
● Body language allowed the analyst to observe non-verbal communication from the
interviewee.
● The interview room for customization of questions for employees respective to their
departments and positions.
Disadvantages
23
In the old system, there was no involvement of a parent if the student commits a crime.
Analysis allows us to identify what is lacking in the current system and what needs to be added
to the new system. In other words, we are finding loop holes and come up with solutions.
24
CHAPTER 4: DESIGN PHASE
4.0 Introduction
According to Kassem A. Saleh (2009), the design phase is initiated after the deliverables of the
analysis phase are reviewed and accepted by the appropriate stakeholders and this phase includes
the activities such as high-level architectural, database, interface, and detailed designs.During the
design phase, the system is intended to fulfill the necessities distinguished in the past stages.
Stage of a design process is the preliminary design phase in which the design parameters and
conceptual diagrams are drawn up Marsot (2005). The motivation behind the outline stage is to
change the necessities into complete and itemized system plans determination.
DFD Diagram
Data flow diagram Below is the diagram of a DFD map out the flow of information in the
proposed Manicaland State university crime management system
Context Diagram
Shows the relationships among methods in a component. In this case we are showing the
relationships among the components in the crime as a component.
25
4.2 ER-Diagrams/ Tables, Sequence, package
26
The main menu gives us an overview of the operations in the system.
The menu shows us the operations that are under the criminals.
Submenu
this menu allows us to manage users and log out of the system. By managing users we will either
be adding or deleting the user.
This for allows authorized users to gain access to the system after inputing the username and the
password.
27
4.4 Interface design (Input forms/Output forms)
This is an idea on how the users are going to interact with the system. This is the interaction
between the system and the intended users and provides communication between the entities.
This includes defining the external and internal control and data flows. It clearly shows the
design of menus, forms and the indexes. It consists of the design of the graphical user interface
components and artefacts needed to support the human interaction with the software system.
Input Forms
Designing of all forms necessary for information input for example criminal details.
Input criminals
This form allows the admin to enter the criminal details and add to the criminal database.
28
Input form for the user
This form is using to add the users who can access the system and carry out operations.
Criminal Search
After searching for the wanted criminal using crime category. All the details of that criminal are
displayed so that the personnel who would have requested can access the information easily.
29
User output
This form gives us a list of the personnel allowed to access our system and carry out operations.
It allows us to add another user and delete another one in case they have retired or they passed-
on.
Criminal Output
It shows the list of criminals who have been added into the system and their records. The form
allows us to Insert, Update, Delete and go back to the main menu.
30
Start
Select system
Log in
ELSE
ENDIF
End
Architectural design is a way of representing the structure of data and program components that
are required to build a computer based system. This includes the interpretation of the theoretical
legitimate model under those particular specialized plans. It may be the configuration of the
equipment, product that those suggested framework is setting off to work on. Those framework
segments are recognized including the control and also information stream between them. The
framework will have a chance to be web based and the structural engineering will comprise of:
User Machine, System Cables and Server.
Physical Design
Physical design is the translation of business requirements into a system model that depicts
technical implementation of the users’ business requirements. Physical design is the place you
make an interpretation of the normal patterns into real database structures. Right now one needs
to guide substances to the tables, connections to the remote keys, credits to segment, one of
unique identifiers to one of unique keys
31
.
Database Design
The database design outlines the smart representation of the database. It contains 3 layers which
are external, ascertained and inside.
Database Architecture
External Level
This is the most elevated level of reflection. Its principle point will be should improve those
user’s collaboration for those database by procurement for interface that those client camwood
basically control. Those user’s see of the database is altered should his/her investment. They
main see those information that is applicable should them. The database records could make seen
utilizing forms, reports Furthermore table.
32
Conceptual Level
This level depicts what information is really saved in the database and the associations that exist
amongst the information. The information may be put away previously, tables and a table’s plan
depicts the thing that it stores, which will be the table qualities. Queries would also characterized
in this level.
Physical Level
This is the least level about reflection on how information will be really saved in the database.
Database tables
A database will be the central stockpiling of the data in this framework and with the ability to
have the same data over different applications. The accompanying are the framework tables in
their crucial institutionalised structures. Field Name insinuates the trademark name, field sort
implies the data sort of the quality and the depiction is just an optional decree.
Admin
At this stage we are looking at the measures which will be taken into consideration to secure our
system. If the system is not secured,it is vulnerable to attacks which may result in us losing all
our information. The security design is found in different stages which are:
Physical Security
Physical security is the protection of personnel, hardware, software, networks and data from
physical actions and events that could cause serious loss or damage to an enterprise, agency or
33
institution. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism
and terrorism.
The physical security framework is made up of three main components: access control,
surveillance and testing. The success of an organization's physical security program can often be
attributed to how well each of these components is implemented, improved and maintained.
