SlideShare a Scribd company logo
1 of 25
TECHNOLOGY FOR NATIONAL
SECURITY
WHAT IS TECHNOLOGY?
Technology is the making, usage and
knowledge of tools, machines, techniques,
system or methods of organisation in
order to solve a problem a specific
function.
Technology can be used for the protection
of national integrity and from enemies. Now
a days technology is used for National
security in the following ways.
For defence purpose.
To secure confidential or secret
Electronic Data’s.
For communication purpose.
For spying.
For tackling natural disasters.
Technology in defence sector
The defence sector uses all kinds of latest
technology for its day to day working.
 It ranges from computer servers to heat seeking
Missiles.
Heat seeking missile
IR is a type of electromagnetic radiation .
Adding heat to bodies tends to increase the
amount of IR .
As a result warmer bodies emit more IR.
Heat seekers track this output of IR and follow
its source.
The army uses ultra modern communication
and transport systems.
It also take use of helicopters to transport
food and weaponry.
Army uses night vision device for patrolling
around the border.
They also use helicopters and Unmanned Aria
Vehicles(UAV) for surveillance.
The Air Force use Bombers like B2 , F16,Sukhoi
etc.
Night vision device
A night vision device is an optical instrument
that allows images to be produced in levels of light
approaching total darkness.
They are most often used by the military and
law enforcement agencies.
Stealth Aircraft
Stealth aircraft are aircraft that use stealth
technology to avoid detection by employing a
combination of features to interfere with radar as well
as reduce visibility in the infrared, visual, audio , and
radio frequency(RF) spectrum.
Biometric Authentication
Biometric authentication refers to the
identification of humans by their characteristics or
traits.
Biometrics is the science and technology of
measuring and analyzing biological data. In
information technology, biometrics refers to
technologies that measure and analyze human
body characteristics, such as DNA, fingerprints,
eye retinas and irises, voice patterns, facial
patterns and hand measurements, for
authentication purposes.
Defense communication system
Many pieces of military communications equipment are
built to encrypt and decode transmissions and survive rough
treatment in hostile climates. They use many frequencies to
send signals to other radios and to satellites.
Military communications involve all aspects of
communications, or conveyance of information, by armed
forces.
Firewall
Firewall
A firewall is a software program or piece of hardware that
helps screen out hackers, viruses, and worms that try to
reach your computer over the Internet.
Bionic Hornet
Defense Forces are drawing on the latest breakthroughs
in update their weapons.
No bigger than an average wasp, the flying device is
designed to seek out, follow, photograph and even kill
selected opponents.
Image processing
It is any form of signal processing for which the
input is an image, such as a photograph or video
frame.
The output of image processing may be either
an image or a set of characteristics or parameters
related to the image.
Applications of image processing
Computer vision
Optical sorting
Augmented reality
Face detection
Feature detection
Medical image processing
Microscope image processing
Remote sensing
Cyber security
Crime committed using a computer and
the internet to steal a person’s identity or
illegal imports or malicious programs is
called cyber crime.
Types of cyber crime
Hacking
Child Pornography
Denial of service attack
Virus Dissemination
Computer vandalism
Cyber terrorism
Software privacy
How can we prevent these problems?
Privacy policy
Keep software up to date
Disable remote connectivity
Safety tips to cyber crime
•Use antivirus software’s
•Insert firewalls
•Uninstall unnecessary software
•Maintain backup
•Check security settings
Electromagnetic rail gun
Rail guns are of particular interest to the military,
as an alternative to current large artillery.
It is easy to transport and handle.
They use it frequently due to their high velocity.
Armour for military vehicles
Advanced Armour provides customised solutions for
protecting lightly skinned vehicles against improved
explosive devices.
Gunners are provided with outstanding degree of
protection if the vehicles is hit by multiple projectiles
and fragments.
Compact Kinetic Energy Missile(CKEM)
It is designed to defeat armoured and fortified
targets, including targets protected by explosive
reactive armour and active protection systems.
Global positioning system
GPS is one of the most rapidly growing
technologies around the world.
GPS is increasingly been adopted by private and
public enterprise to track and monitor humans for
location based service.
Technology for national security

More Related Content

What's hot

Intelligence Collection and Analysis
Intelligence Collection and AnalysisIntelligence Collection and Analysis
Intelligence Collection and Analysisatrantham
 
Ballistic missile defense system
Ballistic missile defense systemBallistic missile defense system
Ballistic missile defense systemMIT
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)Tughral Yamin
 
A Presentation About U.S. Hypersonic Weapons and Alternatives
A Presentation About U.S. Hypersonic Weapons and AlternativesA Presentation About U.S. Hypersonic Weapons and Alternatives
A Presentation About U.S. Hypersonic Weapons and AlternativesCongressional Budget Office
 
development of weapons
development of weaponsdevelopment of weapons
development of weaponsJerry Thomas
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect usLuis Borges Gouveia
 
