INPUT THE LCARS COMPUTER NETWORK AUTHORIZED ACCESS ONLY PLEASE INPUT COMMAND CODES X JOLLY ROGER Command code verified Accessing dataabse.

Slides:



Advertisements
Similar presentations
International Surface Warfare Officer School
Advertisements

Sea Power and Maritime Affairs Lesson 9: the Dawning of the Age of Mahan,
Sea Power and Maritime Affairs
Chartering Opportunities with the Cascade Pacific Council Sea Scouts SSS Tsunami 678.
Netprog: Cryptgraphy1 Cryptography Reference: Network Security PRIVATE Communication in a PUBLIC World. by Kaufman, Perlman & Speciner.
TMC SERVICES TMC Services is one of the pioneers in education Industry in India Govt. approved. Completed 9 years in education industry. Growing fastly.
Hylar V Assault Laser All of your Cruisers and Destroyers now receive +1 on all combat rolls. Deep Space Cannon (req. Hylar V Assault Laser) Enemy flets.
THE LCARS COMPUTER NETWORK
U.S. COAST GUARD The smallest of all military branches – each job becomes very important and selective SEMPER PARATUS – “ALWAYS READY” Coast Guard Hymn.
©David F. Thurston, 2012, All rights reserved Capacity Implications of PTC now and in the Future David Thurston, Ph.D., P.E., FIRSE Vice President – Rail.
Case Study: USS Vincennes. Events Leading to the Vincennes Incident  Iran-Iraq War  Attack on the USS Stark  The hitting of a mine in an Iranian Minefield-
Office of Social and Economic Data Analysis Missouri Student Success Network Missouri Alternative Education Network October 13, 2010 Jefferson City, Missouri.
GROUP 1: THE REDSHIRTS. GROUP MEMBERS Acquah, Kewbina, Charles Djoussa, Kevin, J. Kearney, Edel. Murray, Amber. Sharma, Vardaan.
. American Soldier Video. Purpose  Domestic Security  Strategic Air Command  Air and Missile Attacks  Space Surveillance.
Aerospace Engineering By Patrick Ferrell. Aerospace Engineering is the main branch of engineering concerned with the research, design, development, construction,
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Semper Fidelis “Always Faithful”.  First Line of Defense First Line of Defense ◦ “Nation’s 911 Force” ◦ Provide the most rapid, effective, and efficient.
IDC Program INFORMATION DOMINANCE CORPS.  BACKGROUND  PURPOSE  STATEGY  MISSION STATEMENT  GOALS  IDC CAREERS  IDC PROFESSIONAL PROFILE  NAVY.
Police Operations. Hiring Process You need to decide – What size department Small, medium, large – Will it be a job or a career Retirement options –
Historian Geographer Hpweurhywef goyugfgSDF YUGUYGF uygweg wgeufygwgf owyefpui ye pr98ywepttryqpieurgyayugfipuwyegfpuuyaergiupyaeurgfyuauhgrtoiagpyuhergieriuyhg.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Integration of AIRLINE Online into Syllabus
Noah Garcia-Galan *Some information in this presentation comes from outside sources.
u Computer Engineer/Systems Analyst u Computer Operator/Programmer u Computer Technician.
Transporter Systems Operation
Navy/Marine Corps Watch Standing. Learning Topics Introduction General Orders Reasons we stand watch Types of watches Scenario Deck Log Watch terms Watch.
Introduction to System Administration CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
© 2001 Business & Information Systems 2/e1 Chapter 3 Information System Fundamentals.
NDIA – Expeditionary Warfare Conference
English Pirate – Early 18 th Century Kevin Graeler Maisam Naqvi.
Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher.
The Role of Information Security In the enhancement of Maritime Security By: Dr. Ahmed Kassar Arab Academy for Science, Technology and Maritime Transport.
Afloat EW and IW Systems Topic 14 Afloat EW/IW Systems
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
INPUT THE LCARS COMPUTER NETWORK AUTHORIZED ACCESS ONLY PLEASE INPUT COMMAND CODES X XXX-XXX-XX-XXX-X Command code verified Accessing dataabse.
CHAPTER 1 THE CHALLENGE OF LEADERSHIP CHAPTER 1 THE CHALLENGE OF LEADERSHIP MODULE: LEADERSHIP UNIT 1: NAVAL LEADERSHIP MODULE: LEADERSHIP UNIT 1: NAVAL.
1 USS CORONADO (LCS-4) CDR John Kochendorfer Commanding Officer Blue Crew.
HY Military History of the American Civil War Wayne E. Sirmon, M.A., M.A.Ed. Departments of Military Science & History University of South Alabama.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
1 Staff Officer Coordination USAMPS Captain’s Career Course.
Time Dilation We can illustrate the fact that observers in different inertial frames may measure different time intervals between a pair of events by considering.
We are entering orbit of the eighth planet. They have sent transport co-ordinates.
True Confessions of Charlotte Doyle
New And Exciting Board Games! Catalog Navigation Use the arrow buttons in the lower right corner to control the navigation.
Notes By: Savanna. Birth Grace was born in the early part of the sixteenth century, Grace was the only daughter of Dudara and Margaret O’Malley. Dudara.
The U.S.S. Alabama The U.S.S. Alabama By: Maxwell, Zack & Jacob.
Norfolk Naval Shipyard By: Moesha About The Captain About The Captain Captain Richard D. Berkey was born and raised in Windber, Pennsylvania and entered.
1 California State University, Fullerton Chapter 3 Information System Fundamentals.
Chapter 8 System Management Semester 2. Objectives  Evaluating an operating system  Cooperation among components  The role of memory, processor,
This web site is dedicated to all the families, friends and the crew members present and past who served aboard the ship named Providence. It is a tribute.
Civil Air Patrol: A Gold Medal Experience. What is the Civil Air Patrol ?  From our beginning, December 1,1941, Administrative order signed by F.H. LaGuardia,
SIDE SCAN Theory and Operation
Information Dominance in a Denied Environment Reflections from USS BONHOMME RICHARD LHD 6 Captain John Funk 6 April 2011.
1 Thinking Do you play any computer games – whether on a PC, on your phone, or any other platform? What types of games do you play the most? Are.
SIDE SCAN Theory and Operation
Rating as defined on STCW Code, means a member of the ship's crew
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Purpose And Scope To inform future officers about the US Army Air Defense Artillery Branch with focus on BOLC and early officer career.
IMPLICATION OF CHOOSING HOME ECONOMICS STRAND OF GRADE 11 STUDENTS OF THE CORON SCHOOL OF FISHERIES.
International Surface Warfare Officer School
Introduction to System Administration
Calico Jack (Jack Rackham)
The Submarine Challenge
SCOUT SNIPER BASIC COURSE
AVENGER CLASS STARSHIP
Section 11.7 Probability.
TOLLING FOR THE BOATS NOVEMBER.
Title I Program Parent Orientation Wasilla high School
ADVANCED MACHINEGUN COURSE
Presentation transcript:

