Design security system for digitalizing security operation

Assignment Help Computer Network Security
Reference no: EM133203200 , Length: Word count: 2 Pages

Assignment Task: My task is to design security system for Digitalizing Security Operation For Safety and Wellbeing in Kogi State Polytechnic, Nigeria.

Study all the system available and relevant to need, financial ability and operation of kogi state poly.

There were only 2 cameras..one at the gate, one at admin office.

There is no access door system, and student card is only card.. no data, no rfid..

Now, u have a chance to study security system . You could design a better security system strategically and digitally towards main poly objective and core business.

It involves.. existing (cheaper) technology, strategic system design, new digitally enhance standard operating procedure (process or operation flow)..

Then digital transformation is more on how we could transform current manual, analogue, lack of process procedure become their new way of doing works..

The feasible proposal on technical and financial.... so we could propose to  management to get approval

Having camera alone won't secure the safety.. We need to look on how security staff response and collect data..its more operation process flow..

explore around and explore the supply too... at nigeria price on the system and availability of tech..

Objective: by having this tech and better process in security management - kogy state polytech will be the preferred institution for both students and educator.. ripple effect, more fund could be secure from industry to invest in research and development through this polytech..

In this report we need proposal to let the management accept as high technology and low cost and digitalization.

Reference no: EM133203200

Questions Cloud

Legal aspects that will impact your business : Provide a detailed analysis of all Legal aspects that will impact your Business and how you will overcome any challenges.
Develop a piece of land : Your company is planning to develop a piece of land (This land is located in Muscat, Oman).
Discuss efficiency as a quality management approach : Total Service Management is a new adopted philosophy used in organizations to improve the quality levels. Discuss its efficiency as quality management approach
What is view of the government role in the economy : What is your view of the government's role in the economy? Do you think the government does more harm or more good in our society?
Design security system for digitalizing security operation : My task is to design security system for Digitalizing Security Operation For Safety and Wellbeing in Kogi State Polytechnic, Nigeria.
How did the rescue team respond to the risks of the project : How did the physical environment of the cave affect the rescue plan? How did the rescue team respond to the risks of the project?
Trend of international financial activity : If you review the history of international financial activity from 1960 up to the present, you will read about an expansion of international banking, that multi
Explain fred most profitable decision : Fred owns 5 hectares of farming land. He can farm the land himself producing a crop worth $120,000. The explicit costs involved are $30,000.
Overview of healthcare emergency management standards : Overview of a regulatory agency healthcare emergency management standards and/or regulations (choose one). Don't just provide background.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Recommend two new feature of windows server active directory

Recommend two new features of Windows Server 2012 Active Directory that you believe to be most beneficial to users from a network security standpoint.

  What classess java provide to make network programming

IPv6 uses addresses that are 16 bytes long (128 bits ).  How many addresses is that per person in the world? and What classes does Java provide to make network programming easier

  Assignment on data warehouses and network infrastructure

Imagine that you are an IT organizational leader in a mid-sized company. Comprise a justifiable argument for the use of data warehouses, data centers, and data marts in order to support for business intelligence (BI) within the organizational stru..

  Develop a change management project plan

BSBINN601 Lead and manage organisational change - Explain the activities and components involved in the change management process or cycle and strategies

  What sorts of protection is provided by the bank

What sorts of protection is provided by the bank to ensure secure online banking? Justify why the bank would use these security measures.

  Discuss the approaches to physical security

While logical access to systems, in this internet age, is a very important subject, the control of physical access to the assets of the organization is also.

  Paper on entropy as it pertains to cryptography

Turn in a 3 page paper on Entropy as it pertains to Cryptography. The paper must discuss the relationship of Entropy to the likelihood that an attack can be successful, the formula for computing Entropy

  Research the issue of social engineering

Research the issue of social engineering in the context of cyber security and report your findings, including what the problem is, types of social engineering techniques, existing and potential protection mechanism and future trends.

  What are risks behind implementing cloud computing programs

What are some of the major strategies and risks behind implementing cloud computing programs in today's technology filled world?

  What can be done to mitigate the risk of the threat

What can be done to mitigate the risk of the threat? What types of personal practices increase the probability of security threats?

  Analyze wireless network vulnerabilities exploited by hacker

Analyze wireless network vulnerabilities exploited by hackers. Design plans that remove Trojans, backdoors, and malware from infected systems.

  Describe cryptology and impact on cybercrime response

Identify what you perceive to be the five most concerning threats to the network, computing environment, and the database operations of the company - Describe cryptology and impact on cybercrime response.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd