Cyber Warfar

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Operational Lessons of the Wars of 21st Century

    Operational Lessons of the Wars of 21st Century

    Military capabilities matter. Countries and regions where wars have taken place have one important attribute- battle and operational experience. The monograph examines 21st century wars in Afghanistan, Iraq, Lebanon, Georgia and Libya. New trend of cyber war is also included. Key highlights have been extracted and distilled into lessons to be learnt.

    2013

    India's Cyber Security Challenges

    India's Cyber Security Challenges
    • Publisher: Institute for Defence Studies and Analyses
      2012

    This report argues that Government and the private sector give cyber security some priority in their security and risk management plans, and do this jointly. Being a report that is addressed to the security community in the widest sense and intended to stimulate public discussion, it relies on publicly available information.

    • ISBN 81-86019-98-7,
    • Price: ₹. 125/-
    • E-copy available
    2012

    China’s Cyber Warfare Capability and India’s Concerns

    The Chinese cyber warfare department’s multiple agencies and individuals are seriously working towards the overall objective of instantly disrupting or at least weakening the adversary’s computer networks so as to paralyse his decision making capability at the very commencement of hostilities. It is very difficult to protect networks from such attacks. The weakest link in cyber security measures are the persons operating the system who often, knowingly or unknowingly, default on cyber security measures.

    April 2011

    Cyber Wars: A Paradigm Shift from Means to Ends

    The last couple of decades have seen a colossal change in terms of the influence that computers can have on the battlefield, with defence pundits claiming it to be the dawn of a new era in warfare. Under these circumstances, there has been a gradual paradigm shift in military thinking and strategies from the strategic aspect to the tactical aspect of cyber warfare, laying more emphasis on it being a potent force multiplier. The author believes this is wrong and rather than cyber warfare being an enhancement of traditional operations, the latter will be force multipliers of cyber warfare.

    March 2010

    Top