Access control
The key to maximizing one's physical security measures is to limit and control what people have
access to sites, facilities and materials. Access control encompasses the measures taken to limit
exposure of certain assets to authorized personnel only. Examples of these corporate barriers
often include ID badges, keypads and security guards. However, these obstacles can vary greatly
in terms of method, approach and cost.
The building is often the first line of defense for most physical security systems. Items such as
fences, gates, walls and doors all act as physical deterrents to criminal entry. Additional locks,
barbed wire, visible security measures and signs all reduce the number of casual attempts carried
out by cybercriminals.
Using tactically placed obstacles, organizations can make it more difficult for attackers to access
valuable assets and information. Similarly, these barriers increase the time it takes for threat
actors to successfully carry out acts of thievery, organizations have to respond to physical
security threats and contain them.
But criminals are not the only threat that access controls can minimize. Barriers such as walls
and fences can also be used to harden buildings against environmental disasters, such as
earthquakes, mudslides and floods. These risks are extremely location-dependent. Organizations
that divert resources toward such hardening measures should balance the cost and benefit of their
implementation prior to investment.
Surveillance
This is one of the most important physical security components for both prevention and post-
incident recovery. Surveillance, in this case, refers to the technology, personnel and resources
that organizations use to monitor the activity of different real-world locations and facilities.
These examples can include patrol guards, heat sensors and notification systems.
The most common type of surveillance is closed circuit television (CCTV) cameras that record
the activity of a combination of areas. The benefit of these surveillance cameras is that they are
as valuable in capturing criminal behavior as they are in preventing it. Threat actors who see a
CCTV camera are less inclined to break in or vandalize a building out of fear of having their
identity recorded. Similarly, if a particular asset or piece of equipment is stolen, surveillance can
provide the visual evidence one needs to identify the culprit and their tactics.
34
Testing
Physical security is a preventative measure and incident response tool. Disaster recovery (DR)
plans, for example, center on the quality of one's physical security protocols -- how well a
company identifies, responds to and contains a threat. The only way to ensure that such DR
policies and procedures will be effective when the time comes is to implement active testing.
Testing is increasingly important, especially when it comes to the unity of an organization. Fire
drills are a necessary activity for Jails because they help to coordinate large groups, as well as
their method of response. These policy tests should be conducted on a regular basis to practice
role assignments and responsibilities and minimize the likelihood of mistakes.
IoT demands a significant amount of physical security to safeguard data, servers and networks.
The rising connections of IoT has expanded the sphere of physical security. Virtual machines
and applications that run in the cloud, for example, are only as protected as their physical
servers.Whether organizations invest in first-party or third-party cloud computing services, these
data centres need to be sufficiently protected using physical security measures to avoid severe
data losses.
Network Security
Network Security protects your network and data from breaches, intrusions and other threats.
This is a vast and overarching term that describes hardware and software solutions as well as
processes or rules and configurations relating to network use, accessibility, and overall threat
protection.
Network Security involves access control, virus and antivirus software, application security,
network analytics, types of network-related security (endpoint, web, wireless), firewalls, VPN
encryption and more.
Network Security is vital in protecting client data and information, keeping shared data secure
and ensuring reliable access and network performance as well as protection from cyber threats. A
well designed network security solution reduces overhead expenses and safeguards organizations
from costly losses that occur from a data breach or other security incident. Ensuring legitimate
access to systems, applications and data enables business operations and delivery of services and
products to customers.
Firewall
35
Firewalls control incoming and outgoing traffic on networks, with predetermined security rules.
Firewalls keep out unfriendly traffic and is a necessary part of daily computing. Network
Security relies heavily on Firewalls, and especially Next Generation Firewalls, which focus on
blocking malware and application-layer attacks.
Network Segmentation
Network segmentation defines boundaries between network segments where assets within the
group have a common function, risk or role within an organization. For instance, the perimeter
gateway segments a company network from the Internet. Potential threats outside the network
are prevented, ensuring that an organization’s sensitive data remains inside. Organizations can go
further by defining additional internal boundaries within their network, which can provide
improved security and access control.
Virus: A virus is a malicious, downloadable file that can lay dormant that replicates itself by
changing other computer programs with its own code. Once it spreads those files are infected and
can spread from one computer to another, and/or corrupt or destroy network data. Is this case it
will affect the network of our Inmates Records Management System, thus reducing our operation
speed.
Worms: Can slow down computer networks by eating up bandwidth as well as the slow the
efficiency of your computer to process data. A worm is a standalone malware that can propagate
and work independently of other files, where a virus needs a host program to spread. In this case
it may take a lot of time to receive a notification when we have an Inmate whose sentence is
about to expire.
