54
IT AND SAFETY

It and safety

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: It and safety

IT AND SAFETY

Page 2: It and safety

IT in Defence

Page 3: It and safety

o Defence and Security is, by definition, an extended eco-system in which civil and military, public and private sector bodies must work together as a single team. Although it is the framework for the collaboration on which much of this activity depends, foundation IT does tend to slip into the background.

• With the march of technology, the field of operations for Defence and Security organizations is changing rapidly. The civil and military use of drones is a real example of how technology changes the landscape. Within hours, an apparently minor incident can echo round the world in this new globalized Defence and Security environment.

Page 4: It and safety
Page 5: It and safety

Right from designing to testing of arms, other equipment etc computers are used. Besides that almost all of the modern weapons and other defense equipments involve computers for their proper functioning. Besides that managing database of employees and all other administration work also involves usage of computers. Computers are ubiquitous, in which way defence is exempt ? All activities in civilian side are replicated in defence services (and ministry) also. Biggest and high-value user is Defence Research & Development Organisation which was once headed by Dr. Abdul Kalam.

Page 6: It and safety

Applications1 - Unified CommunicationsTraining is continuous in the armed forces – nobody can afford to stop

learning – the threats are, after all,in constant evolution.Unified communications add real value in training,bringing informed expertise to the learner no matter howremote the location.

2 - Adaptive WorkplaceFrom fixed-location administrative positions to highly-mobile active units,

the Defence and Security sectorsrequire dynamic and highly varied IT workplaces.

3 - IT SupportMost infantry soldiers are in their early twenties:these are young people

who have grown up with gaming and the internet. When they require IT support, they are used to self-service and peer-to-peer approaches.

Page 7: It and safety

• 4-Application Testing Our Defence and Security services have always lead the way

as catalysts for innovation. With the advent of cyber-security, this leadership continues. New applications are needed to help identify and counter new threats.

• 5- Smart Mobility• The history of Defence and Security is the history of

positioning resources in the right place at the right time. Today, for both people and materiel,the sophistication of positioning technology has changed the rules.

Page 8: It and safety

• 6- Data Center Rationalization• The Defence and Security services face particular

challenges in data center management. On the one hand, the pressure is on to boost shared services. On the other, access control must be managed with absolute rigor.

• 7-Real-time Workflow• Intelligence services today are bombarded with• information. Correlating multiple streams of data• to create usable intelligence viewpoints becomes a critical

capability.

Page 9: It and safety

Other Applications in Defence Controlling UAV or unmannedair-crafts an example is Predator. I would

recommend watchingthe shows " Future Weapons" and " Modern Marvles". The show future weapons gives an entire hour to the predator.

They are also used on Intercontinental Ballistic Missiles (ICBMs) that uses GPS and Computers to help the missile get weapons systems onto the incoming target to destroy them.

Computers are used in the logistic and ordering functions of getting equipments to and around the battlefield.

Computers are used to hold records of personnel and very usefulin field hospitals.

Computers are used in tanks and planes and ships to target enemy forces, help run the platform and more recently to help diagnose anyproblems with the platforms.

Page 10: It and safety
Page 11: It and safety

INFORMATION TECHNOLOGY IN HEALTH CARE

Health care is one of the largest industries to widely adopt information technology. Health-care businesses are steadily automatic businesses, clinical purposes and using the resulting information to help diagnose and treat people.

Page 12: It and safety

• MEDICAL/HEALTH INFORMATION TECHNOLOGY• Information Technology (IT) provides new ways for

providers and their patients to readily access and use health information. Information Technology (IT) allows health care providers to collect, store, retrieve, transfer, information electronically.

• Information Technology (IT) has the potential to improve the quality, safety and efficiency of health care.

• DIAGNOSTIC AND DISEASE MANAGEMENT• Information Technology (IT) enables faster, more accurate

diagnosis of disease. Using IT, clinicians can assemble data about all aspects of patients care, consult with specialists remotely and get evaluation of lab data and images by specialists around the world in real time.

Page 13: It and safety

• SECURITY IN HOSPITALS we have CCTV security systems, alarms to protect

hospitals against potential threats. CCTVs help monitoring people moving through an area and reporting that an object has been removed or left behind.

• HOSPITAL INFORMATION SECUIRITY• information technology plays a very important role

in keeping the hospital information secured by not allowing unauthorized users to access .

Page 14: It and safety

• CLAIMS PROCESSING• Electronic processing of care providers and insurance companies

speeds up the approval of claims and payments to clinicians.

