Cyber Security

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
  • India’s Strategic Options in a Changing Cyberspace

    • Publisher: Pentagon Press
      2018
    The book is structured to perform a role both as a primer to those who wish to understand the strategic issues and key concepts in cyberspace, as well as to provide sufficient pointers to those who wish to have an in-depth understanding on specific issues.

    Among the major issues examined are the efficacy of the concept of cyber deterrence, the troubled history of norm-making in cyberspace, protecting critical infrastructure from crippling cyber attacks, the viability of Active Cyber Defence as a means of responding to the sheer scale of attacks, and its attendant legal and ethical issues. Emerging technologies and their potential impact on an already dynamic domain are also the subject to scrutiny, as also the various models of public-Private Partnership in cybersecurity around the world.

    • ISBN: 978-93-86618-66-5,
    • Price: ₹.746/-
    • E-copy available
    2018

    Revisiting Aadhaar System: Post the Supreme Court Verdict

    One understands that long term benefits of Aadhaar actually outweighs many concerns. However, adequate norms need to be laid down from collection to retention of biometric data, in addition to formulating strong data protection and privacy laws.

    November 02, 2018

    Making Private Companies Accountable For Breach of User Private Data

    Mega data breaches of user’s private digital data in the last two years has drawn the world’s attention towards protection, safe custody and management of this extremely valuable commodity.

    October 24, 2018

    IDSA-BIMSTEC Workshop on Cyber Security Cooperation

    Event: 
    Conference
    December 05, 2018 to December 07, 2018

    Garvit Gangwar asked: How frequently India faces external cyber-attack? Which countries are prime sources of these attacks?

    Munish Sharma replies: On March 16, 2018, Ministry of Electronics and Information Technology in a written reply to a question informed Rajya Sabha (Council of States):

    “As per the information reported to and tracked by Indian Computer Emergency Response Team (CERT-In), a total no. of 44679, 49455, 50362 and 53081 cyber security incidents were observed during the year 2014, 2015, 2016 and 2017 respectively.”

    Why wait for the elusive tipping point in cyber?

    The UNGGE process is the least bad option to keep open channels and maintain continued focus on securing cyberspace.

    March 21, 2018

    The Crypto Heist in Japan: Regulator’s Dilemma, Consumer’s Detriment

    The dexterity with which Japan handles this case and the follow-up measures it adopts will strongly influence other countries to either liberalise the use of cryptocurrencies or strictly forbid them in the interest of consumers, law enforcement and national security.

    February 13, 2018

    The Darkening Web: The War for Cyberspace, by Alexander Klimburg

    The introduction to Alexander Klimburg’s book, The Darkening Web: The War for Cyberspace, begins by referencing the Indian parable of the Blind Men of Hindoostan and the elephant to bring out the difficulty of ‘grasping the entirety of cyberspace’. The focus of his book is on international security, and more specifically, the security interests of states in cyberspace. That said, a large part of the book focuses on three countries—the United States, Russia and China—and their approaches and actions in cyberspace. Europe is mentioned largely in the context of privacy and data laws.

    October 2017

    The Darkening Web: The War for Cyberspace, by Alexander Klimburg

    The introduction to Alexander Klimburg’s book, The Darkening Web: The War for Cyberspace, begins by referencing the Indian parable of the Blind Men of Hindoostan and the elephant to bring out the difficulty of ‘grasping the entirety of cyberspace’. The focus of his book is on international security, and more specifically, the security interests of states in cyberspace. That said, a large part of the book focuses on three countries—the United States, Russia and China—and their approaches and actions in cyberspace. Europe is mentioned largely in the context of privacy and data laws.

    October 2017

    The Flaw of Immediate Cyber Counter Strikes

    A dominant paradigm for militarised cyber operations, owing to a growing interest in such actions, is seeking an ability to strike back and launch cyber counter attacks immediately after being attacked. This commentary challenges view based on the argument that it leads to a contra-productive tit-for-tat game with no decisive or deterrent outcome. It argues that cyber attacks are information, which an initially passive targeted society can gather to refine and consolidate its cybersecurity and over time receive an advantage over the initial attacker.

    September 2017

    Pages

    Top