SlideShare a Scribd company logo
1 of 23
Public   Safety, Security and  Disaster Management  by  MP Police Presentation by  Purushottam Sharma,IPS IGP, Madhya Pradesh, Bhopal
Challenges to Law Enforcing Agency ,[object Object],[object Object]
Government ‘s  Plan To Overcome Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CCTNS ,[object Object],[object Object]
AFIS ,[object Object],[object Object],[object Object]
AFIS STRUCTURE IN MP ,[object Object],[object Object],[object Object],[object Object],[object Object]
Architecture of AFIS Control Server Comm. Server   IND BPL JBP DWS KWA HBD BTL BHD GWL SHR Matcher Server
AMBIS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why Multi-modal Biometrics ? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Multi-modal Biometrics- Empowerment ,[object Object],[object Object],[object Object],[object Object],[object Object]
Power of Multi-modal Biometrics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GIS/GPS based AVLS Project ,[object Object]
Advantage to Police Department ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Advantage to Public  ,[object Object],[object Object],[object Object],[object Object],[object Object]
MP Police Website
New Services in Website ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Prominent Features “Services” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Risk to Database & Network ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Security Risk to Database & Network Continue
Security Policies Adopted by MP Police at Central Data Center ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Firewall Policy at Data Center ,[object Object],[object Object],[object Object],[object Object],[object Object]
Services Provided By Firewall ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THANK  YOU

More Related Content

What's hot

IS4799 Final Project (1)
IS4799 Final Project (1)IS4799 Final Project (1)
IS4799 Final Project (1)
Mark Milburn
 
Cybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowCybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must know
Benjamin Ang
 
Design of a gsm based biometric access control system
Design of a gsm based biometric access control systemDesign of a gsm based biometric access control system
Design of a gsm based biometric access control system
Alexander Decker
 

What's hot (19)

J017555559
J017555559J017555559
J017555559
 
A Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System ArchitectureA Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System Architecture
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRS
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 Report
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Survillance description
Survillance descriptionSurvillance description
Survillance description
 
KawalPilpres2019: a highly secured real count voting escort architecture
KawalPilpres2019: a highly secured real count voting escort architectureKawalPilpres2019: a highly secured real count voting escort architecture
KawalPilpres2019: a highly secured real count voting escort architecture
 
Ict for lawyers april 2019
Ict for lawyers april 2019Ict for lawyers april 2019
Ict for lawyers april 2019
 
Mobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC TechnologyMobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC Technology
 
IS4799 Final Project (1)
IS4799 Final Project (1)IS4799 Final Project (1)
IS4799 Final Project (1)
 
Rajan Raj Pant
Rajan Raj PantRajan Raj Pant
Rajan Raj Pant
 
Intelligent Helmet for Road Safety
Intelligent Helmet for Road SafetyIntelligent Helmet for Road Safety
Intelligent Helmet for Road Safety
 
Cybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowCybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must know
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
NetScope network traffic monitoring
NetScope network traffic monitoringNetScope network traffic monitoring
NetScope network traffic monitoring
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
Design of a gsm based biometric access control system
Design of a gsm based biometric access control systemDesign of a gsm based biometric access control system
Design of a gsm based biometric access control system
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
 

Viewers also liked

Fingerprints basics for scouts
Fingerprints basics for scoutsFingerprints basics for scouts
Fingerprints basics for scouts
Russ Lesco
 
Kinds of neurons
Kinds of neuronsKinds of neurons
Kinds of neurons
jugafoce
 
The Little Ice Age
The Little Ice AgeThe Little Ice Age
The Little Ice Age
WestBridger
 
Curso Livre de Python - Aula 03/11 - Módulo I
Curso Livre de Python - Aula 03/11 - Módulo ICurso Livre de Python - Aula 03/11 - Módulo I
Curso Livre de Python - Aula 03/11 - Módulo I
PeslPinguim
 
открытие мемориальной доски иванову андерю олеговичу (01 августа 2013 г)
открытие мемориальной доски иванову андерю олеговичу (01 августа 2013 г)открытие мемориальной доски иванову андерю олеговичу (01 августа 2013 г)
открытие мемориальной доски иванову андерю олеговичу (01 августа 2013 г)
uluana_v
 
федерация за всеобщий мир UPF 12.12.12. Международное волонтерство – новые в...
федерация за всеобщий мир UPF 12.12.12.  Международное волонтерство – новые в...федерация за всеобщий мир UPF 12.12.12.  Международное волонтерство – новые в...
федерация за всеобщий мир UPF 12.12.12. Международное волонтерство – новые в...
Dmitry Samko
 
