SlideShare a Scribd company logo
TECHNOLOGY FOR NATIONAL
SECURITY
WHAT IS TECHNOLOGY?
Technology is the making, usage and
knowledge of tools, machines, techniques,
system or methods of organisation in
order to solve a problem a specific
function.
Technology can be used for the protection
of national integrity and from enemies. Now
a days technology is used for National
security in the following ways.
For defence purpose.
To secure confidential or secret
Electronic Data’s.
For communication purpose.
For spying.
For tackling natural disasters.
Technology in defence sector
The defence sector uses all kinds of latest
technology for its day to day working.
 It ranges from computer servers to heat seeking
Missiles.
Heat seeking missile
IR is a type of electromagnetic radiation .
Adding heat to bodies tends to increase the
amount of IR .
As a result warmer bodies emit more IR.
Heat seekers track this output of IR and follow
its source.
The army uses ultra modern communication
and transport systems.
It also take use of helicopters to transport
food and weaponry.
Army uses night vision device for patrolling
around the border.
They also use helicopters and Unmanned Aria
Vehicles(UAV) for surveillance.
The Air Force use Bombers like B2 , F16,Sukhoi
etc.
Night vision device
A night vision device is an optical instrument
that allows images to be produced in levels of light
approaching total darkness.
They are most often used by the military and
law enforcement agencies.
Stealth Aircraft
Stealth aircraft are aircraft that use stealth
technology to avoid detection by employing a
combination of features to interfere with radar as well
as reduce visibility in the infrared, visual, audio , and
radio frequency(RF) spectrum.
Biometric Authentication
Biometric authentication refers to the
identification of humans by their characteristics or
traits.
Biometrics is the science and technology of
measuring and analyzing biological data. In
information technology, biometrics refers to
technologies that measure and analyze human
body characteristics, such as DNA, fingerprints,
eye retinas and irises, voice patterns, facial
patterns and hand measurements, for
authentication purposes.
Defense communication system
Many pieces of military communications equipment are
built to encrypt and decode transmissions and survive rough
treatment in hostile climates. They use many frequencies to
send signals to other radios and to satellites.
Military communications involve all aspects of
communications, or conveyance of information, by armed
forces.
Firewall
Firewall
A firewall is a software program or piece of hardware that
helps screen out hackers, viruses, and worms that try to
reach your computer over the Internet.
Bionic Hornet
Defense Forces are drawing on the latest breakthroughs
in update their weapons.
No bigger than an average wasp, the flying device is
designed to seek out, follow, photograph and even kill
selected opponents.
Image processing
It is any form of signal processing for which the
input is an image, such as a photograph or video
frame.
The output of image processing may be either
an image or a set of characteristics or parameters
related to the image.
Applications of image processing
Computer vision
Optical sorting
Augmented reality
Face detection
Feature detection
Medical image processing
Microscope image processing
Remote sensing
Cyber security
Crime committed using a computer and
the internet to steal a person’s identity or
illegal imports or malicious programs is
called cyber crime.
Types of cyber crime
Hacking
Child Pornography
Denial of service attack
Virus Dissemination
Computer vandalism
Cyber terrorism
Software privacy
How can we prevent these problems?
Privacy policy
Keep software up to date
Disable remote connectivity
Safety tips to cyber crime
•Use antivirus software’s
•Insert firewalls
•Uninstall unnecessary software
•Maintain backup
•Check security settings
Electromagnetic rail gun
Rail guns are of particular interest to the military,
as an alternative to current large artillery.
It is easy to transport and handle.
They use it frequently due to their high velocity.
Armour for military vehicles
Advanced Armour provides customised solutions for
protecting lightly skinned vehicles against improved
explosive devices.
Gunners are provided with outstanding degree of
protection if the vehicles is hit by multiple projectiles
and fragments.
Compact Kinetic Energy Missile(CKEM)
It is designed to defeat armoured and fortified
targets, including targets protected by explosive
reactive armour and active protection systems.
Global positioning system
GPS is one of the most rapidly growing
technologies around the world.
GPS is increasingly been adopted by private and
public enterprise to track and monitor humans for
location based service.
Technology for national security

More Related Content

What's hot

Border security: a physical and digital challenge
Border security: a physical and digital challengeBorder security: a physical and digital challenge
Border security: a physical and digital challenge
Leonardo
 
Drones
DronesDrones
Drones
vsinha12
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
dibyendupaul
 
