Cyber Security

India’s Strategic Options in a Changing Cyberspace

  • Publisher: Pentagon Press
The book is structured to perform a role both as a primer to those who wish to understand the strategic issues and key concepts in cyberspace, as well as to provide sufficient pointers to those who wish to have an in-depth understanding on specific issues.

Among the major issues examined are the efficacy of the concept of cyber deterrence, the troubled history of norm-making in cyberspace, protecting critical infrastructure from crippling cyber attacks, the viability of Active Cyber Defence as a means of responding to the sheer scale of attacks, and its attendant legal and ethical issues. Emerging technologies and their potential impact on an already dynamic domain are also the subject to scrutiny, as also the various models of public-Private Partnership in cybersecurity around the world.

  • ISBN: 978-93-86618-66-5,
  • Price: ?.746/-
  • E-copy available

The Darkening Web: The War for Cyberspace, by Alexander Klimburg

The introduction to Alexander Klimburg’s book, The Darkening Web: The War for Cyberspace, begins by referencing the Indian parable of the Blind Men of Hindoostan and the elephant to bring out the difficulty of ‘grasping the entirety of cyberspace’. The focus of his book is on international security, and more specifically, the security interests of states in cyberspace. That said, a large part of the book focuses on three countries—the United States, Russia and China—and their approaches and actions in cyberspace. Europe is mentioned largely in the context of privacy and data laws.

The Flaw of Immediate Cyber Counter Strikes

A dominant paradigm for militarised cyber operations, owing to a growing interest in such actions, is seeking an ability to strike back and launch cyber counter attacks immediately after being attacked. This commentary challenges view based on the argument that it leads to a contra-productive tit-for-tat game with no decisive or deterrent outcome. It argues that cyber attacks are information, which an initially passive targeted society can gather to refine and consolidate its cybersecurity and over time receive an advantage over the initial attacker.