Cyber Security

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
  • Role of Technology in International Affairs

    Role of Technology In international Affairs
    • Publisher: Pentagon Press
      2016

    Recent advances in technology have opened up vast new areas of communication, cooperation and even friction among nations in their pursuit of security, development and progress. Science and technology today transcend almost all areas of international affairs. The role of science and technology in international affairs is so intrinsic that it is rarely recognised as a separate entity and often taken for granted. The impact of modern dual-use technology on human society and national security has become so large that it would be necessary for foreign policy professionals to understand the finer nuances of technology to successfully negotiate international affairs in future. The book Role of Technology in International Affairs is aimed at bringing a clear appreciation of the various interconnections and interdependencies between technology, security, foreign policy and diplomacy that future diplomats must have for navigating towards international peace.

    • ISBN 978-81-8274-881-1,
    • Price: ₹. 995.00
    • E-copy available
    2016

    China’s Emergence as a Cyber Power

    Cyberspace is increasingly becoming an area of contestation among nation states. Similar to the physical domains of land, sea, air and space, superiority in the cyber domain enables a nation state to exert its cyber power. In recent years, China has invested colossal amounts in building the requisite infrastructure and capabilities of its armed forces as well as governance practices to advance towards ‘informationalisation’. This article seeks to discern the motives, threats, objectives, strategy and intent that drive China to amass cyber power.

    January 2016

    India’s Approach to Asia: Strategy, Geopolitics and Responsibility

    • Publisher: Pentagon Press
      2016

    This book offers wide ranging divergent perspectives on India's role in managing and shaping Asian Security. The book offers important ideas on how Asian security will shape up in the future by utilizing the method of scenarios. It is an important contribution to the field of Asian and regional security and India's role in it.

    • ISBN 978-81-8274-870-5
    • E-copy available
    2016

    Hacking + Securities Fraud = New Face of Insider Trading

    Hacking + Securities Fraud = New Face of Insider Trading

    Hacker groups have turned their attention to stock markets not just to disrupt operations but also to trade and make financial gains.

    September 02, 2015

    Concerns About Proposed US Rules on Cybersecurity Products

    Concerns About Proposed US Rules on Cybersecurity Products

    While the Wassenaar Arrangement has instant recall in nuclear circles, it has only recently become a source of turmoil in cybersecurity, after the US Bureau of Industry and Security published rules that are applicable to cyber technologies.

    July 20, 2015

    A Comprehensive Approach to Internet Governance and Cybersecurity

    The pressing issues around cyberspace revolve around internet governance, cybersecurity and drawing up rules of the road for the new domain of cyberwar. While each of these is at a different stage in its evolution cycle, cyberspace itself is facing a watershed moment as insecurities mount. The fragmentation of cyberspace seems inevitable unless there is accelerated movement on resolving the fundamental issues of internet governance and cybersecurity that have been hanging fire for well over a decade.

    July 2014

    Cyberspace: Post-Snowden

    Just as the world was beginning to understand the various dimensions of cyberspace in general, and internet governance in particular, it received the rude shock of the Snowden revelations about the global surveillance carried out by the United States National Security Agency (NSA) in the name of counterterrorism. All kinds of electronic communications of US citizens and non-citizens alike were monitored. Phone tapping and electronic interception were part of this huge operation to collect a haystack of data in the hope of detecting terrorist links to protect national security.

    July 2014

    Cyberspace: The New Strategic Realm in US–China Relations

    In June 2013, President Obama met with President Xi Jinping at Sunnylands, California. The meeting was seen as a chance for the two leaders to get to know each other in a relatively informal setting so they could address the growing mistrust between their countries. While maritime disputes, trade tensions and differences over how to contain the North Korean and Iranian nuclear programmes were high on the agenda, cyber security—in particular Chinese cyber espionage—was the defining issue of this unusual summit.

    July 2014

    National Perceptions of Cyber Threats

    The issue of cybersecurity as an issue for international security has captured the attention of policy makers around the world. A 2011 United Nations (UN) assessment found that only 68 of the 193 UN member states had cybersecurity programmes. By 2012, this had increased to 114 countries. Of the nations with cybersecurity programmes, roughly 40 have publicly identified cybersecurity as a military concern in national military strategies or defence white papers.

    July 2014

    Cyber Terrorism: Electronic Jihad

    Cyber terrorism is a phenomenon that is gaining more and more attention. One reason for this is the concern that modern information and communications technology may be used in order to harm open societies. This concern also involves actual IT systems and the information generated being targets of advanced attacks. That way functions that are important to society could be affected. The term ‘cyber terrorism’ is complex. This article describes the difference between traditional and cyber terrorism.

    July 2014

    Pages

    Top