Ransomware: This is a type of trojan cyberware that is designed to gain money from the person
or organization’s computer on which it is installed by encrypting data so that it is unusable,
blocking access to the user’s system.
Operational Security
The processes involved in operational security can be neatly categorized into five steps:
Identify your sensitive data, including the system research, intellectual property, employee
information, and jail personnel information. This will be the data you will need to focus your
resources on protecting.
● Identify possible threats. For each category of information that you deem sensitive, you
should identify what kinds of threats are present. While you should be wary of third
36
parties trying to steal your information, you should also watch out for insider threats,
such as negligent jail guards and unsatisfied administrartors.
● Analyze security holes and other vulnerabilities. Assess your current safeguards and
determine what, if any, loopholes or weaknesses exist that may be exploited to gain
access to your sensitive data.
● Get countermeasures in place. The last step of operational security is to create and
implement a plan to eliminate threats and mitigate risks. This could include updating your
hardware, creating new policies regarding sensitive data, or the Jail personnel who will
be in direct contact with the system on sound security practices and company policies.
Countermeasures should be straightforward and simple. The jail personnel should be able
to implement the measures required on their part with or without additional training.
Follow these best practices to implement a robust, comprehensive operational security program:
Implement precise change management processes that your employees should follow when
network changes are performed. All changes should be logged and controlled so they can be
monitored and audited.
● Give your employees the minimum access necessary to perform their jobs. Practice the
principle of least privilege.
● Implement dual control. Make sure that those who work on your network are not the
same people in charge of security.
● Automate tasks to reduce the need for human intervention. Humans are the weakest link
in any organization’s operational security initiatives because they make mistakes,
overlook details, forget things, and bypass processes. For example, instead of a jail guard
carrying out the visitor authentication process, we can use the visitors finger print as an
authentication method.
● Incident response and disaster recovery planning are always crucial components of a
sound security posture. Even when operational security measures are robust, you must
have a plan to identify risks, respond to them, and mitigate potential damages.
● Risk management involves being able to identify threats and vulnerabilities before they
become problems. Operational security forces Administrators to dive deeply into their
operations and figure out where their information can be easily breached. Looking at
operations from a malicious third-party’s perspective allows the Jail Administrators to
spot vulnerabilities they may have otherwise missed so that they can implement the
proper countermeasures to protect sensitive data.
For a system to be developed it would have been driven from somewhere. Thus at this stage, we
are looking at the costs to be incurred to enhance the success of the proposed system and the
37
benefits of the system in question. The new system to be developed gives an overview on how
the demerits of the existing system are going to be overtaken. For example, how it is going to
reduce costs in a Jail. This stage also allows us to identify the threats and vulnerabilities of the
system.
CHAPTER 5: IMPLEMENTATION
5.0 Introduction
After all the stages are complete in System Development. Then we can safely say the system is
ready for implementation. At the implementation stage we first look at the security measures to
be used so that we have a successful and secure system. During implementation stage we also
test our system to make sure there are no errors. We also look mat the maintenance strategies.
The maintenance strategies can either be successful or not, thus we need to evaluate the level of
success of the maintenance strategies.
System Security is one major aspect of a system. We need to have security strategies to enhance
a successful system. At this stage we look at the system accessed by only the authorized
personnel.
5.2 Testing
Testing is intended to show that a program does what it is intended to do and to discover
program defects before it is put into use. When you test software, you execute a program using
artificial data. So, we are going to test the MSUAS Management System to find out whether our
development has yield fruits or not. We undertake the testing process using the following
techniques, these techniques include:
Development testing
Development testing includes all testing activities that are carried out by the team developing the
system. The tester of the software is usually the programmer who developed that software,
although this is not always the case. Some development processes use programmer/tester pairs
(Cusamano and Selby, 1998) where each programmer has an associated tester who develops tests
and assists with the testing process. During the development process, testing is carried out in
three stages which are:
Unit testing: it allows each method to be tested for functionality. For example, we are checking
if the method of Keen authentication,its performing, its function without any errors or bugs.
38
Component testing: where several individual units are integrated to create composite
components. Component testing should focus on testing component interfaces. For
example, testing if our interfaces are allowing us to carry out the required functionalities.
System testing: some or all of the components in a system are integrated and the system is tested
as a whole. System testing should focus on testing component interactions. After all the
components are integrated we then have a complete system, the system then needs to be tested
for errors and see if they are meeting the specified requirements.
Development testing is primarily a defect testing process, where the testing process is to discover
bugs. It is usually combined with debugging, where we are discovering bugs and fixing them.
At this stage, we are carrying out unit testing where we are testing every component
independently. Unit testing is the process of testing program components, such as methods or
object classes. When you are testing object classes, you should design your tests to provide
coverage of all of the features of the object. This means that you should:
• set and check the value of all attributes associated with the object;
• put the object into all possible states. This means that you should simulate all events that cause
a state change.
