You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
  • Munish Sharma

    +91 11 2671 7983
    Archive data: Person was Consultant at MP-IDSA from June 2015 to November 2020

    Joined MP-IDSA

    June 2015

    Area of Interest

    Cyber Security, Critical Information Infrastructure Protection, Space Security, Defence Technologies.

    Current Project

    Cyber Security

    Education and Background

    Munish Sharma is a Consultant in the Strategic Technologies Centre at the Manohar Parrikar Institute for Defence Studies and Analyses. He is an engineering graduate (Electronics and Communications) and holds a Masters degree in Geopolitics and International Relations. Prior to that, he was a software engineer for four years with Accenture Services.

    His research interests include cybersecurity, critical information infrastructure protection, space security and geopolitical aspects of emerging technologies. He analyses technologies such as quantum computing and encryption, blockchain, Artificial Intelligence from a geopolitical perspective as well as concepts like cyber power, cyber espionage and cyber deterrence in the context of China. Munish has authored research papers, articles, briefs and commentaries for various journals, magazines and websites. His recent publications include: India's Strategic Options in a Changing Cyberspace (2018); “Decrypting China’s Quantum Leap,” The China Journal, no. 80 (July 2018); Securing Critical Information Infrastructure: Global Perspectives and Practices (2017); and, Securing Cyberspace: International and Asian Perspectives (2016). He was a Chevening Cyber Security Fellow for 2017-18..

    1. A South Asian Regional Cybersecurity Cooperation - Munish Sharma and Cherian Samuel (February 9-11, 2016)

    Select Publications

    • The article makes an attempt to bring to the fore the various factors which are considered in the due process of attribution of a cyber-attack and the correlation of credible attribution with cyber deterrence. The focal point of the article is a three-step approach to model the decision-making process behind attribution of cyber-attacks using Bayesian Belief Networks and a case study to elucidate on the functioning of the model.

      Strategic Analysis
    • China’s proposal for a new Internet Protocol (IP) is a reflection of its desire to revamp and mould the Internet. This is in line with its ambitions to rise to the “commanding heights” of the scientific and technological competition.

      October 15, 2020
      IDSA Comments
    • Riding the technology wave, China eyes global dominance of RMB as a reserve currency and a favourable international monetary environment for its economic development.

      May 12, 2020
      IDSA Comments
    • The existing approach to cyber security is heavily tilted towards practising deterrence by denial, essentially by building defences. However, the concept of deterrence needs further tweaking to make it workable in cyberspace.

      December 16, 2019
      Issue Brief
    • This monograph examines the key technologies behind 5G, the requirements of infrastructure and spectrum, and the emerging landscape with the rise of Chinese telecommunication equipment manufactures. It delves into China’s rise as a key technology provider in the telecommunications sector, and a prime contributor to standards development.

    • In this era of complex interdependence, sudden disruptions in supply chains will not only hurt Chinese businesses in the US and elsewhere, but also damage the US economy as well as its reputation as a business destination.

      May 22, 2019
      IDSA Comments
    • A cyber exercise – whether CyberEx or its successor – needs to be developed as a platform for practitioners and thinkers to test conceptual and technical skills under near-real-world whole-of-nation scenarios of cyber contingencies.

      May 16, 2019
      IDSA Comments
    • IDSA Consultant Mr Munish Sharma’s article on Maritime Cybersecurity has been published by NMF-India Strategic Year Book 2019 on ‘The Indian Navy: Perspectives and Technologies’, by the National Maritime Foundation.

      Analysing maritime cybersecurity, Mr Sharma writes that cybersecurity in maritime domain has two key aspects, on-shore looking at the safe operations of the ships and off-shore for safe business operations of shipping enterprises and terminal operators.

      Read Complete Article [+]

      May 10, 2019
      IDSA News
    • Given India’s dependence on imports for 90 per cent of its telecom equipment, the decision to allow Huawei to bid for 5G should be in line with the national interest, rather than taking sides and constraining options.

      April 03, 2019
      IDSA Comments
    • A slight push in the right direction would be much more productive and efficient, such as treating telecommunications as a utility rather than a market, and building innovation and IPR ecosystems rather than incentivizing licensed production.

      March 20, 2019
      Issue Brief