Cyber Security

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
  • The Petya Cyber-Attack

    Most attacks prior to Petya were carried out by criminals for financial gain, but some characteristics of the Petya malware have led to doubts as to whether the culprits are state actors.

    July 13, 2017

    Analysing Aadhaar through the Prism of National Security

    Though there might be several prevalent concerns over Aadhaar’s data security, these do not outweigh the benefits it has to offer.

    June 22, 2017

    Voter’s Dilemma: Data Leaks and Electoral Interventions

    The DNC and En Marche hacking instances offer a peek into the future: data leaks and cyber means of electoral intervention are likely to become an unfortunate and inevitable part of the electoral process.

    May 22, 2017

    Data Theft: Implications for Economic and National Security

    With the digitisation of services, such as in the case of governance and banking, or the electronic means of conducting commerce or trade, a large amount of data is generated, stored, processed; this also traverses, over digital devices and networks. The incidents of data theft compromise the integrity of this data. Data is at continuous risk from a myriad of threat actors varying from hacktivists to nation states.

    January 2017

    Sanjay Prakash Sahoo asked: Is there a CERT kind of an approved framework to neutralise cyber threats to our nuclear reactors?

    Munish Sharma replies: The Indian Computer Emergency Response Team (CERT-In) is the national nodal agency to respond to the cyber security incidents. However, nuclear installations are part of India's critical infrastructure. A nodal agency, National Critical Information Infrastructure Protection Centre (NCIIPC), designated by Section 70A of the IT (Amendment) Act, 2008 was established in 2014 to augment the protection of critical information infrastructure in India.

    China’s First Cyber Security Law

    China has justified the passage of the new law as an ‘objective need’ for national security considering its large cyber infrastructure and its vulnerabilities.

    December 23, 2016

    ICANN57: A Backgrounder

    This backgrounder examines the current structure of ICANN, the intricacies of the IANA transition, and the way it will impact the architecture of cyberspace in the future.

    November 04, 2016

    The 'Social Media' Challenge to National Security: Impact and Opportunities: A Conceptual Overview

    The monograph hopes to succeed in providing a conceptual framework to understanding this emerging challenge and draw up a set of best practices and recommendations for policy makers and law enforcement agencies to move forward with.

    2016

    Destination India for Global Conference on Cyberspace 2017

    The 2017 Conference also comes at a time when the existing international discourses on securing cyberspace, whether it be the UNGGE process or the Internet Governance Forum (IGF), seem to be unable to cope with the accelerated developments in cyberspace.

    January 16, 2017

    Securing Cyberspace: International and Asian Perspectives

    Securing Cyberspace:  International and Asian Perspectives
    • Publisher: Pentagon Press
      2016

    This edited volume contains the papers presented at the 18th Asian Security Conference at the Institute for Defence Studies and Analyses held in February 2016. The authors, drawn from government, law enforcement, diplomacy, private sector, armed forces and academia, examine a range of issues central to cybersecurity. The chapters in this volume not only provide an outline of the journey so far, but more importantly, give indicators of future trends in cybersecurity from the vantage point of the respective experts.

    Contributions from Asia are particularly highlighted to promote and provoke greater discussion on perspective from within the region on cybersecurity issues.

    • ISBN 978-81-8274-918-4,
    • Price: ₹. 1295
    • E-copy available
    2016

    Pages

    Top