Top Banner
TECHNOLOGY FOR NATIONAL SECURITY
25
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Technology for national security

TECHNOLOGY FOR NATIONAL SECURITY

Page 2: Technology for national security

WHAT IS TECHNOLOGY?

Technology is the making, usage and knowledge of tools, machines, techniques, system or methods of organisation in order to solve a problem a specific function.

Page 3: Technology for national security

Technology can be used for the protection of national integrity and from enemies. Now

a days technology is used for National security in the following ways.

For defence purpose.

To secure confidential or secret Electronic Data’s.

For communication purpose.

For spying.

For tackling natural disasters.

Page 4: Technology for national security

Technology in defence sector

The defence sector uses all kinds of latest technology for its day to day working. It ranges from computer servers to heat seeking Missiles.

Page 5: Technology for national security

Heat seeking missile

IR is a type of electromagnetic radiation .Adding heat to bodies tends to increase the amount of IR .As a result warmer bodies emit more IR.Heat seekers track this output of IR and follow its source.

Page 6: Technology for national security

The army uses ultra modern communication and transport systems.It also take use of helicopters to transport food and weaponry.

Page 7: Technology for national security

Army uses night vision device for patrolling around the border.They also use helicopters and Unmanned AriaVehicles(UAV) for surveillance.The Air Force use Bombers like B2 , F16,Sukhoi etc.

Page 8: Technology for national security

Night vision device

A night vision device is an optical instrument that allows images to be produced in levels of light approaching total darkness.They are most often used by the military and law enforcement agencies.

Page 9: Technology for national security

Stealth Aircraft

Stealth aircraft are aircraft that use stealth technology to avoid detection by employing a combination of features to interfere with radar as well as reduce visibility in the infrared, visual, audio , and radio frequency(RF) spectrum.

Page 10: Technology for national security

Biometric Authentication

Biometric authentication refers to the identification of humans by their characteristics or traits.

Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.

Page 11: Technology for national security
Page 12: Technology for national security

Defense communication system

Many pieces of military communications equipment are built to encrypt and decode transmissions and survive rough treatment in hostile climates. They use many frequencies to send signals to other radios and to satellites.Military communications involve all aspects of communications, or conveyance of information, by armed forces.

Page 13: Technology for national security

Firewall

Firewall

A firewall is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet.

Page 14: Technology for national security

Bionic Hornet

Defense Forces are drawing on the latest breakthroughs in update their weapons.No bigger than an average wasp, the flying device is designed to seek out, follow, photograph and even kill selected opponents.

Page 15: Technology for national security

Image processing

It is any form of signal processing for which the input is an image, such as a photograph or video frame.The output of image processing may be either an image or a set of characteristics or parameters related to the image.

Page 16: Technology for national security

Applications of image processing

Computer visionOptical sortingAugmented realityFace detectionFeature detectionMedical image processingMicroscope image processingRemote sensing

Page 17: Technology for national security

Cyber security

Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs is called cyber crime.

Page 18: Technology for national security

Types of cyber crime

HackingChild PornographyDenial of service attackVirus DisseminationComputer vandalismCyber terrorismSoftware privacy

Page 19: Technology for national security

How can we prevent these problems?

Privacy policyKeep software up to dateDisable remote connectivity

Page 20: Technology for national security

Safety tips to cyber crime

•Use antivirus software’s•Insert firewalls•Uninstall unnecessary software•Maintain backup•Check security settings

Page 21: Technology for national security

Electromagnetic rail gun

Rail guns are of particular interest to the military, as an alternative to current large artillery.It is easy to transport and handle.They use it frequently due to their high velocity.

Page 22: Technology for national security

Armour for military vehicles

Advanced Armour provides customised solutions for protecting lightly skinned vehicles against improved explosive devices.Gunners are provided with outstanding degree of protection if the vehicles is hit by multiple projectiles and fragments.

Page 23: Technology for national security

Compact Kinetic Energy Missile(CKEM)

It is designed to defeat armoured and fortified targets, including targets protected by explosive reactive armour and active protection systems.

Page 24: Technology for national security

Global positioning system

GPS is one of the most rapidly growing technologies around the world.GPS is increasingly been adopted by private and public enterprise to track and monitor humans for location based service.

Page 25: Technology for national security