The article makes an attempt to bring to the fore the various factors which are considered in the due process of attribution of a cyber-attack and the correlation of credible attribution with cyber deterrence. The focal point of the article is a three-step approach to model the decision-making process behind attribution of cyber-attacks using Bayesian Belief Networks and a case study to elucidate on the functioning of the model.
China’s proposal for a new Internet Protocol (IP) is a reflection of its desire to revamp and mould the Internet. This is in line with its ambitions to rise to the “commanding heights” of the scientific and technological competition.
Riding the technology wave, China eyes global dominance of RMB as a reserve currency and a favourable international monetary environment for its economic development.
The existing approach to cyber security is heavily tilted towards practising deterrence by denial, essentially by building defences. However, the concept of deterrence needs further tweaking to make it workable in cyberspace.
This monograph examines the key technologies behind 5G, the requirements of infrastructure and spectrum, and the emerging landscape with the rise of Chinese telecommunication equipment manufactures. It delves into China’s rise as a key technology provider in the telecommunications sector, and a prime contributor to standards development.
In this era of complex interdependence, sudden disruptions in supply chains will not only hurt Chinese businesses in the US and elsewhere, but also damage the US economy as well as its reputation as a business destination.
A cyber exercise – whether CyberEx or its successor – needs to be developed as a platform for practitioners and thinkers to test conceptual and technical skills under near-real-world whole-of-nation scenarios of cyber contingencies.
IDSA Consultant Mr Munish Sharma’s article on Maritime Cybersecurity has been published by NMF-India Strategic Year Book 2019 on ‘The Indian Navy: Perspectives and Technologies’, by the National Maritime Foundation.
Analysing maritime cybersecurity, Mr Sharma writes that cybersecurity in maritime domain has two key aspects, on-shore looking at the safe operations of the ships and off-shore for safe business operations of shipping enterprises and terminal operators.
Given India’s dependence on imports for 90 per cent of its telecom equipment, the decision to allow Huawei to bid for 5G should be in line with the national interest, rather than taking sides and constraining options.
A slight push in the right direction would be much more productive and efficient, such as treating telecommunications as a utility rather than a market, and building innovation and IPR ecosystems rather than incentivizing licensed production.
Modeling Attribution of Cyber Attacks Using Bayesian Belief Networks
The article makes an attempt to bring to the fore the various factors which are considered in the due process of attribution of a cyber-attack and the correlation of credible attribution with cyber deterrence. The focal point of the article is a three-step approach to model the decision-making process behind attribution of cyber-attacks using Bayesian Belief Networks and a case study to elucidate on the functioning of the model.
New Internet Protocol: Redesigning the Internet with Chinese Characteristics?
China’s proposal for a new Internet Protocol (IP) is a reflection of its desire to revamp and mould the Internet. This is in line with its ambitions to rise to the “commanding heights” of the scientific and technological competition.
RMB Goes Digital: Economic Imperatives or Ambitions?
Riding the technology wave, China eyes global dominance of RMB as a reserve currency and a favourable international monetary environment for its economic development.
Kudankulam: One Incident, Many Facets
The existing approach to cyber security is heavily tilted towards practising deterrence by denial, essentially by building defences. However, the concept of deterrence needs further tweaking to make it workable in cyberspace.
The Road to 5G: Technology, Politics And Beyond
This monograph examines the key technologies behind 5G, the requirements of infrastructure and spectrum, and the emerging landscape with the rise of Chinese telecommunication equipment manufactures. It delves into China’s rise as a key technology provider in the telecommunications sector, and a prime contributor to standards development.
US-China Trade War and the High Technology Sector
In this era of complex interdependence, sudden disruptions in supply chains will not only hurt Chinese businesses in the US and elsewhere, but also damage the US economy as well as its reputation as a business destination.
Cyber Exercises and the Indian Armed Forces
A cyber exercise – whether CyberEx or its successor – needs to be developed as a platform for practitioners and thinkers to test conceptual and technical skills under near-real-world whole-of-nation scenarios of cyber contingencies.
Maritime Cybersecurity
IDSA Consultant Mr Munish Sharma’s article on Maritime Cybersecurity has been published by NMF-India Strategic Year Book 2019 on ‘The Indian Navy: Perspectives and Technologies’, by the National Maritime Foundation.
Analysing maritime cybersecurity, Mr Sharma writes that cybersecurity in maritime domain has two key aspects, on-shore looking at the safe operations of the ships and off-shore for safe business operations of shipping enterprises and terminal operators.
Read Complete Article [+]
To Ban, or Not to Ban Huawei
Given India’s dependence on imports for 90 per cent of its telecom equipment, the decision to allow Huawei to bid for 5G should be in line with the national interest, rather than taking sides and constraining options.
India’s Tryst with 5G
A slight push in the right direction would be much more productive and efficient, such as treating telecommunications as a utility rather than a market, and building innovation and IPR ecosystems rather than incentivizing licensed production.