Security Company Management System
Security Company Management System

Abstract

This project proposed an online security system for senior projects to replace the current manual system. This web-based system is the management paradigm for companies who want to implement securities. The manual system is inefficient, tedious, and time-consuming. The primary purpose of this project is to systematically involve all parties in the online collaborative system as a medium for exchanging information on the completed project. Developing a system requires web design, web setup, database design, database setup, and server setup.

Looking for help to develop your next project? Read our new blog post: Top 9 Programming Assignment Help Website

The Online security Management system is set in an open-source environment. If you use the Linux operating system on your server platform, the system uses MySQL as your database system and Apache as your web server. The server-side scripting language is PHP, but HTML is written using JavaScript on the client-side. Considering the three user groups in the Online security management system, each group has different interfaces and features.

The administrator manages the system with tasks that handle user registration and accounts, and user validation protects your system. This web-enabled Project management and related components are precious, viable, and relevant—execution of the efforts of the parties concerned.

You can also check these posts:

Introduction

Everywhere in our daily lives, and for all, we find many people who lack safety. If you look at the daily newspaper, you may find at least 23 stories about robbery at jewelry stores, homes, and temples. Everything from a general robber to a rich man is an all-around person. Therefore, there is a need and urgency for a safe life and safety equipment. The Intelligent Security Systems project designs a programmable locking system using a microcontroller with embedded c. In this project, the microcontroller forms the heart of the project as it forms a controlling unit and controls the whole device of the system. 

By using three units, the keyboard unit, control unit, and display unit, we will design this intelligent security system project. The use of the Keyboard unit is to lock/unlock the particular device with the help of the number of keys contained in it. The display system indicates whether the device is already locked, opened, or permanently locked as the user entered the wrong password. 

Finally, the control system controls the whole system, which is the primary device, and this is coordinated with both the units so that if one enters the wrong password with the use of the keyboard unit and display unit will indicate some gestures built into it for specific functions with the help of these two units output the control unit gives an alarm if the entered password is wrong. 

With the help of this project’s intelligent security system, we can protect many things happening in day-to-day life. We can use this application in major projects like Telecom, automotive, domestic, aerospace, defines systems, and many more.

Problem Statement

The security system is mainly done in the old and manual way of pen and paper, which is no way perfect or feasible way to deal with security nowadays. From data protection to hardware, it is better to be more digitalized, where the idea of the project came from.

  • Manual is inefficient because it takes time to operate the system and requires more personnel.
  • In communication with all participants, the Commission also has many problems and difficulties because there is no specific medium of interaction, which leads to a delay.
  • There is also a problem with archiving and storage. Older data is challenging to find and will be deleted after a while. The manual system uses much more disk space for all hard copies.

The objective of The Project

The main goals of this project are: 

  1. Develop a systematic and comfortable online system 
  2. Design the system architecture and its functions 
  3. How to set up the platform and server environment 
  4. Test the reliability of the system

Scope of The Study

The scope of the Company security online management system is much broader than the management system. There are two parts to the development of this project. This project contains knowledge and experimentation based on.

  • Web design, setup, and development
  • Database design and management
  • Server design and setup 

This part focuses on web and server design, setup, and development. On the other hand, other elements, including database design and maintenance, are performed.

Feasibility and Relevance of The Project

The online Company security management system, works very well. In the first six weeks, searches were performed to determine the system’s background. During the period, the system’s functions were also discussed. Shortly after that, research on system design and structure continued, and by the end of the discussion, the concept of the system was complete.

The project will continue at the next version, and there will begin developing the system backend, database design, and structure in 5 weeks. Designing the web application coding and interface took another five weeks. The project will be improved and updated before testing.

The online company security management system, aims to achieve four characteristics.

  • Scalability The system must be scalable. That is, you need to support a large number of joins and monitor a large number of data attributes.
  • Flexibility The system must be flexible enough for dynamic changes in the system’s data.
  • Administrative separation As with UTP environments with large subscribers, the system must provide management isolation to place the nodes in a more organized hierarchy.
  • Robust The System must be robust, and you also need to be able to adapt appropriately to the reconfiguration and provide functionality when the reconfiguration occurs. Several tests are performed to ensure that the system is robust.

System Architecture

The online company security management system, works very well. In the first six weeks, searches were performed to determine the system’s background. During the period, the system’s functions were also discussed. Shortly after that, research on system design and structure continued, and by the end of CSOMS, the concept of the system was complete.

The project will continue at CSOMSII, and they will begin developing the system backend, database design, and structure in 5 weeks. Designing the web application coding and interface took another five weeks. The project will be improved and updated before testing. The CSOMS online management system aims to achieve four characteristics. 