No First Use’ policy of nuclear weapons
No First Use’ policy of nuclear weaponsNo First Use’ policy of nuclear weapons
No First Use’ policy of nuclear weaponsjatinvermaiasacademy
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national securityTalwant Singh
 
The Drone Wars: Warfare of the Future?
The Drone Wars: Warfare of the Future?The Drone Wars: Warfare of the Future?
The Drone Wars: Warfare of the Future?Norbert Schepers
 
Weapons of the war in Ukraine
Weapons of the war in UkraineWeapons of the war in Ukraine
Weapons of the war in Ukrainetsnua
 
War and Warfare - An Overview
War and Warfare - An Overview War and Warfare - An Overview
War and Warfare - An Overview Nilendra Kumar
 
Indian Armed Forces Perspective in the Background of Low Intensity Conflicts
Indian Armed Forces Perspective in the Background of Low Intensity ConflictsIndian Armed Forces Perspective in the Background of Low Intensity Conflicts
Indian Armed Forces Perspective in the Background of Low Intensity ConflictsNilendra Kumar
 
Unit #4 Nuclear Proliferation Student Version
Unit #4 Nuclear Proliferation Student VersionUnit #4 Nuclear Proliferation Student Version
Unit #4 Nuclear Proliferation Student VersionNick Allgyer
 
A Military Training Perspective - Technology and Trends
A Military Training Perspective - Technology and TrendsA Military Training Perspective - Technology and Trends
A Military Training Perspective - Technology and TrendsAndy Fawkes
 
Genocide and crime against humanity final
Genocide and crime against humanity finalGenocide and crime against humanity final
Genocide and crime against humanity finalPalak Agrawal
 

What's hot (20)

Intelligence Collection and Analysis
Intelligence Collection and AnalysisIntelligence Collection and Analysis
Intelligence Collection and Analysis
 
Ballistic missile defense system
Ballistic missile defense systemBallistic missile defense system
Ballistic missile defense system
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
A Presentation About U.S. Hypersonic Weapons and Alternatives
A Presentation About U.S. Hypersonic Weapons and AlternativesA Presentation About U.S. Hypersonic Weapons and Alternatives
A Presentation About U.S. Hypersonic Weapons and Alternatives
 
development of weapons
development of weaponsdevelopment of weapons
development of weapons
 
Ppt on terrorism
Ppt on terrorismPpt on terrorism
Ppt on terrorism
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect us
 
No First Use’ policy of nuclear weapons
No First Use’ policy of nuclear weaponsNo First Use’ policy of nuclear weapons
No First Use’ policy of nuclear weapons
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
 
CRPF
CRPFCRPF
CRPF
 
The Drone Wars: Warfare of the Future?
The Drone Wars: Warfare of the Future?The Drone Wars: Warfare of the Future?
The Drone Wars: Warfare of the Future?
 
Weapons of the war in Ukraine
Weapons of the war in UkraineWeapons of the war in Ukraine
Weapons of the war in Ukraine
 
Security Forces in India
Security Forces in IndiaSecurity Forces in India
Security Forces in India
 
Modern War lecture
Modern War lectureModern War lecture
Modern War lecture
 
War and Warfare - An Overview
War and Warfare - An Overview War and Warfare - An Overview
War and Warfare - An Overview
 
Indian Armed Forces Perspective in the Background of Low Intensity Conflicts
Indian Armed Forces Perspective in the Background of Low Intensity ConflictsIndian Armed Forces Perspective in the Background of Low Intensity Conflicts
Indian Armed Forces Perspective in the Background of Low Intensity Conflicts
 
Espionage
EspionageEspionage
Espionage
 
Unit #4 Nuclear Proliferation Student Version
Unit #4 Nuclear Proliferation Student VersionUnit #4 Nuclear Proliferation Student Version
Unit #4 Nuclear Proliferation Student Version
 
A Military Training Perspective - Technology and Trends
A Military Training Perspective - Technology and TrendsA Military Training Perspective - Technology and Trends
A Military Training Perspective - Technology and Trends
 
Genocide and crime against humanity final
Genocide and crime against humanity finalGenocide and crime against humanity final
Genocide and crime against humanity final
 

Similar to Technology for national security

Navigating the Challenges in Telecom Industry with Drones
Navigating the Challenges in Telecom Industry with DronesNavigating the Challenges in Telecom Industry with Drones
Navigating the Challenges in Telecom Industry with DronesNovoQuad
 
Mobile Device Protection Using Sensors
Mobile Device Protection Using SensorsMobile Device Protection Using Sensors
Mobile Device Protection Using SensorsEditor IJCATR
 
