Munish Sharma

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
  • Munish Sharma is Consultant at the Institute for Defence Studies and Analyses, New Delhi. Click here for profile

    Unmanned Aircraft Systems: A Disruptive Technology

    September 05, 2017

    Consultant, IDSA, Mr Munish Sharma’s paper on unmanned aircraft systems, titled ‘Unmanned Aircraft Systems: A Disruptive Technology’ was published in the August 2017 edition of the Synergy Journal of the Centre for Joint Warfare Studies.

    Read article

    US ups the ante in Cyberspace

    The US decision to elevate its Cyber Command to that of a Unified Combatant Command sends a strong signal to entities and countries inimical to its interests to recalibrate their security calculus.

    August 25, 2017

    From Doklam Standoff to a Trade War? India initiates review of IT imports from China

    India’s decision to review the imports of IT products from China could turn out to be its Achilles Heel, given that they constitute a key constituent of Chinese exports to India.

    August 18, 2017

    Cryptocurrencies and the Regulators Dilemma

    This special feature explores the mechanics and attributes which have led to the steep rise in the popularity of cryptocurrencies, delves into the risks they pose to the user and the state, and evaluates the opportunities, risks and policy options for India.

    August 01, 2017

    Voter’s Dilemma: Data Leaks and Electoral Interventions

    The DNC and En Marche hacking instances offer a peek into the future: data leaks and cyber means of electoral intervention are likely to become an unfortunate and inevitable part of the electoral process.

    May 22, 2017

    Securing Critical Information Infrastructure: Global Perspectives and Practices

    This monograph delves into the various aspects of definitions and understandings of critical information infrastructure and explores the threat actors, perspectives and trends in the emerging practice of critical information infrastructure protection.

    2017

    Data Theft: Implications for Economic and National Security

    With the digitisation of services, such as in the case of governance and banking, or the electronic means of conducting commerce or trade, a large amount of data is generated, stored, processed; this also traverses, over digital devices and networks. The incidents of data theft compromise the integrity of this data. Data is at continuous risk from a myriad of threat actors varying from hacktivists to nation states.

    January 2017

    Securing Cyberspace: International and Asian Perspectives

    Securing Cyberspace:  International and Asian Perspectives
    • Publisher: Pentagon Press
      2016

    This edited volume contains the papers presented at the 18th Asian Security Conference at the Institute for Defence Studies and Analyses held in February 2016. The authors, drawn from government, law enforcement, diplomacy, private sector, armed forces and academia, examine a range of issues central to cybersecurity. The chapters in this volume not only provide an outline of the journey so far, but more importantly, give indicators of future trends in cybersecurity from the vantage point of the respective experts.

    Contributions from Asia are particularly highlighted to promote and provoke greater discussion on perspective from within the region on cybersecurity issues.

    • ISBN 978-81-8274-918-4,
    • Price: ₹. 1295
    • E-copy available
    2016

    India : US :: China : US – Cyber and Bilateral Visits

    India : US :: China : US – Cyber and Bilateral Visits

    While the China-US Cyber agreement is an attempt at conflict management or risk mitigation, the India-US Cyber agreement is a joint quest for security driven by a common threat perception, democratic values and growing dependence.

    June 09, 2016

    Moving Cyber from the Orbit to the Nucleus of the Nuclear Security Summit

    Moving Cyber from the Orbit to the Nucleus of the Nuclear Security Summit

    Along with physical and system operational security at nuclear power plants, cybersecurity of electronic assets and computer/ICS networks have also become a major concern.

    March 30, 2016

    Pages

    Top