Cyber Security

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
  • The 'Social Media' Challenge to National Security: Impact and Opportunities: A Conceptual Overview

    The monograph hopes to succeed in providing a conceptual framework to understanding this emerging challenge and draw up a set of best practices and recommendations for policy makers and law enforcement agencies to move forward with.

    2016

    Destination India for Global Conference on Cyberspace 2017

    The 2017 Conference also comes at a time when the existing international discourses on securing cyberspace, whether it be the UNGGE process or the Internet Governance Forum (IGF), seem to be unable to cope with the accelerated developments in cyberspace.

    January 16, 2017

    Securing Cyberspace: International and Asian Perspectives

    Securing Cyberspace:  International and Asian Perspectives
    • Publisher: Pentagon Press
      2016

    This edited volume contains the papers presented at the 18th Asian Security Conference at the Institute for Defence Studies and Analyses held in February 2016. The authors, drawn from government, law enforcement, diplomacy, private sector, armed forces and academia, examine a range of issues central to cybersecurity. The chapters in this volume not only provide an outline of the journey so far, but more importantly, give indicators of future trends in cybersecurity from the vantage point of the respective experts.

    Contributions from Asia are particularly highlighted to promote and provoke greater discussion on perspective from within the region on cybersecurity issues.

    • ISBN 978-81-8274-918-4,
    • Price: ₹. 1295
    • E-copy available
    2016

    Mahesh Belavi asked: What is India's level of preparedness to deal with massive cyber attacks, and is there any dedicated organisation for this purpose?

    Arul R. replies: The level of preparedness to deal with cyber attack is gradually improving though there is much more left to be done. The framework for responding to cyber attacks has been put in place and is gradually being fleshed out through the implementation of the National Cyber Security Policy (NCSP) of 2013. Meanwhile, a National Cyber Security Coordinator was appointed in 2015.

    Online Radicalisation: The Example of Burhan Wani

    Online Radicalisation: The Example of Burhan Wani

    Effective use of social media fuelled Wani’s rise to prominence. His skills in this domain radicalised youth in greater numbers than had previously been achieved using more conventional methods.

    July 16, 2016

    India - US Cyber Relationship

    India - US Cyber Relationship

    While the intent exists to forge a strong partnership on cyberspace issues, there is much groundwork to be done to actually build trust and move forward together.

    June 14, 2016

    India : US :: China : US – Cyber and Bilateral Visits

    India : US :: China : US – Cyber and Bilateral Visits

    While the China-US Cyber agreement is an attempt at conflict management or risk mitigation, the India-US Cyber agreement is a joint quest for security driven by a common threat perception, democratic values and growing dependence.

    June 09, 2016

    God forgives, would Google?

    God forgives, would Google?

    At present, the entire debate on ‘right to be forgotten’ is mainly focused on individual freedom and individual rights. However, it is important to look at this issue from a security angle too.

    June 06, 2016

    Cyber Menace and Elections in The Philippines

    Cyber Security

    The cyber-attack on the election commission of The Philippines demonstrates the need for democracies to have a strong cyber security mechanism in place for the smooth conduct of elections.

    May 12, 2016

    Moving Cyber from the Orbit to the Nucleus of the Nuclear Security Summit

    Moving Cyber from the Orbit to the Nucleus of the Nuclear Security Summit

    Along with physical and system operational security at nuclear power plants, cybersecurity of electronic assets and computer/ICS networks have also become a major concern.

    March 30, 2016

    Pages

    Top