SlideShare a Scribd company logo
1 of 8
technology is largely
misused to destroy the
world
Presented By:- Presented To:-
Sanket Gandhi Ms. Sakshi Arora
Introduction
• the application of scientific knowledge for practical purposes, especially in industry.
• machinery and devices developed from scientific knowledge.
• the branch of knowledge dealing with engineering or applied sciences.
Origin:-
tekhn
tekhnologia
Logia technology
logy
Technology for weapons
• Scientific technology is rising at a rapid rate constantly developing and
changing.
• From vehicles to weapons, every thing is advancing in todays world.
• Let’s have a look on top 10 weapons which exists till date.
Advanced Weapons
• Rocket Propelled Grenade (RPG)
• DSR-50 (.50 Cal sniper rifle)
• Flamethrower
• Schwerer Gustav
• Nimitz class aircraft carrier
• Chimera Virus
• Russia’s Aviation Thermobaric Bomb of Increased Power
• Intercontinental Ballistic Missile (ICBM)
• Multiple independently targetable re-entry vehicle (MIRV)
• Tsar Bomba
Hiroshima and Nagasaki
• 2 atomic bombs detonated by the U.S. near the end of second world
war on 6th and 9th August 1945.
• The “Little Boy” and “Fat Man” collectively killed 129,000 people.
• These were the only actual use of nuclear weapons in the history of
warfare.
Cyber Destruction
• The technology has developed at a drastic rate especially in cyber
environment.
• Use of mobile phones, computers have increased at a drastic level
within the past decade especially internet.
• All are vital stuff is being done on-line. Even our banking is online.
• Therefore the threat of cyber terrorism increases.
List of Cyber attacks
• Indiscriminate attack: wanna cry ransomware attack- May 2017
• Destructive attack: Great hacker war (cyber gang war)
• Cyberwarfare: Operation Olympic games (Israeli nuclear facilities
conducted by US)
• Government/ Corporate espionage: Shadow Network (India by China),
Sony pictures entertainment attack
• Stolen e-mail addresses and login credentials: 2011 PlayStation network
outage
• Stolen credit card and financial data: 2016 Indian banks data breach
• Stolen medical-related data: Anthem, Premera Blue Cross, CareFirst.
THANK
YOU

More Related Content

Similar to Technology is largely misused to destroy the world

Chapter 10, part 2
Chapter 10, part 2Chapter 10, part 2
Chapter 10, part 2
misecho
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
ArjunKumar684595
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
Umang Patel
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 

Similar to Technology is largely misused to destroy the world (20)

Chapter 10, part 2
Chapter 10, part 2Chapter 10, part 2
Chapter 10, part 2
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
IT Quiz MES
IT Quiz MESIT Quiz MES
IT Quiz MES
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Assessing the risks of AI catastrophe - presentation given by David Wood on 1...
Assessing the risks of AI catastrophe - presentation given by David Wood on 1...Assessing the risks of AI catastrophe - presentation given by David Wood on 1...
Assessing the risks of AI catastrophe - presentation given by David Wood on 1...
 
A Training & Simulation Perspective on Maritime Information & Automation
A Training & Simulation Perspective on Maritime Information & AutomationA Training & Simulation Perspective on Maritime Information & Automation
A Training & Simulation Perspective on Maritime Information & Automation
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Computer games intro
Computer games introComputer games intro
Computer games intro
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Cyberware
CyberwareCyberware
Cyberware
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack Stratagems
 
Types & Shapes of Future Wars.pptx
Types & Shapes of Future Wars.pptxTypes & Shapes of Future Wars.pptx
Types & Shapes of Future Wars.pptx
 
Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare  hacking al-qaida and terrorismCe hv6 module 43 cyber warfare  hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 

More from Sanket Gandhi (6)

Project communications management
Project communications managementProject communications management
Project communications management
 
Bolgs and blogging
Bolgs and bloggingBolgs and blogging
Bolgs and blogging
 
Alibaba.com
Alibaba.comAlibaba.com
Alibaba.com
 
Cell phone Etiquette
Cell phone EtiquetteCell phone Etiquette
Cell phone Etiquette
 
communication skills
communication skillscommunication skills
communication skills
 
Rolls Royce
Rolls Royce Rolls Royce
Rolls Royce
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Technology is largely misused to destroy the world

  • 1. technology is largely misused to destroy the world Presented By:- Presented To:- Sanket Gandhi Ms. Sakshi Arora
  • 2. Introduction • the application of scientific knowledge for practical purposes, especially in industry. • machinery and devices developed from scientific knowledge. • the branch of knowledge dealing with engineering or applied sciences. Origin:- tekhn tekhnologia Logia technology logy
  • 3. Technology for weapons • Scientific technology is rising at a rapid rate constantly developing and changing. • From vehicles to weapons, every thing is advancing in todays world. • Let’s have a look on top 10 weapons which exists till date.
  • 4. Advanced Weapons • Rocket Propelled Grenade (RPG) • DSR-50 (.50 Cal sniper rifle) • Flamethrower • Schwerer Gustav • Nimitz class aircraft carrier • Chimera Virus • Russia’s Aviation Thermobaric Bomb of Increased Power • Intercontinental Ballistic Missile (ICBM) • Multiple independently targetable re-entry vehicle (MIRV) • Tsar Bomba
  • 5. Hiroshima and Nagasaki • 2 atomic bombs detonated by the U.S. near the end of second world war on 6th and 9th August 1945. • The “Little Boy” and “Fat Man” collectively killed 129,000 people. • These were the only actual use of nuclear weapons in the history of warfare.
  • 6. Cyber Destruction • The technology has developed at a drastic rate especially in cyber environment. • Use of mobile phones, computers have increased at a drastic level within the past decade especially internet. • All are vital stuff is being done on-line. Even our banking is online. • Therefore the threat of cyber terrorism increases.
  • 7. List of Cyber attacks • Indiscriminate attack: wanna cry ransomware attack- May 2017 • Destructive attack: Great hacker war (cyber gang war) • Cyberwarfare: Operation Olympic games (Israeli nuclear facilities conducted by US) • Government/ Corporate espionage: Shadow Network (India by China), Sony pictures entertainment attack • Stolen e-mail addresses and login credentials: 2011 PlayStation network outage • Stolen credit card and financial data: 2016 Indian banks data breach • Stolen medical-related data: Anthem, Premera Blue Cross, CareFirst.