Cyber Security

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
  • Social Networking: Boon or Bane for the Armed Forces

    The social networking sites can be exploited by the cyber operators by infiltration and influencing the opinion where feasible. Cyber espionage has already became the cornerstone of some nations, where international cyber security agencies have reasons to believe, of state complicity in major hacking, denial of service attacks in the last couple of years. Since social networks become easy prey to such agencies, there is a need to increase awareness of defence personal about their vulnerabilities.

    October 2010

    Integrated Network Electronic Warfare: China's New Concept of Information Warfare

    The People's Liberation Army (PLA) considers active offence to be the most important requirement for information warfare to destroy or disrupt an adversary's capability to receive and process data. Launched mainly by remote combat and covert methods, the PLA could employ information warfare pre-emptively to gain the initiative in a crisis.

    April 2010

    Are Google and Chinese Communist Party Incompatible?

    There is a contradiction between the CCP methodology which is based on loyalty to the authoritarian ideology and the information age which recognizes the importance of the individual as a critical entity.

    January 28, 2010

    Internet at the Crossroads

    The Internet’s blurred boundaries and its existing vulnerabilities have led to unhealthy trends, which, if not addressed adequately, could pose severe problems.

    December 31, 2009

    New Challenges of Cyberwar: Stocktaking from Mumbai Experience

    The November 2008 Mumbai terrorist attacks have highlighted the new challenges posed by cyberwar. A faked telephone call from the India Foreign Minister to the Pakistani President caused a diplomatic flutter. It appears that the new civilian leadership in Pakistan was not aware of diplomatic protocol involved in such telephonic contacts and was fooled into believing that this was indeed a genuine communication.

    December 31, 2008

    Confronting the Threat in Cyberspace

    Event: 
    Fellows' Seminar
    August 29, 2008
    Time: 
    1030 to 1300 hrs

    Indo-US Attempt to Bite the Illegal Bytes

    Of the several agreements signed during the recently concluded US presidential visit to India, one initiative that has been lost to sight is on Cyber Crimes. As part of the larger counter-terrorism effort and realizing the importance of cyber security and cyber forensic research, India and the US have agreed to enhance cooperation to tackle Cyber Crime. This will lead to a greater sharing of expertise in the areas of tracing computer viruses and software worms and network analysis.

    March 07, 2006

    Cryptology, Digital Assassination and the Terrorism Futures Market

    A recent news item indicated that the US Government had been planning a website that would enable people to place bets on the likelihood of terrorist events. It was hoped that a study of market trends would enable intelligence agencies to anticipate and prevent such events.

    April 2004

    Pages

    Top