National Security & National Interests – Implications
National Security & National Interests – ImplicationsNational Security & National Interests – Implications
National Security & National Interests – Implications
rajaram.muthukrishnan
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)Tughral Yamin
 
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trends
Hadeel Sadiq Obaid
 
Terrorism
TerrorismTerrorism
Terrorism
Grant Heller
 
Drones
DronesDrones
Drones
deep4deepak
 
Cyber Warfare 4TH edition
Cyber Warfare 4TH editionCyber Warfare 4TH edition
Cyber Warfare 4TH edition
Jorge Sebastiao
 
Drone Insights 2021, and its Impact on other sectors in India
Drone Insights 2021, and its Impact on other sectors in IndiaDrone Insights 2021, and its Impact on other sectors in India
Drone Insights 2021, and its Impact on other sectors in India
Kaushik Biswas
 
Drone-Unmanned Aerial Vehicle
Drone-Unmanned Aerial VehicleDrone-Unmanned Aerial Vehicle
Drone-Unmanned Aerial Vehicle
shivu1234
 
Information security
Information securityInformation security
Information security
Sina Bagherinezhad
 
Drones (UAV)
Drones (UAV)Drones (UAV)
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectors
Love Steven
 
Using Drones For Aerial Imagery
Using Drones For Aerial ImageryUsing Drones For Aerial Imagery
Using Drones For Aerial ImagerySimon Handley
 
Drone tutorial
Drone tutorialDrone tutorial
Drone tutorial
saad20132
 
Drones
DronesDrones
Swarming drones
Swarming dronesSwarming drones
Swarming drones
Antonio Luca Alfeo
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
KaustubhPathak11
 

What's hot (20)

Border security: a physical and digital challenge
Border security: a physical and digital challengeBorder security: a physical and digital challenge
Border security: a physical and digital challenge
 
Drones
DronesDrones
Drones
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
 
stealth technology
stealth technologystealth technology
stealth technology
 
National Security & National Interests – Implications
National Security & National Interests – ImplicationsNational Security & National Interests – Implications
National Security & National Interests – Implications
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trends
 
Terrorism
TerrorismTerrorism
Terrorism
 
Drones
DronesDrones
Drones
 
Cyber Warfare 4TH edition
Cyber Warfare 4TH editionCyber Warfare 4TH edition
Cyber Warfare 4TH edition
 
Drone Insights 2021, and its Impact on other sectors in India
Drone Insights 2021, and its Impact on other sectors in IndiaDrone Insights 2021, and its Impact on other sectors in India
Drone Insights 2021, and its Impact on other sectors in India
 
Drone-Unmanned Aerial Vehicle
Drone-Unmanned Aerial VehicleDrone-Unmanned Aerial Vehicle
Drone-Unmanned Aerial Vehicle
 
Information security
Information securityInformation security
Information security
 
Drones (UAV)
Drones (UAV)Drones (UAV)
Drones (UAV)
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectors
 
Using Drones For Aerial Imagery
Using Drones For Aerial ImageryUsing Drones For Aerial Imagery
Using Drones For Aerial Imagery
 
Drone tutorial
Drone tutorialDrone tutorial
Drone tutorial
 
Drones
DronesDrones
Drones
 
Swarming drones
Swarming dronesSwarming drones
Swarming drones
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Similar to Technology for national security

Navigating the Challenges in Telecom Industry with Drones
Navigating the Challenges in Telecom Industry with DronesNavigating the Challenges in Telecom Industry with Drones
Navigating the Challenges in Telecom Industry with Drones
NovoQuad
 
Mobile Device Protection Using Sensors
Mobile Device Protection Using SensorsMobile Device Protection Using Sensors
Mobile Device Protection Using Sensors
Editor IJCATR
 
Anti-UAV Solutions for Manufacturing Plants
Anti-UAV Solutions for Manufacturing PlantsAnti-UAV Solutions for Manufacturing Plants
Anti-UAV Solutions for Manufacturing Plants
NovoQuad
 
Upsides of Anti-Drone Technology
Upsides of Anti-Drone TechnologyUpsides of Anti-Drone Technology
Upsides of Anti-Drone Technology
NovoQuad
 
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSectorGUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
IRJET Journal
 
Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014
Dr. Idris Ahmed
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
Harsh Bhanushali
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
MiltonBiswas8
 