• ELECTRONIC HEALTH RECORDS • Diagnosing and treating illness require the patient’s medical and

treatment history to be available for anyone who sees a particular patient. EHRs save clinicians time by not having to search for information or duplicate it in multiple locations.

• SOCIAL MEDIA• Social media outlets allow patients with specific diseases to

share information about specific treatments and outcomes with one another and with clinicians. As the data sets at social media sites grow, they have increasing clinical value for research

Page 15: It and safety

ROLE OF I.T. IN DISASTER MANAGEMENT

Page 16: It and safety

Advancement in Information Technology in the form of :-

G.I.S., REMOTE SENSING, INTERNET, SATELLITE COMMUNICATION, etc.

help in planning and implementation of emergency preparedness and response action.

Page 17: It and safety

A geographic information system lets us visualize, question, analyse, interpret, and understand data to reveal

relationships, patterns, and trend.

• Improve quality and power of analysis of natural hazards assessments.• Guide development activities, e.g., proper geographical area for construction.• Assist disaster planning by issuing regular reports.

G.I.S.(Geographic Information System)

.

Page 18: It and safety

An example of use of layers in an GIS application.

Page 19: It and safety

G.I.S. Image : showing the probability of an EARTHQUAKE

Page 20: It and safety

A picture depicting flood prone areas in Orissa.( through G.I.S. Technology )

Page 21: It and safety

Remote Sensing refers to the technology of acquiring Information about the Earth's surface and atmosphere using sensors on-board air crafts, balloons, satellites, space shuttles

or other platforms.

• Helps in identifying hazardous areas.• It identify the changes occurring in atmosphere.• Thus, helps in providing early warnings for impending

disasters.

REMOTE SENSING

Page 22: It and safety

An example of how Remote Sensing Technology works.

Page 23: It and safety
Page 24: It and safety

Remote sensors visualizing the effects of global warming.

Page 25: It and safety

Advance system of forecasting, monitoring and issuing early warning signals through T.V., radio, internet, etc. At the time of communication failure, internet is the only effective way to communicate. It can be used to locate missing persons, joining families, donor contribution. Nowadays, social media is an effective way for relief measures like appeal for donations, etc. It helps to spread disaster management awareness through information technology.

INTERNET & COMMUNICATION[Backbone for all technologies]

Page 26: It and safety

Use of I.T. Tools to spread awareness of disaster management.

Page 27: It and safety

Use of social media as disaster reliefmeasures.

Page 28: It and safety

Early Warning Signals System.

Page 29: It and safety

Satellite data is used to target potential ground water sites.

A database of different atmospheric conditions from time to time is build to have better disaster forecasting.

Helps in the preparation of seismic hazards maps in order to trace earthquake prone areas.

GIS can be used in carrying out search and rescue operations in a more efficient way

OTHER FUNCTIONS :-

Page 30: It and safety

Functions of I.T. to prevent and recover from disaster.

Page 31: It and safety

Risk Reduction Mitigation and Prevention

Response Recovery

GIS √√√ √√√ √

Internet √√ √√ √√ √√√

Mobile (voice) √√√ √√√

Mobile (non-voice) √√√ √√√

Satellite Communication

√√√ √√√ √√√ √√√

Social Networking √ √√√

TV, Radio √√√ √√√

Use of different technologies for disaster management

Page 32: It and safety

IT AND WOMEN SAFETY

Page 33: It and safety
Page 34: It and safety

1) ICE- Mumbai PoliceThe recent gang rape in Mumbai has taken off the comforting blanket of women’s safety from Mumbai. In an attempt to curb the onslaught of violence against women, The Mumbai Police has developed an android App called ICE- ‘In Case of Emergency’.Key features• Multilingual app- available in English, Hindi, Marathi• Send SOS message in one touch• Tips of personal and cyber safety• Access to guidelines for disaster preparations, first aid, police, ambulance numbers• Find the nearest hospitals automatically based on your GPS location. Also, search for hospitals across major cities in the country• Store critical information useful during emergency such as Contact details of Family members, Doctors and SOS contacts, Current and past medication, Blood group, Allergies etcAdvantages• Easy to UseDisadvantages• Huge storage space of 10.46 MB required

Page 35: It and safety

2) VithU – Channel VCrime against women have prodded Channel [V] to take initiative and develop an App with an eye on Woman’s safety.Key features• A message, along with the location details is sent to pre-loaded contacts on tapping the Power icon on the screen twice.• The App also sends out general updates on the Crime Scene in India.• An option ‘Tips Feed’ gives safety tips in case of emergency situations.• There is an alert option for the Crime Show Gumrah that sends a reminder to watch it when it is aired.Advantages• Quick & DiscreetDisadvantages• GPS & Internet needs to be turned ON always for tracking location. This will drain battery faster.• The Panic button could be triggered by mistake also.• Accessible only on high end Android phone.

