Cyber Warfare

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
  • The Petya Cyber-Attack

    Most attacks prior to Petya were carried out by criminals for financial gain, but some characteristics of the Petya malware have led to doubts as to whether the culprits are state actors.

    July 13, 2017

    The GCC in Troubled Waters

     Gulf Cooperation Council  2017

    It is unlikely that Qatar will agree to align its foreign policy with that of Riyadh and to rein in Al Jazeera.

    June 13, 2017

    Mahesh Belavi asked: What is India's level of preparedness to deal with massive cyber attacks, and is there any dedicated organisation for this purpose?

    Arul R. replies: The level of preparedness to deal with cyber attack is gradually improving though there is much more left to be done. The framework for responding to cyber attacks has been put in place and is gradually being fleshed out through the implementation of the National Cyber Security Policy (NCSP) of 2013. Meanwhile, a National Cyber Security Coordinator was appointed in 2015.

    Assessing India’s Cyber Resilience: Institutional Stability Matters

    In this commentary, I will use strategic cyberwar theory1 to explain why India has a higher level of cyber resilience than several of its potential adversaries. Even if India has challenges in its government-led cyber defence,2 there are cyber resilience benefits to be drawn from the way Indian society operates, functions and is constitutionally designed and accepted by its constituents, independently of any cyber defence efforts. First, the concept of strategic cyberwar.

    January 2016

    Cyber: Also a Domain of War and Terror

    India, the IT nation, did not make a news splash at CyberTech 2014. That is worth a passing thought. Because cyber is the fifth and new domain of warfare, after land, sea, air and space.

    January 2015

    The Geopolitics of Cyber Espionage

    There is an intricate relationship between the methods of cyber espionage and the evolution of information and communications technology, of which information security is a key aspect. This article is an attempt to establish forward and backward linkages of cyber espionage. It examines the geopolitics, methods, role of information security technology and, most importantly, how the future of cyber espionage is being shaped by emerging technologies such as supercomputing, quantum computing and ‘big data’, from an Indian perspective.

    January 2015

    Sunny Tomar asked: What is the difference between cyber-crime and cyber-terrorism? What is India’s position on both the issues?

    Cherian Samuel replies: From the technical angle, the difference between cyber-crime and cyber-terrorism is only nominal in that the means are the same, but the goals may be different. The same vulnerabilities in networks and systems can be used to attain a variety of goals, from crime to terrorism. As a hypothetical example, the systems of a high-value target such as a nuclear plant may be taken over by criminals and held to ransom or by terrorists for destructive purposes.

    Locked in LOC: Exploring Cyber Offensive Option for India

    India’s niche military and intelligence technologies in the field of cyber, space, robotics and jamming can have potential deterrence value and a ‘war minus’ option against Pakistan.

    August 20, 2013

    The Invisible War in West Asia

    The two recent malware attacks on energy companies in West Asia are particularly worrisome since they represent a rapid escalation in capabilities and intent on the part of the perpetrators.

    September 07, 2012

    China’s new great firewall and publicity offensive

    After ensuring that its people are only able to access ‘filtered’ news, the Chinese leadership has also decided to refurbish its image abroad through a major public relations effort.

    December 19, 2011

    Pages

    Top