Safeguarding the Skies: How to Detect Drones in the Air?
Safeguarding the Skies: How to Detect Drones in the Air?Safeguarding the Skies: How to Detect Drones in the Air?
Safeguarding the Skies: How to Detect Drones in the Air?
NovoQuad
 
The Need for Anti-Drone Systems for Law Enforcement and Security Teams.pdf
The Need for Anti-Drone Systems for Law Enforcement and Security Teams.pdfThe Need for Anti-Drone Systems for Law Enforcement and Security Teams.pdf
The Need for Anti-Drone Systems for Law Enforcement and Security Teams.pdf
NovoQuad
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017
Riaan Bellingan
 
Innovative Surveillance_ The Rising Impact of Security Robot Services.pdf
Innovative Surveillance_ The Rising Impact of Security Robot Services.pdfInnovative Surveillance_ The Rising Impact of Security Robot Services.pdf
Innovative Surveillance_ The Rising Impact of Security Robot Services.pdf
nuwatt966
 
Unmanned aerial vehicle smart device ground control station cyber security th...
Unmanned aerial vehicle smart device ground control station cyber security th...Unmanned aerial vehicle smart device ground control station cyber security th...
Unmanned aerial vehicle smart device ground control station cyber security th...Steph Cliche
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
ahmed53254
 
Counter Drone Systems Market 2022-2032 - Aviation and Defense Market Reports
Counter Drone Systems Market 2022-2032 - Aviation and Defense Market ReportsCounter Drone Systems Market 2022-2032 - Aviation and Defense Market Reports
Counter Drone Systems Market 2022-2032 - Aviation and Defense Market Reports
Defense Report
 
Understanding the Functionalities of the Anti-Drone Systems.pdf
Understanding the Functionalities of the Anti-Drone Systems.pdfUnderstanding the Functionalities of the Anti-Drone Systems.pdf
Understanding the Functionalities of the Anti-Drone Systems.pdf
NovoQuad
 
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
IRJET Journal
 
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
IRJET Journal
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network Security
IJRES Journal
 
Beyond the Visible: The Techniques for Detecting Stealthy Drones
Beyond the Visible: The Techniques for Detecting Stealthy DronesBeyond the Visible: The Techniques for Detecting Stealthy Drones
Beyond the Visible: The Techniques for Detecting Stealthy Drones
NovoQuad
 

Similar to Technology for national security (20)

Navigating the Challenges in Telecom Industry with Drones
Navigating the Challenges in Telecom Industry with DronesNavigating the Challenges in Telecom Industry with Drones
Navigating the Challenges in Telecom Industry with Drones
 
Mobile Device Protection Using Sensors
Mobile Device Protection Using SensorsMobile Device Protection Using Sensors
Mobile Device Protection Using Sensors
 
Anti-UAV Solutions for Manufacturing Plants
Anti-UAV Solutions for Manufacturing PlantsAnti-UAV Solutions for Manufacturing Plants
Anti-UAV Solutions for Manufacturing Plants
 
Upsides of Anti-Drone Technology
Upsides of Anti-Drone TechnologyUpsides of Anti-Drone Technology
Upsides of Anti-Drone Technology
 
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSectorGUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
 
Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Safeguarding the Skies: How to Detect Drones in the Air?
Safeguarding the Skies: How to Detect Drones in the Air?Safeguarding the Skies: How to Detect Drones in the Air?
Safeguarding the Skies: How to Detect Drones in the Air?
 
The Need for Anti-Drone Systems for Law Enforcement and Security Teams.pdf
The Need for Anti-Drone Systems for Law Enforcement and Security Teams.pdfThe Need for Anti-Drone Systems for Law Enforcement and Security Teams.pdf
The Need for Anti-Drone Systems for Law Enforcement and Security Teams.pdf
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017
 
Innovative Surveillance_ The Rising Impact of Security Robot Services.pdf
Innovative Surveillance_ The Rising Impact of Security Robot Services.pdfInnovative Surveillance_ The Rising Impact of Security Robot Services.pdf
Innovative Surveillance_ The Rising Impact of Security Robot Services.pdf
 
Unmanned aerial vehicle smart device ground control station cyber security th...
Unmanned aerial vehicle smart device ground control station cyber security th...Unmanned aerial vehicle smart device ground control station cyber security th...
Unmanned aerial vehicle smart device ground control station cyber security th...
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Counter Drone Systems Market 2022-2032 - Aviation and Defense Market Reports
Counter Drone Systems Market 2022-2032 - Aviation and Defense Market ReportsCounter Drone Systems Market 2022-2032 - Aviation and Defense Market Reports
Counter Drone Systems Market 2022-2032 - Aviation and Defense Market Reports
 
