TECHNOLOGY FOR NATIONAL SECURITY

Views:
 
     
 

Presentation Description

ENGLISH COMMUNICATION AND TECHNICAL SEMINAR

Comments

Presentation Transcript

TECHNOLOGY FOR NATIONAL SECURITY:

TECHNOLOGY FOR NATIONAL SECURITY

PowerPoint Presentation:

PRESENTED BY : SREERAJ.K.S 98910114055 PSN ENGINEERING COLLEGE Tirunelveli

What is Technology ??:

What is Technology ?? Technology is the making, usage, and knowledge of tools, machines, techniques, systems or methods of organization in order to solve a problem or perform a specific function.

PowerPoint Presentation:

Technology can be used for the protection of national integrity and from enemies Now a days technology is used for National Security in the following ways F or defence purpose To secure confidential or secret Electronic Data's F or communication purpose F or spying For tackling Natural Disasters

Technology in Defense Sector:

Technology in Defense Sector The defense sector use all kinds of latest technology for its day to day working. It ranges from Computer Servers to Heat Seeking Missiles.

PowerPoint Presentation:

The army uses ultra modern communication and transport systems. It also take use of helicopters and unmanned helicopters to transport food and weaponry.

PowerPoint Presentation:

Army use night vision device for patrolling around the border. They also use helicopters and Unmanned Arial Vehicles (UAV) for surveillance The Air Force use Bombers like B2 , F16 ,Sukhoi etc

What is an Aircraft Carrier? :

What is an Aircraft Carrier? A floating, self-propelled airbase. This definition is generally taken to include any vessel capable of handling fixed wing fighter/bomber aircraft, of which there are several types

Types of Aircraft Carrier :

Types of Aircraft Carrier Super carrier : these are typically greater than 50,000 tons loaded displacement, usually nuclear powered, and able to handle fast jets Fleet Carrier : mid size typically 20,000 tons upward, oil/steam, gas turbine or even diesel powered, the 'typical' size in a country's fleet Light Aircraft Carrier : smaller than the fleet carrier

PowerPoint Presentation:

Fleet Carrier

Stealth Aircraft:

Stealth Aircraft Stealth aircraft are aircraft that use stealth technology to avoid detection by employing a combination of features to interfere with radar as well as reduce visibility in the infrared, visual, audio, and radio frequency (RF) spectrum.

PowerPoint Presentation:

Development of stealth technology likely began in Germany during World War II. Well-known modern examples of stealth aircraft include the United States' F-117 Nighthawk (1981–2008), the B-2 Spirit, the F-22 Raptor and the F-35 Lightning II

Missiles:

Missiles A Missile is a self-propelled guided weapon system. Missiles have four system components: targeting and/or guidance, flight system, engine, and warhead.

PowerPoint Presentation:

Missiles come in types adapted for different purposes: They are Surface-to-surface Air-to-surface (ballistic, cruise, anti-ship, anti-tank) Surface-to-air (anti-aircraft and anti-ballistic) Air-to-air Anti-satellite missiles.

Biometric Security:

Biometric Security Biometric Authentication refers to the identification of humans by their characteristics or traits. Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.

Defense Communication System:

Defense Communication System Many pieces of military communications equipment are built to encrypt and decode transmissions and survive rough treatment in hostile climates. They use many frequencies to send signals to other radios and to satellites. Military communications involve all aspects of communications, or conveyance of information, by armed forces.

PowerPoint Presentation:

Examples from the reference source Jane's Military Communications include "text, audio and facsimile", "Tactical and ground-based communications", Terrestrial microwave communication

Cyber Security:

Cyber Security It is in fact protecting your personal information or any form of digital asset stored in your computer or in any digital memory device. Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. Countries store all their secret data's like financial ,internal security , defense secrets ,missile launch codes etc in electronic form in their servers.

PowerPoint Presentation:

So to protect these vital data we use firewalls and other protective systems Extreme care is give by governments or cyber security in this age of “Information Overdrive” as the number of persons using electronic banking has increased tremendously over the last decade.

A Firewall:

A Firewall