Anti-UAV Solutions for Manufacturing Plants
Anti-UAV Solutions for Manufacturing PlantsAnti-UAV Solutions for Manufacturing Plants
Anti-UAV Solutions for Manufacturing PlantsNovoQuad
 
Upsides of Anti-Drone Technology
Upsides of Anti-Drone TechnologyUpsides of Anti-Drone Technology
Upsides of Anti-Drone TechnologyNovoQuad
 
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSectorGUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSectorIRJET Journal
 
Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Dr. Idris Ahmed
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Harsh Bhanushali
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Safeguarding the Skies: How to Detect Drones in the Air?
Safeguarding the Skies: How to Detect Drones in the Air?Safeguarding the Skies: How to Detect Drones in the Air?
Safeguarding the Skies: How to Detect Drones in the Air?NovoQuad
 
The Need for Anti-Drone Systems for Law Enforcement and Security Teams.pdf
The Need for Anti-Drone Systems for Law Enforcement and Security Teams.pdfThe Need for Anti-Drone Systems for Law Enforcement and Security Teams.pdf
The Need for Anti-Drone Systems for Law Enforcement and Security Teams.pdfNovoQuad
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017Riaan Bellingan
 
Innovative Surveillance_ The Rising Impact of Security Robot Services.pdf
Innovative Surveillance_ The Rising Impact of Security Robot Services.pdfInnovative Surveillance_ The Rising Impact of Security Robot Services.pdf
Innovative Surveillance_ The Rising Impact of Security Robot Services.pdfnuwatt966
 
Unmanned aerial vehicle smart device ground control station cyber security th...
Unmanned aerial vehicle smart device ground control station cyber security th...Unmanned aerial vehicle smart device ground control station cyber security th...
Unmanned aerial vehicle smart device ground control station cyber security th...Steph Cliche
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdfahmed53254
 
Counter Drone Systems Market 2022-2032 - Aviation and Defense Market Reports
Counter Drone Systems Market 2022-2032 - Aviation and Defense Market ReportsCounter Drone Systems Market 2022-2032 - Aviation and Defense Market Reports
Counter Drone Systems Market 2022-2032 - Aviation and Defense Market ReportsDefense Report
 
Understanding the Functionalities of the Anti-Drone Systems.pdf
Understanding the Functionalities of the Anti-Drone Systems.pdfUnderstanding the Functionalities of the Anti-Drone Systems.pdf
Understanding the Functionalities of the Anti-Drone Systems.pdfNovoQuad
 
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...IRJET Journal
 
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...IRJET Journal
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityIJRES Journal
 
Beyond the Visible: The Techniques for Detecting Stealthy Drones
Beyond the Visible: The Techniques for Detecting Stealthy DronesBeyond the Visible: The Techniques for Detecting Stealthy Drones
Beyond the Visible: The Techniques for Detecting Stealthy DronesNovoQuad
 

Similar to Technology for national security (20)

Navigating the Challenges in Telecom Industry with Drones
Navigating the Challenges in Telecom Industry with DronesNavigating the Challenges in Telecom Industry with Drones
Navigating the Challenges in Telecom Industry with Drones
 
Mobile Device Protection Using Sensors
Mobile Device Protection Using SensorsMobile Device Protection Using Sensors
Mobile Device Protection Using Sensors
 
Anti-UAV Solutions for Manufacturing Plants
Anti-UAV Solutions for Manufacturing PlantsAnti-UAV Solutions for Manufacturing Plants
Anti-UAV Solutions for Manufacturing Plants
 
Upsides of Anti-Drone Technology
Upsides of Anti-Drone TechnologyUpsides of Anti-Drone Technology
Upsides of Anti-Drone Technology
 
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSectorGUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
 
Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Safeguarding the Skies: How to Detect Drones in the Air?
Safeguarding the Skies: How to Detect Drones in the Air?Safeguarding the Skies: How to Detect Drones in the Air?
Safeguarding the Skies: How to Detect Drones in the Air?
 
The Need for Anti-Drone Systems for Law Enforcement and Security Teams.pdf
The Need for Anti-Drone Systems for Law Enforcement and Security Teams.pdfThe Need for Anti-Drone Systems for Law Enforcement and Security Teams.pdf
The Need for Anti-Drone Systems for Law Enforcement and Security Teams.pdf
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017
 
Innovative Surveillance_ The Rising Impact of Security Robot Services.pdf
Innovative Surveillance_ The Rising Impact of Security Robot Services.pdfInnovative Surveillance_ The Rising Impact of Security Robot Services.pdf
Innovative Surveillance_ The Rising Impact of Security Robot Services.pdf
 
