Technology

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
  • Compact Fusion: Are the Energy Equations About to Change?

    Advanced technologies and supercomputing have accelerated the pace of research and development in the field of nuclear fusion.

    January 10, 2018

    Comprehensive Integrated Border Management System: Issues and Challenges

    Implementation of high-tech solutions without adequately trained personnel is unlikely to help the Border Security Force achieve the goal of foolproof border surveillance.

    October 04, 2017

    Securing Critical Information Infrastructure: Global Perspectives and Practices

    This monograph delves into the various aspects of definitions and understandings of critical information infrastructure and explores the threat actors, perspectives and trends in the emerging practice of critical information infrastructure protection.

    2017

    The race for leadership in supercomputers – does India stand a chance?

    India must move away from the perspective which it has allowed to dominate, namely, that the application of supercomputers is more important than supercomputer technologies themselves.

    September 07, 2016

    God forgives, would Google?

    God forgives, would Google?

    At present, the entire debate on ‘right to be forgotten’ is mainly focused on individual freedom and individual rights. However, it is important to look at this issue from a security angle too.

    June 06, 2016

    Soumyadipta Majumder asked: What are the different modes of encryption?

    Arul R. replies: Encryption is a way of scrambling the data or message thereby securing the data from unintended recipients. Decryption is the way of retrieving the data that is encrypted.

    There are two basic modes of encryption:

    Facebook’s Free Basics: A Digital Apartheid

    Facebook’s Free Basics: A Digital Apartheid

    Free Basics actually leads to converting the internet, which is supposed to be a global public good, into a ‘controlled’ platform. For some this even amounts to compromising on their ‘human rights’.

    January 07, 2016

    Stealth Technology and its Effect on Aerial Warfare

    Stealth Technology and its Effect on Aerial Warfare

    In aerial warfare technology has progressed rapidly from the frail and flimsy machines seen in the air in the first half of the twentieth century. This monograph attempts to commence task of explaining stealth technology, looking at possible counters to stealth and discussing the ways in which stealth technology changes the conduct of aerial warfare.

    2014

    3D Printing and Defence: A Silent Revolution

    In a 3D printing technology, an object is created layer by layer through a specially designed printer using plastic or other materials. The most striking thing about 3D printing is the way it can convert the digital inventory into physical objects thereby reducing the requirement of critical storage space drastically.

    January 03, 2014

    Mohit Gupta : What are the threats posed by communication networks to the internal security of India?

    Cherian Samuel replies: Communication networks are a part of our critical information infrastructure which was defined in the IT Act, 2000 as “the computer resource, the incapacitation or destruction of which, shall have debilitating impact on national security, economy, public health or safety.” Communications networks are crucial to the connectivity of other critical infrastructure, viz. civil aviation, shipping, railways, power, nuclear, oil and gas, finance, banking, communication, information technology, law enforcement, intelligence agencies, space, defence, and government networks. Therefore, threats can be both through the networks as well as to the networks.

    Securing the networks is complicated by a number of factors. In the first instance, much of the hardware and software that make up the communications ecosystem is sourced externally; as a case in point, Chinese manufacturers such as Huawei and ZTE have supplied about 20 per cent of telecommunications equipment while Indian manufacturers have about 3 per cent of the market. As recent incidents have shown, foreign governments are not above taking advantage of the market penetration and dominance of their companies to infiltrate and compromise telecommunications networks. This is a potent combination of expertise and resources.

    The task of securing the networks is also complicated by the fact that much of the infrastructure is in the hands of private companies who see measures such as security auditing and other regulations and frameworks as adding to their costs. The government in the National Telecom Policy of 2012 has set a target for domestic production of telecom equipment to meet the Indian telecom sector’s demand to the extent of 60 to 80 per cent by 2020. The Ministry of Communications and Information Technology has also repeatedly urged telecom companies to take note of vulnerabilities in their equipment and told them they would be held responsible and subject to penalties if the vulnerabilities are not addressed. A number of other measures, such as making local certification mandatory, have been announced, but there is a need for a more integrated and strategic approach to securing the networks since they are so crucial to the economic, social and political wellbeing of the country.

    Pages

    Top