Cyber Security

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
  • Russia–Ukraine Conflict and Geopolitics of Data Routing

    The Russia–Ukraine conflict, as well as Russia’s 2014 annexation of Crimea, draw light on the geopolitics of data routing and the usage of the Border Gateway Protocol (BGP) as a tool of control.

    April 29, 2022

    A Step Beyond Sabre Rattling: Notes from the Ukraine–Russia Cyberconflict

    Cyberconflict in Ukraine has become normalised in that it is focused, there is no lasting damage, and it effectively conveys a sense of helplessness to the affected government and population. At the same time, it signals to other governments that they are not impervious to such attacks.

    February 23, 2022

    Leveraging Cyber Power: A Study of the Approaches and Responses of the Major Powers

    The monograph looks at how major powers have tried to pursue three objectives in cyberspace, viz. (1) strengthening or enhancing national cyber defences, and (2) striving to shape the international cyber environment by leveraging economic and technological capabilities, and (3) through defining and evangelising international cyber norms. A section on the cybersecurity preparedness of the countries of the South Asian region is incorporated to highlight those vulnerabilities and deficient capacities and capabilities that give the major powers a foothold to pursue their objectives.

    2021

    Countering the Menace of Ransomware

    US has undertaken a number of initiatives on cybersecurity, specifically ransomware, one of them being the Counter-Ransomware Initiative Meeting held in October 2021. Whether this attempt by the US to mobilise a larger group of countries to discuss ransomware will lead to real outcomes, or is just meant to endorse its actions, remains to be seen.

    October 22, 2021

    The Dark Web and Regulatory Challenges

    The dark web has turned into a hot bed of illegal transactions, posing a threat to the cyberspace across multiple dimensions.

    July 23, 2021

    Modeling Attribution of Cyber Attacks Using Bayesian Belief Networks

    The article makes an attempt to bring to the fore the various factors which are considered in the due process of attribution of a cyber-attack and the correlation of credible attribution with cyber deterrence. The focal point of the article is a three-step approach to model the decision-making process behind attribution of cyber-attacks using Bayesian Belief Networks and a case study to elucidate on the functioning of the model.

    January 2021

    Cybersecurity and Threats: Cyberterrorism and the Order Today

    The ever-growing dependence of man on cybernetworks has unbridled a modish genre of cyberthreat called cyberterrorism. The pervasive cyberspace has provided an advantageous operational frontier to the terrorists for executing cyberattacks on critical infrastructures, spreading hate propaganda over the Internet and using it for recruitment, planning and effecting terror attacks.

    April-June 2021

    Growing Cyber Risks to Energy Infrastructure

    Cyber-related risks to the energy sector can be minimised by strategic intelligence gathering on potential threat actors, weaving of cyber security strategies into corporate decisions, industry-wide collaboration as well as up-to-date backup systems.

    May 20, 2021

    Pages

    Top