SlideShare uma empresa Scribd logo
1 de 8
technology is largely
misused to destroy the
world
Presented By:- Presented To:-
Sanket Gandhi Ms. Sakshi Arora
Introduction
• the application of scientific knowledge for practical purposes, especially in industry.
• machinery and devices developed from scientific knowledge.
• the branch of knowledge dealing with engineering or applied sciences.
Origin:-
tekhn
tekhnologia
Logia technology
logy
Technology for weapons
• Scientific technology is rising at a rapid rate constantly developing and
changing.
• From vehicles to weapons, every thing is advancing in todays world.
• Let’s have a look on top 10 weapons which exists till date.
Advanced Weapons
• Rocket Propelled Grenade (RPG)
• DSR-50 (.50 Cal sniper rifle)
• Flamethrower
• Schwerer Gustav
• Nimitz class aircraft carrier
• Chimera Virus
• Russia’s Aviation Thermobaric Bomb of Increased Power
• Intercontinental Ballistic Missile (ICBM)
• Multiple independently targetable re-entry vehicle (MIRV)
• Tsar Bomba
Hiroshima and Nagasaki
• 2 atomic bombs detonated by the U.S. near the end of second world
war on 6th and 9th August 1945.
• The “Little Boy” and “Fat Man” collectively killed 129,000 people.
• These were the only actual use of nuclear weapons in the history of
warfare.
Cyber Destruction
• The technology has developed at a drastic rate especially in cyber
environment.
• Use of mobile phones, computers have increased at a drastic level
within the past decade especially internet.
• All are vital stuff is being done on-line. Even our banking is online.
• Therefore the threat of cyber terrorism increases.
List of Cyber attacks
• Indiscriminate attack: wanna cry ransomware attack- May 2017
• Destructive attack: Great hacker war (cyber gang war)
• Cyberwarfare: Operation Olympic games (Israeli nuclear facilities
conducted by US)
• Government/ Corporate espionage: Shadow Network (India by China),
Sony pictures entertainment attack
• Stolen e-mail addresses and login credentials: 2011 PlayStation network
outage
• Stolen credit card and financial data: 2016 Indian banks data breach
• Stolen medical-related data: Anthem, Premera Blue Cross, CareFirst.
THANK
YOU

Mais conteúdo relacionado

Semelhante a Technology is largely misused to destroy the world

Chapter 10, part 2
Chapter 10, part 2Chapter 10, part 2
Chapter 10, part 2
misecho
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
ArjunKumar684595
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
Umang Patel
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 

Semelhante a Technology is largely misused to destroy the world (20)

Chapter 10, part 2
Chapter 10, part 2Chapter 10, part 2
Chapter 10, part 2
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
IT Quiz MES
IT Quiz MESIT Quiz MES
IT Quiz MES
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Assessing the risks of AI catastrophe - presentation given by David Wood on 1...
Assessing the risks of AI catastrophe - presentation given by David Wood on 1...Assessing the risks of AI catastrophe - presentation given by David Wood on 1...
Assessing the risks of AI catastrophe - presentation given by David Wood on 1...
 
A Training & Simulation Perspective on Maritime Information & Automation
A Training & Simulation Perspective on Maritime Information & AutomationA Training & Simulation Perspective on Maritime Information & Automation
A Training & Simulation Perspective on Maritime Information & Automation
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Computer games intro
Computer games introComputer games intro
Computer games intro
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Cyberware
CyberwareCyberware
Cyberware
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack Stratagems
 
Types & Shapes of Future Wars.pptx
Types & Shapes of Future Wars.pptxTypes & Shapes of Future Wars.pptx
Types & Shapes of Future Wars.pptx
 
Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare  hacking al-qaida and terrorismCe hv6 module 43 cyber warfare  hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 

Mais de Sanket Gandhi (6)

Project communications management
Project communications managementProject communications management
Project communications management
 
Bolgs and blogging
Bolgs and bloggingBolgs and blogging
Bolgs and blogging
 
Alibaba.com
Alibaba.comAlibaba.com
Alibaba.com
 
Cell phone Etiquette
Cell phone EtiquetteCell phone Etiquette
Cell phone Etiquette
 
communication skills
communication skillscommunication skills
communication skills
 
Rolls Royce
Rolls Royce Rolls Royce
Rolls Royce
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Technology is largely misused to destroy the world

  • 1. technology is largely misused to destroy the world Presented By:- Presented To:- Sanket Gandhi Ms. Sakshi Arora
  • 2. Introduction • the application of scientific knowledge for practical purposes, especially in industry. • machinery and devices developed from scientific knowledge. • the branch of knowledge dealing with engineering or applied sciences. Origin:- tekhn tekhnologia Logia technology logy
  • 3. Technology for weapons • Scientific technology is rising at a rapid rate constantly developing and changing. • From vehicles to weapons, every thing is advancing in todays world. • Let’s have a look on top 10 weapons which exists till date.
  • 4. Advanced Weapons • Rocket Propelled Grenade (RPG) • DSR-50 (.50 Cal sniper rifle) • Flamethrower • Schwerer Gustav • Nimitz class aircraft carrier • Chimera Virus • Russia’s Aviation Thermobaric Bomb of Increased Power • Intercontinental Ballistic Missile (ICBM) • Multiple independently targetable re-entry vehicle (MIRV) • Tsar Bomba
  • 5. Hiroshima and Nagasaki • 2 atomic bombs detonated by the U.S. near the end of second world war on 6th and 9th August 1945. • The “Little Boy” and “Fat Man” collectively killed 129,000 people. • These were the only actual use of nuclear weapons in the history of warfare.
  • 6. Cyber Destruction • The technology has developed at a drastic rate especially in cyber environment. • Use of mobile phones, computers have increased at a drastic level within the past decade especially internet. • All are vital stuff is being done on-line. Even our banking is online. • Therefore the threat of cyber terrorism increases.
  • 7. List of Cyber attacks • Indiscriminate attack: wanna cry ransomware attack- May 2017 • Destructive attack: Great hacker war (cyber gang war) • Cyberwarfare: Operation Olympic games (Israeli nuclear facilities conducted by US) • Government/ Corporate espionage: Shadow Network (India by China), Sony pictures entertainment attack • Stolen e-mail addresses and login credentials: 2011 PlayStation network outage • Stolen credit card and financial data: 2016 Indian banks data breach • Stolen medical-related data: Anthem, Premera Blue Cross, CareFirst.