This special feature explores the mechanics and attributes which have led to the steep rise in the popularity of cryptocurrencies, delves into the risks they pose to the user and the state, and evaluates the opportunities, risks and policy options for India.
The DNC and En Marche hacking instances offer a peek into the future: data leaks and cyber means of electoral intervention are likely to become an unfortunate and inevitable part of the electoral process.
This monograph delves into the various aspects of definitions and understandings of critical information infrastructure and explores the threat actors, perspectives and trends in the emerging practice of critical information infrastructure protection.
With the digitisation of services, such as in the case of governance and banking, or the electronic means of conducting commerce or trade, a large amount of data is generated, stored, processed; this also traverses, over digital devices and networks. The incidents of data theft compromise the integrity of this data. Data is at continuous risk from a myriad of threat actors varying from hacktivists to nation states.
This edited volume contains the papers presented at the 18th Asian Security Conference at the Institute for Defence Studies and Analyses held in February 2016. The authors, drawn from government, law enforcement, diplomacy, private sector, armed forces and academia, examine a range of issues central to cybersecurity. The chapters in this volume not only provide an outline of the journey so far, but more importantly, give indicators of future trends in cybersecurity from the vantage point of the respective experts.
Contributions from Asia are particularly highlighted to promote and provoke greater discussion on perspective from within the region on cybersecurity issues.
IDSA Consultant, Mr Munish Sharma’s paper titled ‘Raising a Cyber Command for Indian Armed Forces: Requisites and Organisational Considerations’ was published in the July 2016 edition of ‘Synergy’, a Journal of the Centre for Joint Warfare Studies.
While the China-US Cyber agreement is an attempt at conflict management or risk mitigation, the India-US Cyber agreement is a joint quest for security driven by a common threat perception, democratic values and growing dependence.
Along with physical and system operational security at nuclear power plants, cybersecurity of electronic assets and computer/ICS networks have also become a major concern.
Even if the investigations reveal the technical reason behind the breach, issues of jurisdiction, accountability and dearth of international laws governing cyber or money laundering crimes would await another billion dollar breach.
Terrorist groups like Lashkar-e-Taiba are increasingly taking to social media to further widen their outreach. By integrating social media with self-developed android apps, Lashkar is also turning from mere technology user into a product developer.
Cryptocurrencies and the Regulators Dilemma
This special feature explores the mechanics and attributes which have led to the steep rise in the popularity of cryptocurrencies, delves into the risks they pose to the user and the state, and evaluates the opportunities, risks and policy options for India.
Voter’s Dilemma: Data Leaks and Electoral Interventions
The DNC and En Marche hacking instances offer a peek into the future: data leaks and cyber means of electoral intervention are likely to become an unfortunate and inevitable part of the electoral process.
Securing Critical Information Infrastructure: Global Perspectives and Practices
This monograph delves into the various aspects of definitions and understandings of critical information infrastructure and explores the threat actors, perspectives and trends in the emerging practice of critical information infrastructure protection.
Data Theft: Implications for Economic and National Security
With the digitisation of services, such as in the case of governance and banking, or the electronic means of conducting commerce or trade, a large amount of data is generated, stored, processed; this also traverses, over digital devices and networks. The incidents of data theft compromise the integrity of this data. Data is at continuous risk from a myriad of threat actors varying from hacktivists to nation states.
Securing Cyberspace: International and Asian Perspectives
This edited volume contains the papers presented at the 18th Asian Security Conference at the Institute for Defence Studies and Analyses held in February 2016. The authors, drawn from government, law enforcement, diplomacy, private sector, armed forces and academia, examine a range of issues central to cybersecurity. The chapters in this volume not only provide an outline of the journey so far, but more importantly, give indicators of future trends in cybersecurity from the vantage point of the respective experts.
Contributions from Asia are particularly highlighted to promote and provoke greater discussion on perspective from within the region on cybersecurity issues.
Raising a Cyber Command for Indian Armed Forces: Requisites and Organisational Considerations
IDSA Consultant, Mr Munish Sharma’s paper titled ‘Raising a Cyber Command for Indian Armed Forces: Requisites and Organisational Considerations’ was published in the July 2016 edition of ‘Synergy’, a Journal of the Centre for Joint Warfare Studies.
Read article
India : US :: China : US – Cyber and Bilateral Visits
While the China-US Cyber agreement is an attempt at conflict management or risk mitigation, the India-US Cyber agreement is a joint quest for security driven by a common threat perception, democratic values and growing dependence.
Moving Cyber from the Orbit to the Nucleus of the Nuclear Security Summit
Along with physical and system operational security at nuclear power plants, cybersecurity of electronic assets and computer/ICS networks have also become a major concern.
Bangladesh Bank: The Billion Dollar Breach
Even if the investigations reveal the technical reason behind the breach, issues of jurisdiction, accountability and dearth of international laws governing cyber or money laundering crimes would await another billion dollar breach.
Lashkar-e-Cyber of Hafiz Saeed
Terrorist groups like Lashkar-e-Taiba are increasingly taking to social media to further widen their outreach. By integrating social media with self-developed android apps, Lashkar is also turning from mere technology user into a product developer.