Cyber Security

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
  • Garvit Gangwar asked: How frequently India faces external cyber-attack? Which countries are prime sources of these attacks?

    Munish Sharma replies: On March 16, 2018, Ministry of Electronics and Information Technology in a written reply to a question informed Rajya Sabha (Council of States):

    “As per the information reported to and tracked by Indian Computer Emergency Response Team (CERT-In), a total no. of 44679, 49455, 50362 and 53081 cyber security incidents were observed during the year 2014, 2015, 2016 and 2017 respectively.”

    Why wait for the elusive tipping point in cyber?

    The UNGGE process is the least bad option to keep open channels and maintain continued focus on securing cyberspace.

    March 21, 2018

    The Crypto Heist in Japan: Regulator’s Dilemma, Consumer’s Detriment

    The dexterity with which Japan handles this case and the follow-up measures it adopts will strongly influence other countries to either liberalise the use of cryptocurrencies or strictly forbid them in the interest of consumers, law enforcement and national security.

    February 13, 2018

    The Darkening Web: The War for Cyberspace, by Alexander Klimburg

    The introduction to Alexander Klimburg’s book, The Darkening Web: The War for Cyberspace, begins by referencing the Indian parable of the Blind Men of Hindoostan and the elephant to bring out the difficulty of ‘grasping the entirety of cyberspace’. The focus of his book is on international security, and more specifically, the security interests of states in cyberspace. That said, a large part of the book focuses on three countries—the United States, Russia and China—and their approaches and actions in cyberspace. Europe is mentioned largely in the context of privacy and data laws.

    October 2017

    The Darkening Web: The War for Cyberspace, by Alexander Klimburg

    The introduction to Alexander Klimburg’s book, The Darkening Web: The War for Cyberspace, begins by referencing the Indian parable of the Blind Men of Hindoostan and the elephant to bring out the difficulty of ‘grasping the entirety of cyberspace’. The focus of his book is on international security, and more specifically, the security interests of states in cyberspace. That said, a large part of the book focuses on three countries—the United States, Russia and China—and their approaches and actions in cyberspace. Europe is mentioned largely in the context of privacy and data laws.

    October 2017

    The Flaw of Immediate Cyber Counter Strikes

    A dominant paradigm for militarised cyber operations, owing to a growing interest in such actions, is seeking an ability to strike back and launch cyber counter attacks immediately after being attacked. This commentary challenges view based on the argument that it leads to a contra-productive tit-for-tat game with no decisive or deterrent outcome. It argues that cyber attacks are information, which an initially passive targeted society can gather to refine and consolidate its cybersecurity and over time receive an advantage over the initial attacker.

    September 2017

    Cryptocurrencies and the Regulators Dilemma

    This special feature explores the mechanics and attributes which have led to the steep rise in the popularity of cryptocurrencies, delves into the risks they pose to the user and the state, and evaluates the opportunities, risks and policy options for India.

    August 01, 2017

    Quantum Computing and its Impact on Cryptography

    Advances in technology has brought into focus the need to have double assurance on data security, especially with the world moving from classical to Quantum Computing, which latter has the power to unlock the toughest of cyber-locks.

    July 19, 2017

    The Petya Cyber-Attack

    Most attacks prior to Petya were carried out by criminals for financial gain, but some characteristics of the Petya malware have led to doubts as to whether the culprits are state actors.

    July 13, 2017

    Analysing Aadhaar through the Prism of National Security

    Though there might be several prevalent concerns over Aadhaar’s data security, these do not outweigh the benefits it has to offer.

    June 22, 2017

    Pages

    Top