  • Scalability The system must be scalable. That is, you need to support a large number of joins and monitor a large number of data attributes.
  • Flexibility The system must be flexible enough for dynamic changes in the system’s data.
  • Administrative separation As with UTP environments with large subscribers, the system must provide management isolation to place the nodes in a more organized hierarchy.
  • Robust The System must be robust. You also need to be able to adapt appropriately to the reconfiguration and provide functionality when the reconfiguration occurs. Several tests are performed to ensure that the system is robust.
  1. Client-side
  2. Server-side
  3. Database backend and web-based administration tool.
  4. Graphical front-end
System Architecture for Security Company Management System
System Architecture for Security Company Management System

In the above figure, the architecture of the CS online management system is divided into three layers. The client browser’s user interface, web server, and database server. The following is a description of the features at each system level.

Stage 1: Interface 

 From the client’s web browser perspective, the interface consists of HTML pages that support JavaScript.

Layer 2: Web server 

This system uses the Apache web server with PHP modules to support the 3rd tier 

backend. The PHP script processes user input and generates a SQL query to access the database. Apache then compiles and runs the output on the dynamically generated HTML page.

Third level: Database server 

The MySQL database server receives requests to execute SQL statements from the second level to the third level. The server accesses the database file, retrieves the stored data, and then sends back the requested data.

Modules of The Project

Security Management Module: Used to manage the details of the security system. 

  • Login Module: Used to manage login’ details
  • Reservation Engine: Used to manage reservation details
  • Physician Management Module: Used to manage physical asset information and details.
  • Personnel Module: Used to manage security personnel data
  • Test Module: Used to manage test information
  • Credential Module: Used to manage credentials.
  • User Module: Used to manage users on the system

Data Flow Diagram

The records float diagram is the start line of the layout segment wherein the necessities specification is functionally decomposed. The DFD includes a chain of bubbles linked using wires. Bubbles constitute record transformations, and contours form record flows withinside the system. The DFD shows what records float represents, which records float, now no longer how the records are processed. Therefore, it no longer consists of hardware, software, and records structures.

Data Flow Diagram for Security Company Management System
Data Flow Diagram for Security Company Management System

A records float diagram (DFD) is a graphical illustration of the “float” of records via a records system. DFD also can be used to visualize records processing (Structured Design). Data Flow Diagrams (DFDs) require modeling methods for analyzing and constructing records processes. DFD is a diagram that illustrates the float or motion of records inside a manner, and DFD indicates these records float in a technique primarily based on inputs and outputs. The DFD may be referred to as a manner model. The records float diagram illustrates the documents and approaches withinside the system.

Use Case Diagram

Use Case Diagrams are graphical representations used to capture the dynamic aspects of a system. It consists of actors, use cases, and their relationships. The use case diagram illustrates how the user interacts with the proposed system. It is used to understand the requirements of the 4464 system and to identify external and internal factors that affect the system. By drawing a diagram, you can see the interaction and the function. There are three actors representing three people.

Use Case Diagram for Security Company Management System
Use Case Diagram for Security Company Management System

There is a user group of online CS management systems with students, instructors/supervisors/examiners, and coordinators. In the middle are each group’s requests to the system.

Client-Side Architecture

The Online Company Security Management System was developed with the ability to share information among students, supervisors, and FYP committees. The system can display all topics available from projects and supervisors for students. Please select the one you have chosen. Students can also view the supervisor profile and see the submission status. The system allows instructors, supervisors, and examiners to upload projects and easily assign students. There is no longer a paper form for manually filling out and submitting, and everything is done online. This group can also view the profiles of students and give grades to them. The system is designed to allow faculty members to view student submissions online. 

The coordinator is given full access to this system, manages positions and assignments, and assigns examiners. The committee can check the grades and will post important announcements. An administrator manages the system. The administrator monitors the system, maintains access levels for all users, and manages site settings.

The online company security Management System is a web-based application that interacts with users using any web browser. Therefore, an essential client-side component is the web browser (Internet Explorer, Mozilla Firefox, Google Chrome, etc.). After the entire backend process, HTML is used to generate a dynamic web page, and JavaScript validates user input. The scripting language used here is HTML with JavaScript enabled to ensure compatibility with the server-side.

Conclusion

To provide a convenient management environment, the web-based software system Online company security Management System was introduced in. This project is a comprehensive solution to the problems faced by manual company security management system.

The success of the proposed online management system reduces the weight of the Company management coordinator, simplifies the protocol, and improves overall management performance. All participants can interact with each other and exchange information online. The project’s feasibility is guaranteed, so this project needs to be developed and implemented. The online company security management system, is expected to work very well in improving the quality of Computer security management.

Future Recommendations

You can do much more with this system. Currently, the system is not fully automated, so it has a limit. Also, there is no Document management system yet. It is hoped that the system will be available at the master and doctoral levels for future upgrades. We also recommend that you be able to archive the file or report. The system may also provide a means for 

participants to communicate online in real-time.