Munish Sharma

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Munish Sharma is Consultant at the Institute for Defence Studies and Analyses, New Delhi. Click here for profile

    Securing Cyberspace: International and Asian Perspectives

    Securing Cyberspace:  International and Asian Perspectives
    • Publisher: Pentagon Press
      2016

    This edited volume contains the papers presented at the 18th Asian Security Conference at the Institute for Defence Studies and Analyses held in February 2016. The authors, drawn from government, law enforcement, diplomacy, private sector, armed forces and academia, examine a range of issues central to cybersecurity. The chapters in this volume not only provide an outline of the journey so far, but more importantly, give indicators of future trends in cybersecurity from the vantage point of the respective experts.

    Contributions from Asia are particularly highlighted to promote and provoke greater discussion on perspective from within the region on cybersecurity issues.

    • ISBN 978-81-8274-918-4,
    • Price: ₹. 1295
    • E-copy available
    2016

    Raising a Cyber Command for Indian Armed Forces: Requisites and Organisational Considerations

    July 31, 2016

    IDSA Consultant, Mr Munish Sharma’s paper titled ‘Raising a Cyber Command for Indian Armed Forces: Requisites and Organisational Considerations’ was published in the July 2016 edition of ‘Synergy’, a Journal of the Centre for Joint Warfare Studies.

    Read article

    India : US :: China : US – Cyber and Bilateral Visits

    India : US :: China : US – Cyber and Bilateral Visits

    While the China-US Cyber agreement is an attempt at conflict management or risk mitigation, the India-US Cyber agreement is a joint quest for security driven by a common threat perception, democratic values and growing dependence.

    June 09, 2016

    Moving Cyber from the Orbit to the Nucleus of the Nuclear Security Summit

    Moving Cyber from the Orbit to the Nucleus of the Nuclear Security Summit

    Along with physical and system operational security at nuclear power plants, cybersecurity of electronic assets and computer/ICS networks have also become a major concern.

    March 30, 2016

    Bangladesh Bank: The Billion Dollar Breach

    Bangladesh Bank: The Billion Dollar Breach

    Even if the investigations reveal the technical reason behind the breach, issues of jurisdiction, accountability and dearth of international laws governing cyber or money laundering crimes would await another billion dollar breach.

    March 23, 2016

    Lashkar-e-Cyber of Hafiz Saeed

    Terrorist groups like Lashkar-e-Taiba are increasingly taking to social media to further widen their outreach. By integrating social media with self-developed android apps, Lashkar is also turning from mere technology user into a product developer.

    March 21, 2016

    Dark Web and Encrypted Apps: ISIS Communicates in the Black

    Dark Web and Encrypted Apps: ISIS Communicates in the Black

    As ISIS strives to spread its tentacles in India, it would definitely build up a network of sympathisers and probable recruits, connected digitally with its operatives spread across the globe and available online round the clock.

    February 02, 2016

    China’s Emergence as a Cyber Power

    Cyberspace is increasingly becoming an area of contestation among nation states. Similar to the physical domains of land, sea, air and space, superiority in the cyber domain enables a nation state to exert its cyber power. In recent years, China has invested colossal amounts in building the requisite infrastructure and capabilities of its armed forces as well as governance practices to advance towards ‘informationalisation’. This article seeks to discern the motives, threats, objectives, strategy and intent that drive China to amass cyber power.

    January 2016

    Chemicals, Controls and Cyber

    Process automation across industries depends heavily on Industrial Control Systems for monitoring, controlling and supervision. Computer viruses and worms specifically designed to target these control systems deployed in the chemicals processing facilities could be a potent threat if Toxic Industrial Materials are released into the atmosphere, following an engineered accident(cyber attack).

    July-December 2015

    Hacking + Securities Fraud = New Face of Insider Trading

    Hacking + Securities Fraud = New Face of Insider Trading

    Hacker groups have turned their attention to stock markets not just to disrupt operations but also to trade and make financial gains.

    September 02, 2015

    Pages

    Top