Design security system for digitalizing security operation

Assignment Help Computer Network Security
Reference no: EM133203200 , Length: Word count: 2 Pages

Assignment Task: My task is to design security system for Digitalizing Security Operation For Safety and Wellbeing in Kogi State Polytechnic, Nigeria.

Study all the system available and relevant to need, financial ability and operation of kogi state poly.

There were only 2 cameras..one at the gate, one at admin office.

There is no access door system, and student card is only card.. no data, no rfid..

Now, u have a chance to study security system . You could design a better security system strategically and digitally towards main poly objective and core business.

It involves.. existing (cheaper) technology, strategic system design, new digitally enhance standard operating procedure (process or operation flow)..

Then digital transformation is more on how we could transform current manual, analogue, lack of process procedure become their new way of doing works..

The feasible proposal on technical and financial.... so we could propose to  management to get approval

Having camera alone won't secure the safety.. We need to look on how security staff response and collect data..its more operation process flow..

explore around and explore the supply too... at nigeria price on the system and availability of tech..

Objective: by having this tech and better process in security management - kogy state polytech will be the preferred institution for both students and educator.. ripple effect, more fund could be secure from industry to invest in research and development through this polytech..

In this report we need proposal to let the management accept as high technology and low cost and digitalization.

Reference no: EM133203200

Questions Cloud

Legal aspects that will impact your business : Provide a detailed analysis of all Legal aspects that will impact your Business and how you will overcome any challenges.
Develop a piece of land : Your company is planning to develop a piece of land (This land is located in Muscat, Oman).
Discuss efficiency as a quality management approach : Total Service Management is a new adopted philosophy used in organizations to improve the quality levels. Discuss its efficiency as quality management approach
What is view of the government role in the economy : What is your view of the government's role in the economy? Do you think the government does more harm or more good in our society?
Design security system for digitalizing security operation : My task is to design security system for Digitalizing Security Operation For Safety and Wellbeing in Kogi State Polytechnic, Nigeria.
How did the rescue team respond to the risks of the project : How did the physical environment of the cave affect the rescue plan? How did the rescue team respond to the risks of the project?
Trend of international financial activity : If you review the history of international financial activity from 1960 up to the present, you will read about an expansion of international banking, that multi
Explain fred most profitable decision : Fred owns 5 hectares of farming land. He can farm the land himself producing a crop worth $120,000. The explicit costs involved are $30,000.
Overview of healthcare emergency management standards : Overview of a regulatory agency healthcare emergency management standards and/or regulations (choose one). Don't just provide background.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd