A ‘pearl’ could be viewed as a sphere of influence seeded, secured and maintained through the use of economic, geopolitical, diplomatic or military means.
Even as imagined and real cyber security threats scale new heights, the story coming out of the recently concluded Second International Conference on Cyberspace in Budapest was one of a widening gulf between countries, notwithstanding the stated intent of bridging differences through dialogue.
The Prime Minister’s address highlighted critical threats to internal security and expected counter-measures with the aim of refocusing the attention of the police forces on these vital issues.
The two recent malware attacks on energy companies in West Asia are particularly worrisome since they represent a rapid escalation in capabilities and intent on the part of the perpetrators.
The raging controversy on social media regulation post the violence in Assam has left the government in a losing perception battle. It is time to engage with the new media and exploit its potential to communicate strategically and not shoot the messenger
India should support the idea of TCBMs (transparency and confidence building measures) as a first step towards a code of conduct or eventual cyber security convention.
There is an ongoing global competition to gain dominance in the space and cyber domains; while going it alone might be the best policy, collaboration with clearly laid out guidelines and end-goals is not without its benefits.
The absence of agreed norms of conduct in cyberspace and the scope for conducting a myriad range of malafide activities with limited risk of retribution is leading to both vertical and horizontal proliferation of such activities.
Publisher: Institute for Defence Studies and Analyses
This report argues that Government and the private sector give cyber security some priority in their security and risk management plans, and do this jointly. Being a report that is addressed to the security community in the widest sense and intended to stimulate public discussion, it relies on publicly available information.
Free E-Book Available
Where the next headline grabbing cyber event would take place or in what form is difficult to predict, though it could well be perpetrated by a class that is yet to open its account, the cyber terrorist.