Cell structure function
Cell structure functionCell structure function
Cell structure function
jugafoce
 

Viewers also liked (20)

Fingerprints basics for scouts
Fingerprints basics for scoutsFingerprints basics for scouts
Fingerprints basics for scouts
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
4.1 notes
4.1 notes4.1 notes
4.1 notes
 
Computer and Internet
Computer and InternetComputer and Internet
Computer and Internet
 
Kinds of neurons
Kinds of neuronsKinds of neurons
Kinds of neurons
 
The Little Ice Age
The Little Ice AgeThe Little Ice Age
The Little Ice Age
 
Making the Books Balance – Understanding the Financial Context and Efficiency...
Making the Books Balance – Understanding the Financial Context and Efficiency...Making the Books Balance – Understanding the Financial Context and Efficiency...
Making the Books Balance – Understanding the Financial Context and Efficiency...
 
Mikaela scott
Mikaela scottMikaela scott
Mikaela scott
 
Aula4
Aula4Aula4
Aula4
 
Nery jones
Nery jonesNery jones
Nery jones
 
Curso Livre de Python - Aula 03/11 - Módulo I
Curso Livre de Python - Aula 03/11 - Módulo ICurso Livre de Python - Aula 03/11 - Módulo I
Curso Livre de Python - Aula 03/11 - Módulo I
 
Cranford Real Estate Market Update - July 2014
Cranford Real Estate Market Update - July 2014Cranford Real Estate Market Update - July 2014
Cranford Real Estate Market Update - July 2014
 
Enhancing relationships
Enhancing relationshipsEnhancing relationships
Enhancing relationships
 
Transforming Quality Through the Third Sector: Challenging and Influencing Pr...
Transforming Quality Through the Third Sector: Challenging and Influencing Pr...Transforming Quality Through the Third Sector: Challenging and Influencing Pr...
Transforming Quality Through the Third Sector: Challenging and Influencing Pr...
 
9.2 notes
9.2 notes9.2 notes
9.2 notes
 
Loi chuc tet 2013 hay nhat tin.tuyensinh247.com
Loi chuc tet 2013  hay nhat   tin.tuyensinh247.comLoi chuc tet 2013  hay nhat   tin.tuyensinh247.com
Loi chuc tet 2013 hay nhat tin.tuyensinh247.com
 
7.4 notes
7.4 notes7.4 notes
7.4 notes
 
открытие мемориальной доски иванову андерю олеговичу (01 августа 2013 г)
открытие мемориальной доски иванову андерю олеговичу (01 августа 2013 г)открытие мемориальной доски иванову андерю олеговичу (01 августа 2013 г)
открытие мемориальной доски иванову андерю олеговичу (01 августа 2013 г)
 
федерация за всеобщий мир UPF 12.12.12. Международное волонтерство – новые в...
федерация за всеобщий мир UPF 12.12.12.  Международное волонтерство – новые в...федерация за всеобщий мир UPF 12.12.12.  Международное волонтерство – новые в...
федерация за всеобщий мир UPF 12.12.12. Международное волонтерство – новые в...
 
Cell structure function
Cell structure functionCell structure function
Cell structure function
 

Similar to Purushottam Sharma

White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
Finite Moments
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile application
Alexander Decker
 
traffic reulation
traffic reulationtraffic reulation
traffic reulation
Pranav Kale
 
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
IJCNCJournal
 
CitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_AnalysisCitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_Analysis
Patrick Floto
 

Similar to Purushottam Sharma (20)

CCTNS IN KARNATAKA- EXPERIENCE SHARING
CCTNS IN KARNATAKA- EXPERIENCE SHARINGCCTNS IN KARNATAKA- EXPERIENCE SHARING
CCTNS IN KARNATAKA- EXPERIENCE SHARING
 
Ambis
AmbisAmbis
Ambis
 
Secure crime identification system
Secure crime identification systemSecure crime identification system
Secure crime identification system
 
Top 5 problems a NETWORK ANALYSIS TOOL will help you solve
Top 5 problems a NETWORK ANALYSIS TOOL will help you solveTop 5 problems a NETWORK ANALYSIS TOOL will help you solve
Top 5 problems a NETWORK ANALYSIS TOOL will help you solve
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
 
Tufin white paper v1 dcr final
Tufin white paper v1 dcr final Tufin white paper v1 dcr final
Tufin white paper v1 dcr final
 