Test-driven development
Software components are often composite components that are made up of several interacting
objects. You can assume that unit tests on the individual objects within the component have been
completed.
Release testing
System testing during development involves integrating components to create a version of the
system and then testing the integrated system. System testing checks that components are
compatible, interact correctly and transfer the right data at the right time across their interfaces
User testing
After all the testing techniques have been successful, and we are sure our system has no more
bugs and no errors have been detected recently. We then proceed to user testing. We opt for the
releasing our system and receive reviews from the users, then we know whether our system has
39
satisfied user requirements and our users are happy. For example, we deploy our system to a
small population of the University and they test the system on a few criminals check if the
system is performing the required functionalities.
5.3MAINTENANCE
According to Gary B. Shelly Harry J. Rosenblatt (2011), system maintenance as the process of
refining the system to make sure it continues to meet business needs. Once the system is
successfully installed they are processes, components, modules, and users that changes, evolver
or break which requires the continuous maintenance of the system.Maintenance is the general
process of changing a system after it has been delivered. Changes are implemented by modifying
existing system components and, where necessary, by adding new components to the system.
There are three different types of software maintenance:
1.Fault repairs
Coding errors are usually relatively cheap to correct; design errors are more expensive as they
may involve rewriting several program components. Requirements errors are the most expensive
to repair because of the extensive system redesign which may be necessary.
2. Environmental adaptation
This type of maintenance is required when some aspect of the system’s environment such as the
hardware, the platform operating system, or other support software changes. The application
system must be modified to adapt it to cope with these environmental changes.
3.Functionality addition
This type of maintenance is necessary when the system requirements change in response to
organizational or business change. The scale of the changes required to the software is often
much greater than for the other types of maintenance.
The system maintenance was successful. After the implementation, errors were discovered after
testing. The errors were successfully corrected leaving no errors and no room for errors. The
system was developed in a way that it fits in every environment. But that does not mean it was
successful in every environment. Thus, maintenance for the environmental adaptation was
expensive, this was because we discovered that some areas have no Network coverage. Thus
introducing a network is expensive.
40
The tech industry is ever changing, thus we would need to constantly add some functionalities to
the system.
5.5 Conversion
This is how we are going to change from the old system to another. In this case we are going to
use the Pilot Implementation technique. This technique allows us to introduce the system to a
small segment of the desired segment while maintaining the old system. That is, we are going to
replace the old system only after the system we are going to introduce has been successfully
implemented and has met with the requirements.
System development was successful, however there are some components we were not able to
implement because of time. Future developers can add the following so that they improve the
functionality of the Inmates Records Management System:
Instead of entering criminal details manually, developers could actually link the MSUAS il to the
registry. Since the registry department has details on everyone, the system could allow the entry
of details using a fingerprint. The moment ones fingerprints are detected all the information
needed is displayed.
Instead of having a few people being able to use the system, we should involve the security
guards from This will help in completing the task at hand on time.
The system is performing satisfactorily thus, the project was a success of its own kind. All the
system objectives specified were satisfied. However, we faced a challenge in terms of time. The
system was implemented successfully and there are errors for now. It has since been concluded
that the system could be further expanded and introduced to the whole criminals for the
successful management system.
The implementation stage checks for the suitable security measures for the system, checks for
errors after before the final implementation. We find a strategy of implementation. This is
because we cannot just introduce a new system to an organization that has no computer
background, for this we use Pilot Implementation.
41
This is the stage were we make recommendations for future developers on what they should add
to the system that we were not able to add.
References
Dennis, A., Roth, R. and Wixom, B. (2015). Systems analysis and design. Hoboken, NJ: Wiley.
Dennis, A., Wixom, B., Tegarden, D. and Seeman, E. (n.d.). System analysis & design.
Gary B. Shelly Harry J. Rosenblatt (2011). Systems analysis and design. New Dheli
J., M. (2011). Economic and Operational Feasibility Analysis of Solid Waste Minimization
Projects. Integrated Waste Management - Volume I.
Prentice Hall. Khan, F. and Khan, M.E. (2012). International Journal of Advanced Computer
Science and Applications (IJACSA), Vol. 3, No.6.
Kahate, A. (2004). Object Oriented Analysis & Design. New Dehli: Tata McGraw-Hill
Education.
Rivero, L., Doorn, J. and Ferraggine, V. (2006). Encyclopedia of database technologies and
applications. Hershey, PA: Idea Group Reference.
Roth, R., Dennis, A. and Wixom, B. (2013). System analysis and design. Hoboken: J. Wiley &
Sons.
42
Fontana, A., & Frey, J. H. (2005). The interview. The Sage handbook of qualitative research, 3,
695-727.
Appendix
Username: Lillian
Password: 12345
43