logging in or signing up TECHNOLOGY FOR NATIONAL SECURITY sreerajks009 Download Post to : URL : Related Presentations : Let's Connect Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Copy embed code: Embed: Flash iPad Dynamic Copy Does not support media & animations Automatically changes to Flash or non-Flash embed WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 742 Category: Science & Tech.. License: All Rights Reserved Like it (2) Dislike it (0) Added: April 19, 2012 This Presentation is Public Favorites: 0 Presentation Description ENGLISH COMMUNICATION AND TECHNICAL SEMINAR Comments Posting comment... Premium member Presentation Transcript TECHNOLOGY FOR NATIONAL SECURITY: TECHNOLOGY FOR NATIONAL SECURITYPowerPoint Presentation: PRESENTED BY : SREERAJ.K.S 98910114055 PSN ENGINEERING COLLEGE TirunelveliWhat is Technology ??: What is Technology ?? Technology is the making, usage, and knowledge of tools, machines, techniques, systems or methods of organization in order to solve a problem or perform a specific function.PowerPoint Presentation: Technology can be used for the protection of national integrity and from enemies Now a days technology is used for National Security in the following ways F or defence purpose To secure confidential or secret Electronic Data's F or communication purpose F or spying For tackling Natural DisastersTechnology in Defense Sector: Technology in Defense Sector The defense sector use all kinds of latest technology for its day to day working. It ranges from Computer Servers to Heat Seeking Missiles.PowerPoint Presentation: The army uses ultra modern communication and transport systems. It also take use of helicopters and unmanned helicopters to transport food and weaponry.PowerPoint Presentation: Army use night vision device for patrolling around the border. They also use helicopters and Unmanned Arial Vehicles (UAV) for surveillance The Air Force use Bombers like B2 , F16 ,Sukhoi etcWhat is an Aircraft Carrier? : What is an Aircraft Carrier? A floating, self-propelled airbase. This definition is generally taken to include any vessel capable of handling fixed wing fighter/bomber aircraft, of which there are several typesTypes of Aircraft Carrier : Types of Aircraft Carrier Super carrier : these are typically greater than 50,000 tons loaded displacement, usually nuclear powered, and able to handle fast jets Fleet Carrier : mid size typically 20,000 tons upward, oil/steam, gas turbine or even diesel powered, the 'typical' size in a country's fleet Light Aircraft Carrier : smaller than the fleet carrierPowerPoint Presentation: Fleet CarrierStealth Aircraft: Stealth Aircraft Stealth aircraft are aircraft that use stealth technology to avoid detection by employing a combination of features to interfere with radar as well as reduce visibility in the infrared, visual, audio, and radio frequency (RF) spectrum.PowerPoint Presentation: Development of stealth technology likely began in Germany during World War II. Well-known modern examples of stealth aircraft include the United States' F-117 Nighthawk (1981–2008), the B-2 Spirit, the F-22 Raptor and the F-35 Lightning IIMissiles: Missiles A Missile is a self-propelled guided weapon system. Missiles have four system components: targeting and/or guidance, flight system, engine, and warhead.PowerPoint Presentation: Missiles come in types adapted for different purposes: They are Surface-to-surface Air-to-surface (ballistic, cruise, anti-ship, anti-tank) Surface-to-air (anti-aircraft and anti-ballistic) Air-to-air Anti-satellite missiles.Biometric Security: Biometric Security Biometric Authentication refers to the identification of humans by their characteristics or traits. Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.Defense Communication System: Defense Communication System Many pieces of military communications equipment are built to encrypt and decode transmissions and survive rough treatment in hostile climates. They use many frequencies to send signals to other radios and to satellites. Military communications involve all aspects of communications, or conveyance of information, by armed forces.PowerPoint Presentation: Examples from the reference source Jane's Military Communications include "text, audio and facsimile", "Tactical and ground-based communications", Terrestrial microwave communicationCyber Security: Cyber Security It is in fact protecting your personal information or any form of digital asset stored in your computer or in any digital memory device. Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. Countries store all their secret data's like financial ,internal security , defense secrets ,missile launch codes etc in electronic form in their servers.PowerPoint Presentation: So to protect these vital data we use firewalls and other protective systems Extreme care is give by governments or cyber security in this age of “Information Overdrive” as the number of persons using electronic banking has increased tremendously over the last decade.A Firewall: A Firewall You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.