Technology plays an important role in national security through applications like defense, secure communications, surveillance, and disaster response. The document discusses how the military uses various technologies for defense purposes like heat seeking missiles, night vision devices, stealth aircraft, biometric authentication, and electromagnetic rail guns. It also covers cyber security threats and how technologies like firewalls, encryption, and updated software help prevent cyber crimes. Image processing, GPS, and armor for vehicles are additional technologies discussed that support national security efforts.
2. WHAT IS TECHNOLOGY?
Technology is the making, usage and
knowledge of tools, machines, techniques,
system or methods of organisation in
order to solve a problem a specific
function.
3. Technology can be used for the protection
of national integrity and from enemies. Now
a days technology is used for National
security in the following ways.
For defence purpose.
To secure confidential or secret
Electronic Data’s.
For communication purpose.
For spying.
For tackling natural disasters.
4. Technology in defence sector
The defence sector uses all kinds of latest
technology for its day to day working.
It ranges from computer servers to heat seeking
Missiles.
5. Heat seeking missile
IR is a type of electromagnetic radiation .
Adding heat to bodies tends to increase the
amount of IR .
As a result warmer bodies emit more IR.
Heat seekers track this output of IR and follow
its source.
6. The army uses ultra modern communication
and transport systems.
It also take use of helicopters to transport
food and weaponry.
7. Army uses night vision device for patrolling
around the border.
They also use helicopters and Unmanned Aria
Vehicles(UAV) for surveillance.
The Air Force use Bombers like B2 , F16,Sukhoi
etc.
8. Night vision device
A night vision device is an optical instrument
that allows images to be produced in levels of light
approaching total darkness.
They are most often used by the military and
law enforcement agencies.
9. Stealth Aircraft
Stealth aircraft are aircraft that use stealth
technology to avoid detection by employing a
combination of features to interfere with radar as well
as reduce visibility in the infrared, visual, audio , and
radio frequency(RF) spectrum.
10. Biometric Authentication
Biometric authentication refers to the
identification of humans by their characteristics or
traits.
Biometrics is the science and technology of
measuring and analyzing biological data. In
information technology, biometrics refers to
technologies that measure and analyze human
body characteristics, such as DNA, fingerprints,
eye retinas and irises, voice patterns, facial
patterns and hand measurements, for
authentication purposes.
11.
12. Defense communication system
Many pieces of military communications equipment are
built to encrypt and decode transmissions and survive rough
treatment in hostile climates. They use many frequencies to
send signals to other radios and to satellites.
Military communications involve all aspects of
communications, or conveyance of information, by armed
forces.
13. Firewall
Firewall
A firewall is a software program or piece of hardware that
helps screen out hackers, viruses, and worms that try to
reach your computer over the Internet.
14. Bionic Hornet
Defense Forces are drawing on the latest breakthroughs
in update their weapons.
No bigger than an average wasp, the flying device is
designed to seek out, follow, photograph and even kill
selected opponents.
15. Image processing
It is any form of signal processing for which the
input is an image, such as a photograph or video
frame.
The output of image processing may be either
an image or a set of characteristics or parameters
related to the image.
17. Cyber security
Crime committed using a computer and
the internet to steal a person’s identity or
illegal imports or malicious programs is
called cyber crime.
18. Types of cyber crime
Hacking
Child Pornography
Denial of service attack
Virus Dissemination
Computer vandalism
Cyber terrorism
Software privacy
19. How can we prevent these problems?
Privacy policy
Keep software up to date
Disable remote connectivity
21. Electromagnetic rail gun
Rail guns are of particular interest to the military,
as an alternative to current large artillery.
It is easy to transport and handle.
They use it frequently due to their high velocity.
22. Armour for military vehicles
Advanced Armour provides customised solutions for
protecting lightly skinned vehicles against improved
explosive devices.
Gunners are provided with outstanding degree of
protection if the vehicles is hit by multiple projectiles
and fragments.
23. Compact Kinetic Energy Missile(CKEM)
It is designed to defeat armoured and fortified
targets, including targets protected by explosive
reactive armour and active protection systems.
24. Global positioning system
GPS is one of the most rapidly growing
technologies around the world.
GPS is increasingly been adopted by private and
public enterprise to track and monitor humans for
location based service.