International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017
p-ISSN: 2395-0072
www.irjet.net
Crime Investigation with Cybernetic Protector Archana Nikose1, Sneha A. Tale2, Srushti Y. Kharabe3, Vaibhav Ingle4, Praveen singh5, Apurv Badwaik6 Priyadarshini Bhagwati College of Engg. , Nagpur (MS) Department of Computer Science And Engineering ---------------------------------------------------------------------***--------------------------------------------------------------------2. SYSTEM FUNCTIONALITY
Abstract— Cybernetic Protectors is to provide a secure way of communication and transferring evidences in Secret Intelligence Agency of defence system which always uses undercover agents to solve complex cases and dismantle criminal organizations. We are conceptualizing this software as a solution so that Secret Intelligence Agencies and their agent can communicate through this Software for the exchange of evidences in a secure way, and maintain the details of main officer. The Cybernetics Protector software is concerned with the security of the country and thus proper care has to be taken that confidential data from within the database is not leaked out. Every country requires a Secret Agency who undertakes cases which are a threat to the national security. These agencies operate with the help of undercover agents who help solve these cases. Since these cases deal with the nation’s security, the communication and data transfer between the agents and higher authorities need to be protected.
Figure 1 explains overall functionality of the system along with different set of users involved. In the information systems development field, requirements form the foundation for the rest of the software development process. since building a high-quality requirements specification is essential to ensure that the product satisfies the users.
Key Words: Secret Intelligence Agency, Security
1. INTRODUCTION The Secret Intelligence Agency is the nation’s first line of defence. It accomplishes what others cannot accomplish and go where others cannot go. It carries out the mission by collecting information that reveals the plans, intentions and capabilities of the adversaries and provides the basis for decision and action. The Cybernetics Protector is software which allows a security agency to handle various confidential missions in a secured way[8]. The Cybernetics Protector software is concerned with the security of the country and thus proper care has to be taken that confidential data from within the database is not leaked out. Every country requires a Secret Agency who undertakes cases which are a threat to the national security. These agencies operate with the help of undercover agents who help solve these cases. Since these cases deal with the nation’s security, the communication and data transfer between the agents and higher authorities need to be protected. Hence developing such a system is necessary to help these agencies operate in a secret and secured way. The system will be used by a set of five different users. These users are Defence Ministry, Chief, Agents, employees and Citizens of the country[9].
© 2017, IRJET
|
Impact Factor value: 5.181
Figure 1 Cybernetics Protector Users
2.1 The Defense Ministry
The Defense Ministry assigns cases to the Secret Agency and allocates resources to it. It should be able to receive reports regarding the cases.
|
ISO 9001:2008 Certified Journal
|
Page 1577