Cyber Security

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
  • Leveraging Cyber Power: A Study of the Approaches and Responses of the Major Powers

    The monograph looks at how major powers have tried to pursue three objectives in cyberspace, viz. (1) strengthening or enhancing national cyber defences, and (2) striving to shape the international cyber environment by leveraging economic and technological capabilities, and (3) through defining and evangelising international cyber norms. A section on the cybersecurity preparedness of the countries of the South Asian region is incorporated to highlight those vulnerabilities and deficient capacities and capabilities that give the major powers a foothold to pursue their objectives.

    2021

    Countering the Menace of Ransomware

    US has undertaken a number of initiatives on cybersecurity, specifically ransomware, one of them being the Counter-Ransomware Initiative Meeting held in October 2021. Whether this attempt by the US to mobilise a larger group of countries to discuss ransomware will lead to real outcomes, or is just meant to endorse its actions, remains to be seen.

    October 22, 2021

    The Dark Web and Regulatory Challenges

    The dark web has turned into a hot bed of illegal transactions, posing a threat to the cyberspace across multiple dimensions.

    July 23, 2021

    Modeling Attribution of Cyber Attacks Using Bayesian Belief Networks

    The article makes an attempt to bring to the fore the various factors which are considered in the due process of attribution of a cyber-attack and the correlation of credible attribution with cyber deterrence. The focal point of the article is a three-step approach to model the decision-making process behind attribution of cyber-attacks using Bayesian Belief Networks and a case study to elucidate on the functioning of the model.

    January 2021

    Cybersecurity and Threats: Cyberterrorism and the Order Today

    The ever-growing dependence of man on cybernetworks has unbridled a modish genre of cyberthreat called cyberterrorism. The pervasive cyberspace has provided an advantageous operational frontier to the terrorists for executing cyberattacks on critical infrastructures, spreading hate propaganda over the Internet and using it for recruitment, planning and effecting terror attacks.

    April-June 2021

    Growing Cyber Risks to Energy Infrastructure

    Cyber-related risks to the energy sector can be minimised by strategic intelligence gathering on potential threat actors, weaving of cyber security strategies into corporate decisions, industry-wide collaboration as well as up-to-date backup systems.

    May 20, 2021

    US Elections 2020 and the Cybersecurity Challenges

    It is critical to reduce the risks associated with cyber-enabled elections by ensuring end-to-end verifiability, protection of voter database, managing risks to the election infrastructure and curbing the menace of disinformation.

    December 03, 2020

    Ankit asked: What are the different modes and forms of cyberterrorism?

    Munish Sharma replies: Terrorist organisations have kept themselves abreast with technological changes, and cyberspace is no exception. They are known to leverage cyberspace for communication, dissemination of propaganda, gaining popularity or attention, radicalisation, recruitment, and even fundraising. Cyberterrorism is an extension of the traditional acts of terror into the cyber domain, and the objective remains the same – to create panic or to cause disruption.

    Decoding Cyberattack on Australia

    With the adoption of varied digital means in times of pandemic, the states are likely to witness increased cyberattacks. Absence of an effective response would only mean an open playground for perpetrators.

    July 14, 2020

    Pages

    Top