Page 36: It and safety

3) BachaoThree women- Chinmayee S K, Ankita Herurkar, and Sanik Sahasrabuddhe- have decided to take a bat for woman’s safety. They developed ‘Bachchao’- an Android App designed to trigger SOS alert in case of emergency.Key Features• Location Coordinates can be sent to preloaded contacts by pressing a red button in the app.• The app supports video recording which can act as digital witness.• The alarm SMS can be read even in the most basic of phones.• There is provision to update your family of your location on an hourly basis.Advantages• Less Storage Space required and easy to use.Disadvantages• Available only in android as of now.

Page 37: It and safety

4) iFollow-Ladies safetyDeveloped by Aucupa Innovative Solutions, this App is one of the ‘Nasscom sponsored ‘FameApp contest’ award winning safety app and is available for both android and Apple smart phones.Key Features• Victim has to shake the phone thrice in a span of five seconds and a call is placed to the first contact person stored.• If he/she doesn’t respond to the call iFollow will shoot an SMS along with your geographical location to select personal contacts (max 3).• After the first message, on every ten meters change in location, the app will send SOS distress message with new location detailsAdvantages• Consumes less power and CPU usage.Disadvantages• This app will fail in case of zero balance.

Page 38: It and safety

5) Google Latitude determines your actual position (only if your GPRS is ON) and lets you add your friends to the network. Make sure you’ve added few friends who are tech savvy and understand the usage of Google Latitude. If you’re venturing out on a slightly unsafe route (i/e if it’s important and unavoidable) or if you’re stepping out or going back home late night; make sure you ask them to keep a check on you through it.

Page 39: It and safety

6) Computer Aided Dispatch (CAD) is an emergency response system for women who may face violence. It is an integrated system using Geographical Information System (GIS) based call-taking and Geographical Positioning System (GPS) based police vehicle dispatch system. This system will ensure a rapid response to distress calls and ensure a speedy assistance to women.

7) FIGHTBACK, India’s first Mobile Application for Women Safety. Powered by CanvasM , FightBack, the women’s safety application, sends SOS alerts from your phone. FightBack uses GPS, SMS, location maps, GPRS ,email and your Facebook account to inform your loved ones in case you are in danger. The app is available on iPhone, Android, Black Berry, Windows

Page 40: It and safety

8)Circle of 6 is designed mainly for college students. The app is also useful for high school students or any female who wants an easy-to-use system to alert friends when she’s in a threatening situation. The app is also available in Hindi and the Delhi women’s hotline number is built in.

9)Scream Alarm! This is a FREE safety alarm that does only one thing: push the button for making the phone scream loudly with a woman’s voice! Perfect for females that need some kind of safety alarm.Have the app on, and instantly push the button if you feel threatened! It is available on Android.

Page 41: It and safety

10)She Taxi, the 24X7 taxi service operated by women for women travellers has been designed to ensure a safe and reliable mode of transport for women as well as to encourage entrepreneurship and self-employment among women.

• Travellers can book the cab via online or mobile on a 24X7 basis.• . The traveller will have the option to make payment via cash, debit card or credit

card.Various other features such as refreshment mini bar and entertainment facilities including music, play stations are also provided in the cabs.

• The cab, designed and integrated with Global Positioning system(GPS) will enable to monitor and track the activities of the traveller as well as the driver and will facilitate immediate aid in case of any emergency situation.

• Safe Bus, Safe Me, Safe Me Mobile and Safe City Response Ecosystem are the major safety offering technologies used in She Taxi service.

Page 42: It and safety

11) Amrita Personal Safety System. (APSS )is an inconspicuous, wearable device that empowers women to secretly trigger communication with family and police when in distress. Button- and voice-activated, the device can record conversations and communicate immediately via text-message and voice calls to multiple predetermined destinations. It also supplies its wearer with automated information regarding the nearest police stations, hospitals and fire-stations.

• The device is designed to function even in rural areas over low-speed data connections.

• The device is designed to provide flexibility and choices for the wearer. Women will be able to wear it either on the waist or on a necklace, with multiple remote-activation capabilities, including a separate activation device to be embedded in an earring studs.

Page 43: It and safety

12) The Delhi Multimodal Transport System (DIMTS) has come out with “Telltail”, a security application on android and smartphones

• Telltail, will help the user raise a security alert by contacting the police, friends and family simultaneously. The application will also provide visual tracking information of the user.

• The application will have three button options — “Track Me,” “Track By Vehicle” and “Panic Button” — by clicking which the user will reach her primary contacts within seconds.