Tufin white paper Network Security Policy Automation and Orchestration for Po...
Tufin white paper Network Security Policy Automation and Orchestration for Po...Tufin white paper Network Security Policy Automation and Orchestration for Po...
Tufin white paper Network Security Policy Automation and Orchestration for Po...
 
karsof systems biometrics brochure
karsof systems biometrics brochurekarsof systems biometrics brochure
karsof systems biometrics brochure
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile application
 
Challenge Fund Empowered Committee Meeting
Challenge Fund Empowered Committee MeetingChallenge Fund Empowered Committee Meeting
Challenge Fund Empowered Committee Meeting
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013
 
traffic reulation
traffic reulationtraffic reulation
traffic reulation
 
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
 
CitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_AnalysisCitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_Analysis
 
Lumeta IPsonar Aligned to ITIL v3
Lumeta IPsonar Aligned to ITIL v3Lumeta IPsonar Aligned to ITIL v3
Lumeta IPsonar Aligned to ITIL v3
 
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesConnected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
 

More from eletseditorial

Tele-homeopathy Mind Technologies- eINDIA2011
Tele-homeopathy Mind Technologies- eINDIA2011Tele-homeopathy Mind Technologies- eINDIA2011
Tele-homeopathy Mind Technologies- eINDIA2011
eletseditorial
 
3 d technology in education :: Podar International School
3 d technology in education :: Podar International School3 d technology in education :: Podar International School
3 d technology in education :: Podar International School
eletseditorial
 

More from eletseditorial (20)

Tele-homeopathy Mind Technologies- eINDIA2011
Tele-homeopathy Mind Technologies- eINDIA2011Tele-homeopathy Mind Technologies- eINDIA2011
Tele-homeopathy Mind Technologies- eINDIA2011
 
3 d technology in education :: Podar International School
3 d technology in education :: Podar International School3 d technology in education :: Podar International School
3 d technology in education :: Podar International School
 
Nalini Chandran, Director
Nalini Chandran, Director Nalini Chandran, Director
Nalini Chandran, Director
 
Rachna Swarup
Rachna Swarup Rachna Swarup
Rachna Swarup
 
Murli K S
Murli K S Murli K S
Murli K S
 
Dr Kuldeep Agarwal,
Dr Kuldeep Agarwal, Dr Kuldeep Agarwal,
Dr Kuldeep Agarwal,
 
Mark Parkinson
Mark Parkinson Mark Parkinson
Mark Parkinson
 
Nagraj G Honnekeri
Nagraj G Honnekeri Nagraj G Honnekeri
Nagraj G Honnekeri
 
Shraman Jha
Shraman Jha Shraman Jha
Shraman Jha
 
Dr Melor Md yunus
Dr Melor Md yunus Dr Melor Md yunus
Dr Melor Md yunus
 
Dinesh Kumar
Dinesh Kumar Dinesh Kumar
Dinesh Kumar
 
Veena Raizada
Veena Raizada Veena Raizada
Veena Raizada
 
Amit Gupta
Amit Gupta Amit Gupta
Amit Gupta
 
Dr Anita Priyadarshini
Dr Anita Priyadarshini Dr Anita Priyadarshini
Dr Anita Priyadarshini
 
Dr Anjalee Prakash
Dr Anjalee Prakash Dr Anjalee Prakash
Dr Anjalee Prakash
 
Son Kuswadi
Son Kuswadi Son Kuswadi
Son Kuswadi
 
Mr. Raj Grover
Mr. Raj Grover Mr. Raj Grover
Mr. Raj Grover
 
Mr. Manish Upadhyay
Mr. Manish Upadhyay Mr. Manish Upadhyay
Mr. Manish Upadhyay
 
Dr Thomas Christie
Dr Thomas Christie Dr Thomas Christie
Dr Thomas Christie
 
Prof K R Srivathsan
Prof K R Srivathsan Prof K R Srivathsan
Prof K R Srivathsan
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Purushottam Sharma

  • 1. Public Safety, Security and Disaster Management by MP Police Presentation by Purushottam Sharma,IPS IGP, Madhya Pradesh, Bhopal
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Architecture of AFIS Control Server Comm. Server IND BPL JBP DWS KWA HBD BTL BHD GWL SHR Matcher Server
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.

Editor's Notes

  1. Thus iris being the most accurate and fastest biometric can be used for very accurate and rapid identification of criminals