INPUT THE LCARS COMPUTER NETWORK AUTHORIZED ACCESS ONLY PLEASE INPUT COMMAND CODES X JOLLY ROGER Command code verified Accessing dataabse

LOADING X JOLLY ROGER HIGH OFFICERS EXCELSIOR CLASS X

Accessing The Jolly Roger is wanted by Star Fleet and the Romulan Empire for acts of piracy against many transport vessels and various remote starbases. Based on a vessel signature analysis the starship Jolly Rogger is the USS Cairo NCC an Excelsior Class Transwarp Powered federation vessel that mysteriously disappeared (MIA) in Jolly Roger JOLLY ROGER History

LOADING X JOLLY ROGER HIGH OFFICERS EXCELSIOR CLASS X

Accessing Ekatarina Tretiak Captain Human Female 31 years Born : Kiev Career 17 years Significant Skills Starship helm operations Leadership Starship tactics Commerce & Negotiations Captain Tretiak obtained spectacular results during her studies at the Academy of Star Fleet. Knowned for her swing of mood and her irascible and independent character, she made herself a bad reputation with her junior officers that she was replacing regularly. Her ship had disappeared in 2374 on Yadalla Prime during a mission near the Romulan Neutral Zone. The romulan government always denied any involvement in this disappearance. Star Fleet command suspected that Tretiak allegedly sold technological secrets and knowledges to romulan secret services.

Accessing Mol’Tock Second in command Most probably Bolian Male 58 years Born : Unknowned Career 16 years Significant Skills Starship helm operations Intimidation Strategist expert Close combat Mol’Tock is presumed to be the consort of the Captain Tretiak. He is her principal and most valuable ally and have valuable contact in different star syste,m

LOADING X JOLLY ROGER HIGH OFFICERS EXCELSIOR CLASS X

Excelsior Parameters Purpose : The Excelsior's ship were the backbone of the fleet for a long period of time. They were used for a variety of mission profiles, ranging from deep space exploration and terraforming missions, to patrol duty, to courier and transport runs. Standard Excelssior Class vessel Accessing General Specifications Length : m Beam : m Height : 86.76m Decks : 34 Speed : Warp 9 Crew :175 standard Max Armament: Phaser arrays Type-8 Photon Torpedo Defense system : Standard deflector shield system, total capacity 750,000 TeraJoules Standard Duranium Single hull. Standard level Structural Integrity Field

INPUT THE LCARS COMPUTER NETWORK AUTHORIZED ACCESS ONLY PLEASE INPUT COMMAND CODES X