You are on page 1of 21

The Role of Digital

Technology in Security
Profession
Oladokun Samuel Temitope (mncs, micsi)
President, Association of Ondo State Youths in Digital Technology- AOSYIDTECH
TABLE OF CONTENT
 Acknowledgement
 About the association
 Definition of Terms
 Digital Technology

 Problem to Discuss

 Technologies and devices

 Recommendations

 Conclusion
ACKNOWLEDGMENT
I want to appreciate the ranks, of officers of
the Great National Cadet Corps, Nigeria, for
bringing the Association Of Ondo State Youths
in Digital Technology as a speaker in this event
of her 8th, Regular CADET intake Recruitment,
exercise, held to day 3rd, September, 2022, at
the College of Education, Ero, Ondo State,
Nigeria.

National Cadet Corps Nigeria, A uniformed


organisation that seek to contribute in
propagating National unity and Integrity
amongst youth
ABOUT - AOSYIDTECH
DEFINITION OF TERMS
 ROLES

 DIGITAL TECHNOLOGY
 SECURITY

 PROFESSION
ROLES

 the function assumed or part played by a person or


thing in a particular situation.
DIGITAL TECHNOLOGY

 Digital technologies are electronic tools, systems, devices and


resources that generate, store or process data,
 the branch of scientific or engineering knowledge that deals with
the creation and practical use of digital or computerized devices,
methods, systems, etc (Digital Technology Encyclopedia.com
https://www.encyclopedia.com)
SECURITY/ SECURITY PROFESSION

 SECURITY: the state of being free from danger or threat.

 SECURITY PROFESSION : security executives, managers,


supervisors and staff—the people within the
organization/society/nation/state who are charged with the
protection of assets against security risks
THE ROLES OF DIGITAL TECHNOLOGY IN
SECURITY PROFESSION

 The function assumed or part played by electronic tools,


systems, devices and resources that generate, store or
process data, the pursue/goal of having a
state/nation/society free of danger or threat
PROBLEM TO DISCUSS

 Since the advent of information technology, it is assumed to have more


advantages than more
disadvantages, especially in the security field, even when the security
situation is sometimes challenging
and complex. :
How can information technology have a positive impact on national
security?
AREA OF SECURITY THREAT
 Some security challenges in countries

 (a) poverty and unemployment b) riots, ethnic and tribal strife c) insecurity: kidnapping, armed
robbery
(b) corruption: fake licenses, etc. e) piracy,
(c) Government Destruction: Information Security, Fading Government Websites, Theft of Life
Data
(d) Internal threats: Spyware, unhappy staff, too dependent on external technology
(e) Inadequate regulation: for example cyber security
The integration of information technology and significant opportunities provide the management
essential for innovation in the way of assessing, managing and responding to security challenges
Information Technology Opportunities
 Since, unbiased and intelligent information helps in investigation of security threats, then
we shall now focus on how to annex these opportunities in ensuring a society free of crime.

PHASES OF CRIME:
 Planning
 Scene of happening
 Immediately after
 Long time after (many years/months/weeks/days)
MANAGEMENT OF CRIME
 Reporting: Mobile Apps,
 Monitoring: Drones, Anti Land Grabbing System, Personal Security Robots
 Investigation: DNA, Paternity Test, Rape detective system, Biometric capture System,
google image Search,
DEVICES/SYSTEMS
 The following are devices and technologies
that can be used to thwart crimes even
from embryo.

• A control panel, which is the primary


controller of a home’s security system
• Door and window sensors
• Motion sensors, both interior and exterior
• Wired or wireless security cameras
• A high-decibel siren or alarm
• A yard sign and window stickers
CCTV AND IP CAMERAS
CCTV AND IP CAMERAS

 Smart monitoring
AERIAL MONITORING SYSTEM/ DRONE
Personal Body Guard Robot
Other areas of research

 Roles of Software/Mobile Apps in security profession


 Security of mobile phones
 Security of PINs, codes
Conclusion

 We can believe that


 Humanware
 Hardware
 Software
 All have places in security profession,

 I here advice that the leadership of these great corps sponsor its members on the special
training on how to use digital technology to prevent, monitor, investigate any threat to
security of the society,

 I want to take this time to thanks every, physical, and online for listening to this short
presentation today. God Bless you all

You might also like