Cyber Security

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
  • A Cyber Wing in the National Cadet Corps

    A Cyber Wing in the National Cadet Corps

    India’s vulnerability to cyber-attacks is going to increase exponentially with the development of infrastructure and programmes such as Digital India, National Optical Fibre Network, e-Governance, e-commerce and e-Services. The NCC provides a ready resource for picking up India’s cyber warriors in the available time frame.

    April 06, 2015

    Asian Participation in the London Process

    Asian Participation in the London Process

    While Asia is home to the largest number of internet users on the planet, there is comparatively little contribution from the region to the discussions on cybersecurity.

    March 31, 2015

    Islamic State and Social Media: Ethical Challenges and Power Relations

    Islamic State and Social Media: Ethical Challenges and Power Relations

    The IS frequently releases graphic videos of, for instance, beheadings, on social media. Once these videos surface, an ethical debate arises about the sharing of violent imagery and how these social platforms should deal with the situation.

    January 23, 2015

    The US-North Korea Cyber Dispute

    The US-North Korea Cyber Dispute

    US authorities have claimed that North Korea was behind the cyber-attack on Sony Pictures. But North Korea has strongly denied this claim. Now, both countries are threatening to fight this ‘battle’ in cyber space.

    December 26, 2014

    Taking Stock of the Public-Private Partnership in Cybersecurity

    Taking Stock of the Public-Private Partnership in Cybersecurity

    Effective cybersecurity calls for a close partnership between the government in its role as custodian of the nation’s security, and the private sector, in both roles of information infrastructure provider as well as the provider of many critical services.

    December 31, 2014

    Cyber: Also a Domain of War and Terror

    India, the IT nation, did not make a news splash at CyberTech 2014. That is worth a passing thought. Because cyber is the fifth and new domain of warfare, after land, sea, air and space.

    January 2015

    The Geopolitics of Cyber Espionage

    There is an intricate relationship between the methods of cyber espionage and the evolution of information and communications technology, of which information security is a key aspect. This article is an attempt to establish forward and backward linkages of cyber espionage. It examines the geopolitics, methods, role of information security technology and, most importantly, how the future of cyber espionage is being shaped by emerging technologies such as supercomputing, quantum computing and ‘big data’, from an Indian perspective.

    January 2015

    Cybersecurity: Global, Regional and Domestic Dynamics

    Cybersecurity: Global, Regional and Domestic Dynamics

    Governments find themselves struggling to deal with the issue of cybersecurity. Given the current state of play in cybersecurity, it is not surprising that any discussion sooner or later ends up as a confusing mix of viewpoints on fundamental rights, privacy, law enforcement, human rights, globalisation and national security, thus leading to a gridlock.

    2014

    Internal Security Priorities for the New Government: Institutional Reforms

    Internal Security Priorities for the New Government: Institutional Reforms

    The IDSA policy brief looks into the complexity of internal security challenges and how best to deal with it. The brief suggests building a Centre-State synergy to cope with contemporary trends like increasing urbanization, growth of mega cities, demographic shift, rising expectations of the youth and social media.

    May 19, 2014

    The US’ Surveillance Review Panel Report: An Assessment

    The 300-page report has 46 recommendations offering drastic solutions while addressing many of the issues in the wake of the Snowden revelations. The Administration has already rejected a key recommendation; that since both the NSA and Cyber Command have conflicting functions, the NSA should be placed under civilian control and should be split from the Cyber Command.

    January 09, 2014

    Pages

    Top