Understanding the Functionalities of the Anti-Drone Systems.pdf
Understanding the Functionalities of the Anti-Drone Systems.pdfUnderstanding the Functionalities of the Anti-Drone Systems.pdf
Understanding the Functionalities of the Anti-Drone Systems.pdf
 
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
 
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network Security
 
Beyond the Visible: The Techniques for Detecting Stealthy Drones
Beyond the Visible: The Techniques for Detecting Stealthy DronesBeyond the Visible: The Techniques for Detecting Stealthy Drones
Beyond the Visible: The Techniques for Detecting Stealthy Drones
 

Recently uploaded

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 

Recently uploaded (20)

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 

Technology for national security

  • 2. WHAT IS TECHNOLOGY? Technology is the making, usage and knowledge of tools, machines, techniques, system or methods of organisation in order to solve a problem a specific function.
  • 3. Technology can be used for the protection of national integrity and from enemies. Now a days technology is used for National security in the following ways. For defence purpose. To secure confidential or secret Electronic Data’s. For communication purpose. For spying. For tackling natural disasters.
  • 4. Technology in defence sector The defence sector uses all kinds of latest technology for its day to day working.  It ranges from computer servers to heat seeking Missiles.
  • 5. Heat seeking missile IR is a type of electromagnetic radiation . Adding heat to bodies tends to increase the amount of IR . As a result warmer bodies emit more IR. Heat seekers track this output of IR and follow its source.
  • 6. The army uses ultra modern communication and transport systems. It also take use of helicopters to transport food and weaponry.
  • 7. Army uses night vision device for patrolling around the border. They also use helicopters and Unmanned Aria Vehicles(UAV) for surveillance. The Air Force use Bombers like B2 , F16,Sukhoi etc.
  • 8. Night vision device A night vision device is an optical instrument that allows images to be produced in levels of light approaching total darkness. They are most often used by the military and law enforcement agencies.
  • 9. Stealth Aircraft Stealth aircraft are aircraft that use stealth technology to avoid detection by employing a combination of features to interfere with radar as well as reduce visibility in the infrared, visual, audio , and radio frequency(RF) spectrum.
  • 10. Biometric Authentication Biometric authentication refers to the identification of humans by their characteristics or traits. Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.
  • 11.
  • 12. Defense communication system Many pieces of military communications equipment are built to encrypt and decode transmissions and survive rough treatment in hostile climates. They use many frequencies to send signals to other radios and to satellites. Military communications involve all aspects of communications, or conveyance of information, by armed forces.
  • 13. Firewall Firewall A firewall is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet.
  • 14. Bionic Hornet Defense Forces are drawing on the latest breakthroughs in update their weapons. No bigger than an average wasp, the flying device is designed to seek out, follow, photograph and even kill selected opponents.
  • 15. Image processing It is any form of signal processing for which the input is an image, such as a photograph or video frame. The output of image processing may be either an image or a set of characteristics or parameters related to the image.
  • 16. Applications of image processing Computer vision Optical sorting Augmented reality Face detection Feature detection Medical image processing Microscope image processing Remote sensing
  • 17. Cyber security Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs is called cyber crime.
  • 18. Types of cyber crime Hacking Child Pornography Denial of service attack Virus Dissemination Computer vandalism Cyber terrorism Software privacy
  • 19. How can we prevent these problems? Privacy policy Keep software up to date Disable remote connectivity
  • 20. Safety tips to cyber crime •Use antivirus software’s •Insert firewalls •Uninstall unnecessary software •Maintain backup •Check security settings
  • 21. Electromagnetic rail gun Rail guns are of particular interest to the military, as an alternative to current large artillery. It is easy to transport and handle. They use it frequently due to their high velocity.
  • 22. Armour for military vehicles Advanced Armour provides customised solutions for protecting lightly skinned vehicles against improved explosive devices. Gunners are provided with outstanding degree of protection if the vehicles is hit by multiple projectiles and fragments.
  • 23. Compact Kinetic Energy Missile(CKEM) It is designed to defeat armoured and fortified targets, including targets protected by explosive reactive armour and active protection systems.
  • 24. Global positioning system GPS is one of the most rapidly growing technologies around the world. GPS is increasingly been adopted by private and public enterprise to track and monitor humans for location based service.