Unmanned aerial vehicle smart device ground control station cyber security th...
Unmanned aerial vehicle smart device ground control station cyber security th...Unmanned aerial vehicle smart device ground control station cyber security th...
Unmanned aerial vehicle smart device ground control station cyber security th...
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Counter Drone Systems Market 2022-2032 - Aviation and Defense Market Reports
Counter Drone Systems Market 2022-2032 - Aviation and Defense Market ReportsCounter Drone Systems Market 2022-2032 - Aviation and Defense Market Reports
Counter Drone Systems Market 2022-2032 - Aviation and Defense Market Reports
 
Understanding the Functionalities of the Anti-Drone Systems.pdf
Understanding the Functionalities of the Anti-Drone Systems.pdfUnderstanding the Functionalities of the Anti-Drone Systems.pdf
Understanding the Functionalities of the Anti-Drone Systems.pdf
 
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
 
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network Security
 
Beyond the Visible: The Techniques for Detecting Stealthy Drones
Beyond the Visible: The Techniques for Detecting Stealthy DronesBeyond the Visible: The Techniques for Detecting Stealthy Drones
Beyond the Visible: The Techniques for Detecting Stealthy Drones
 

Recently uploaded

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Technology for national security

  • 2. WHAT IS TECHNOLOGY? Technology is the making, usage and knowledge of tools, machines, techniques, system or methods of organisation in order to solve a problem a specific function.
  • 3. Technology can be used for the protection of national integrity and from enemies. Now a days technology is used for National security in the following ways. For defence purpose. To secure confidential or secret Electronic Data’s. For communication purpose. For spying. For tackling natural disasters.
  • 4. Technology in defence sector The defence sector uses all kinds of latest technology for its day to day working.  It ranges from computer servers to heat seeking Missiles.
  • 5. Heat seeking missile IR is a type of electromagnetic radiation . Adding heat to bodies tends to increase the amount of IR . As a result warmer bodies emit more IR. Heat seekers track this output of IR and follow its source.
  • 6. The army uses ultra modern communication and transport systems. It also take use of helicopters to transport food and weaponry.
  • 7. Army uses night vision device for patrolling around the border. They also use helicopters and Unmanned Aria Vehicles(UAV) for surveillance. The Air Force use Bombers like B2 , F16,Sukhoi etc.
  • 8. Night vision device A night vision device is an optical instrument that allows images to be produced in levels of light approaching total darkness. They are most often used by the military and law enforcement agencies.
  • 9. Stealth Aircraft Stealth aircraft are aircraft that use stealth technology to avoid detection by employing a combination of features to interfere with radar as well as reduce visibility in the infrared, visual, audio , and radio frequency(RF) spectrum.
  • 10. Biometric Authentication Biometric authentication refers to the identification of humans by their characteristics or traits. Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.
  • 11.
  • 12. Defense communication system Many pieces of military communications equipment are built to encrypt and decode transmissions and survive rough treatment in hostile climates. They use many frequencies to send signals to other radios and to satellites. Military communications involve all aspects of communications, or conveyance of information, by armed forces.
  • 13. Firewall Firewall A firewall is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet.
  • 14. Bionic Hornet Defense Forces are drawing on the latest breakthroughs in update their weapons. No bigger than an average wasp, the flying device is designed to seek out, follow, photograph and even kill selected opponents.
  • 15. Image processing It is any form of signal processing for which the input is an image, such as a photograph or video frame. The output of image processing may be either an image or a set of characteristics or parameters related to the image.
  • 16. Applications of image processing Computer vision Optical sorting Augmented reality Face detection Feature detection Medical image processing Microscope image processing Remote sensing
  • 17. Cyber security Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs is called cyber crime.
  • 18. Types of cyber crime Hacking Child Pornography Denial of service attack Virus Dissemination Computer vandalism Cyber terrorism Software privacy
  • 19. How can we prevent these problems? Privacy policy Keep software up to date Disable remote connectivity
  • 20. Safety tips to cyber crime •Use antivirus software’s •Insert firewalls •Uninstall unnecessary software •Maintain backup •Check security settings
  • 21. Electromagnetic rail gun Rail guns are of particular interest to the military, as an alternative to current large artillery. It is easy to transport and handle. They use it frequently due to their high velocity.
  • 22. Armour for military vehicles Advanced Armour provides customised solutions for protecting lightly skinned vehicles against improved explosive devices. Gunners are provided with outstanding degree of protection if the vehicles is hit by multiple projectiles and fragments.
  • 23. Compact Kinetic Energy Missile(CKEM) It is designed to defeat armoured and fortified targets, including targets protected by explosive reactive armour and active protection systems.
  • 24. Global positioning system GPS is one of the most rapidly growing technologies around the world. GPS is increasingly been adopted by private and public enterprise to track and monitor humans for location based service.