Profile

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
  • Munish Sharma

    Consultant
    Email: 
    munish.juit@gmail.com
    Phone: 
    +91 11 2671 7983

    Joined IDSA

    June 2015

    Area of Interest

    Cyber Security, Critical Information Infrastructure Protection, Space Security, Defence Technologies.

    Current Project

    Cyber Security

    Education and Background

    Master of Science in Geopolitics and International Relations from Manipal University, Bachelor of Technology in Electronics and Communications from Japypee University.

    He is an engineering graduate and holds a masters in Geopolitics and International Relations. Prior to masters he worked as software engineer for four years with Accenture Services. Before joining IDSA, he has worked as Research Assistant at the Department of Geopolitics and International Relations, Manipal University. He is Assistant Editor (Research and Analysis) for stsfor.org.

    1. A South Asian Regional Cybersecurity Cooperation - Munish Sharma and Cherian Samuel (February 9-11, 2016)

    Select Publications

    • The Cambridge Analytica episode highlights the need to expedite the process of developing a data protection framework and probably amend the IT Act in accordance with the changing realities of cyberspace.

      March 26, 2018
      IDSA Comments
    • India can play an essential role in mitigating the risks and maximizing the benefits on account of rapid growth of AI enabled technologies.

      February 23, 2018
      Issue Brief
    • The dexterity with which Japan handles this case and the follow-up measures it adopts will strongly influence other countries to either liberalise the use of cryptocurrencies or strictly forbid them in the interest of consumers, law enforcement and national security.

      February 13, 2018
      IDSA Comments
    • Attribution of cyberattacks is an impending issue in enabling a credible deterrent against both state and non-state actors. It applies equally to cases of a criminal nature as well as to those with implications for national security. The technology underlying cyberspace facilitates anonymity and thus affixing responsibility, that is, attributability, is not merely a technological challenge but a political one as well, especially when nation states have proven prowess in engaging their adversaries in cyberspace.

      Journal of Defence Studies
    • Consultant, IDSA, Mr Munish Sharma’s paper on unmanned aircraft systems, titled ‘Unmanned Aircraft Systems: A Disruptive Technology’ was published in the August 2017 edition of the Synergy Journal of the Centre for Joint Warfare Studies.

      Read article

      September 05, 2017
      IDSA News
    • The US decision to elevate its Cyber Command to that of a Unified Combatant Command sends a strong signal to entities and countries inimical to its interests to recalibrate their security calculus.

      August 25, 2017
      IDSA Comments
    • India’s decision to review the imports of IT products from China could turn out to be its Achilles Heel, given that they constitute a key constituent of Chinese exports to India.

      August 18, 2017
      IDSA Comments
    • The DNC and En Marche hacking instances offer a peek into the future: data leaks and cyber means of electoral intervention are likely to become an unfortunate and inevitable part of the electoral process.

      May 22, 2017
      Issue Brief
    • This monograph delves into the various aspects of definitions and understandings of critical information infrastructure and explores the threat actors, perspectives and trends in the emerging practice of critical information infrastructure protection.

      Monograph
    • With the digitisation of services, such as in the case of governance and banking, or the electronic means of conducting commerce or trade, a large amount of data is generated, stored, processed; this also traverses, over digital devices and networks. The incidents of data theft compromise the integrity of this data. Data is at continuous risk from a myriad of threat actors varying from hacktivists to nation states.

      Journal of Defence Studies
    Top