You are here

Munish Sharma

Voter’s Dilemma: Data Leaks and Electoral Interventions

May 22, 2017

The DNC and En Marche hacking instances offer a peek into the future: data leaks and cyber means of electoral intervention are likely to become an unfortunate and inevitable part of the electoral process.

Securing Critical Information Infrastructure: Global Perspectives and Practices

2017

Basic services such as electricity, transportation, mobile communication and banking are the core infrastructures on which modern societies and economies rest. The seamless functioning of these critical infrastructures is essential for the social and economic development and well-being of a nation-state. Recent developments in the cyber domain have unearthed a whole new dimension of security attributing to underlying vulnerabilities and interdependencies.

Data Theft: Implications for Economic and National Security

January 2017

With the digitisation of services, such as in the case of governance and banking, or the electronic means of conducting commerce or trade, a large amount of data is generated, stored, processed; this also traverses, over digital devices and networks. The incidents of data theft compromise the integrity of this data. Data is at continuous risk from a myriad of threat actors varying from hacktivists to nation states.

Securing Cyberspace: International and Asian Perspectives

2016
Securing Cyberspace:  International and Asian Perspectives

Publisher: Pentagon Press
ISBN 978-81-8274-918-4
Price: Rs. 1295

This edited volume contains the papers presented at the 18th Asian Security Conference at the Institute for Defence Studies and Analyses held in February 2016. The authors, drawn from government, law enforcement, diplomacy, private sector, armed forces and academia, examine a range of issues central to cybersecurity. The chapters in this volume not only provide an outline of the journey so far, but more importantly, give indicators of future trends in cybersecurity from the vantage point of the respective experts.

Contributions from Asia are particularly highlighted to promote and provoke greater discussion on perspective from within the region on cybersecurity issues.

E-Copy available

India : US :: China : US – Cyber and Bilateral Visits

June 09, 2016
India : US :: China : US – Cyber and Bilateral Visits

While the China-US Cyber agreement is an attempt at conflict management or risk mitigation, the India-US Cyber agreement is a joint quest for security driven by a common threat perception, democratic values and growing dependence.

Moving Cyber from the Orbit to the Nucleus of the Nuclear Security Summit

March 30, 2016
Moving Cyber from the Orbit to the Nucleus of the Nuclear Security Summit

Along with physical and system operational security at nuclear power plants, cybersecurity of electronic assets and computer/ICS networks have also become a major concern.

Bangladesh Bank: The Billion Dollar Breach

March 23, 2016
Bangladesh Bank: The Billion Dollar Breach

Even if the investigations reveal the technical reason behind the breach, issues of jurisdiction, accountability and dearth of international laws governing cyber or money laundering crimes would await another billion dollar breach.

Lashkar-e-Cyber of Hafiz Saeed

March 21, 2016

Terrorist groups like Lashkar-e-Taiba are increasingly taking to social media to further widen their outreach. By integrating social media with self-developed android apps, Lashkar is also turning from mere technology user into a product developer.

Dark Web and Encrypted Apps: ISIS Communicates in the Black

February 02, 2016
Dark Web and Encrypted Apps: ISIS Communicates in the Black

As ISIS strives to spread its tentacles in India, it would definitely build up a network of sympathisers and probable recruits, connected digitally with its operatives spread across the globe and available online round the clock.

China’s Emergence as a Cyber Power

January 2016

Cyberspace is increasingly becoming an area of contestation among nation states. Similar to the physical domains of land, sea, air and space, superiority in the cyber domain enables a nation state to exert its cyber power. In recent years, China has invested colossal amounts in building the requisite infrastructure and capabilities of its armed forces as well as governance practices to advance towards ‘informationalisation’. This article seeks to discern the motives, threats, objectives, strategy and intent that drive China to amass cyber power.

Pages