Cyber Security
Deterrence Theory– Is it Applicable in Cyber Domain?

… effective cyber deterrence policies require regular, sustained disruption of malicious cyber activity. Such disruption can be technical, legal, logistical, financial, diplomatic, and, in some extreme cases, kinetic. Increasing the scope, scale and tempo of disruption activities should impose high costs on adversaries …

Cyber Weapons – A Weapon of War?

… cyber weapons will be used individually and blended simultaneously with conventional kinetic weapons as force multipliers … for both attacker and defender, it is difficult to predict; cyber weapons often achieve things other than their intended purpose … strategic calculation for attackers thus becomes considerably more complex ... over-reliance by strategists and scholars on such imprecise terminology has significant risks for misinterpretation and premature prescription ...

China’s Cyber-Influence Operations

… With its growing assertiveness in the international arena, China uses new technologies to achieve its foreign policy goals and project an image of responsible global power … spending billions on influence operations across the world ... fits in with China’s larger aim of expanding its soft power alongside its growing economic and military power … reach of Beijing’s overseas media is impressive and should not be underestimated. But the results are mixed ...

Defining China’s Intelligentized Warfare and Role of Artificial Intelligence

China feels that U.S. is its main adversary ... China is trying to match U.S. technological capabilities with its own strength in AI as a leap frog technology and a new concept of war ... But there will be lot of problems in implementing this concept of Intelligentization Warfare to reality. However, President Xi Jinping has thrown the gauntlet, and it is up to the U.S. the other adversaries and the rest of the world to follow this concept keenly.

Cyber DNA of China –Deep, Focussed and Militarised

The strategic goals reconfirmed by the CCP, in late 1970’s, included maintaining domestic stability; sustaining economic growth and development; defending national sovereignty and territorial integrity; safeguarding China’s interest world over. The focus of the Fifth, Sixth and Seventh Five year Plans, was on investing in export industries, infrastructure, adaption and investment in technology development. China began opening its economy to the outside world and embraced market forces. Since then, China’s growth and development have been spectacular.

Cyber Attack on Kudankulam Nuclear Power Plant – A Wake Up Call

… India is among the top three countries in the world after the U.S. and China when it comes to phishing and malware attacks ... While governments can’t control every aspect of cyber security, they can certainly help shape the future of cyber security based on lessons learned from other nations, threats and technologies ... all stakeholders have to their heads together, identify the vulnerabilities in the critical information infrastructure and take remedial measures in a time bound manner …

Research and Development in Cyber Domain and Indian Perspective

… India has to develop its own technologies, an electronic manufacturing base, R&D infrastructure and a highly skilled human resource… talented professionals available in the cyber eco system have to be brought in for research on indigenization of cyber technologies… Though a little late, but given the required priority, funding and impetus India has the capability to develop indigenous technology in cyber domain …

What is Cyber Security ? Status and Challenges: India

The transition from an industrial to an information era has created a new domain, “Cyberspace” and ushered in a new security paradigm with new threats to both national and human security. With large scale automation, rapid penetration of ICT and connectivity the developed nations are enjoying a much better quality of life that also makes them more vulnerable to cyber interventions. Click here to read full paper

Strategic Gaps in India’s Net Centricity

In the digital battle field of 21st century, Technology and Information are the new currencies of power. Exploitation of both of these to create efficiency, economy of effort and facilitate full spectrum operations;nuclear to asymmetric and strategic to tactical, is the essence of Net-centricity. Click here to read full paper

Contact Us