13)The stun gun This small gun charges an attacker with an electric

shock. The shock weakens the attacker temporarily, giving you ample chance to escape the scene. When its trigger is pulled, a stun gun pumps about 700,000 volts into the attacker’s body. Some stun guns are small enough to be concealed in a pack of cigarettes. They run on Lithium batteries and can be carried either in handbags or held in waist straps.

Page 44: It and safety

14) The stun rings• A stun ring is an attractive ring that looks

elegant and can pass for fashion ring. But more importantly, it offers safety and instills confidence. The ring contains pepper spray, and it protects you in times of attack, rape, violence and crisis.

15) The lightning strike personal protection device

• This torch-like device was originally developed for use by police officers, but many civilians now use it as well. It protects you by shortly blinding and disorienting the attacker – thanks to the several lumens of strong white light produced by the LEDs in the device. The lightning strike device is light and small; you can carry it even while jogging.

Page 45: It and safety

16)The TASER device• This personal protection device can stun an attacker from a

distance of about 15 feet away. Yet, it doubles as a powerful contact stun device. The device is very easy to use because hitting it anywhere on the attacker’s body will render him incapacitated. This is quite unlike pepper sprays and other self-defense devices, all of which must be targeted directly at the assailant’s face for any effect to be produced.

Page 46: It and safety

HIDDEN CAMERA DETECTOR• The lens finder bug detector is the most reliable and

easy to use spy cam locator on the market. Females can be assured that any concealed cameras placed covertly in a room will be instantly detected by this wireless device.

• The bug tracker has 4 LEDs that indicate its signal strength, which it likewise indicates through sound and also vibration. It also has a silent detection mode. You can adjust how far it can sense bugs and also surveillance cams. This particular spy camera detector indicates the detection of frequencies from 1 MHz to 6 GHz with an audible or vibrating alert.

• If you look over its viewing port, you will see any kind of hidden camera lenses within ten feet flash red. Slide its control switch towards RF mode and you can detect the frequency of wireless gadgets using it.

Page 47: It and safety

IT IN BANKING SAFETY

Page 48: It and safety

. IT has increased the level of competition and forced them to integrate the new technologies in order to satisfy their customers. They have already developed and implemented a certain number of solutions among them for safety of banking system and for customers transactions . Some of them are : • Self-inquiry facility• Remote banking• Anytime banking- Anywhere banking• Tele banking• Electronic Banking

The technology used to provide this service is called electronic data interchange (EDI)

Page 49: It and safety

Security of a customer's financial information

PIN : Personal Identification Number PIN represents a password, used for the login , it is

numeric password of mostly 4 digits . mainly use for ATM s , debit cards , credit cards

TAN : Transaction Authentication

Number TANs representing one-time passwords to

authenticate transactions. • Signature based online banking where all transactions are signed and encrypted

digitally. The Keys for the signature generation and encryption can be stored on smartcards or any memory medium, depending on the concrete implementation

Page 50: It and safety

Secure Electronic Transaction (SET)

• Secure Electronic Transaction (SET) software system, the global standard for secure card payments on the Internet, which is defined by various international companies such as Visa MasterCard,

• IBM, Microsoft, Netscape Communications Corp., GTE, SAIC, Terisa Systems and Verisign. SET promises to secure bank-card transactions online. Lockhart, CEO of MasterCard said, “ …We are glad to work with Visa and all of the technology partners to craft SET. This action means that consumers will be able to use their bank cards to conduct transactions in cyberspace as securely and easily as they use cards in retail stores today.

 

Page 51: It and safety

Internet banking security

The security of the Bank Internet banking application is addressed at three levels.

• The first concern is the security of customer information as it is sent from the customer's PC to the Web server.

• The second area concerns the security of the environment in which the Internet banking server and customer information database reside.

• Finally, security measures are in place to prevent unauthorized users from attempting to log into the online banking section of the Web site.

Page 52: It and safety

How Encryption Protects You

• The privacy of the communications between you (your browser) and our servers is ensured using encryption. Encryption scrambles messages exchanged between your browser and our online banking server.

Page 53: It and safety

QUESTIONS

• What are the basic features you find in any women safety app.? what other features would you suggest that will improve such apps?

• What is the full form of GIS,GPS and CAD?• How can we access GIS ?• What is the full form of TAN / PIN ?• What are the facilities provide by banking

system for safety of customer’s transaction ?

Page 54: It and safety

CREDITSAMAN VERMA 368

GARIMA ARORA 188SHEFALI GARG

SHIVANI SAXENA 337YOGITA 460