Search: For - cybersecurity

256 results found

Decoding the Biden Administration’s Cyber Security Policy
Jan 15, 2024

Decoding the Biden Administration’s Cyber Security Policy

The Biden administration is seeking to establish a comprehensive cybersecurity strategy as part of its national security. This issue brief analyses the US’s cyber threat landscape and examines the Biden administration’s cybersecurity strategy. It explores the strategy’s ideological, geopolitical, technological, and diplomatic significance in a rapidly shifting domain.

Defining the protection of ‘the public core of the internet’ as a national interest
Jul 19, 2017

Defining the protection of ‘the public core of the internet’ as a national interest

The norm to protect the public core of the internet, originally advocated by the Netherlands Scientific Council for Government Policy, can be operationalised in two ways. Both a layered approach and a functional approach to defining the public core of the internet provide productive ways to discuss safeguarding the functionality and integrity of the core logical and physical infrastructure of the internet from unwarranted state interventions. Thi

Demystifying DeFi: Digital Money and the Future of Decentralised Finance
Oct 31, 2023

Demystifying DeFi: Digital Money and the Future of Decentralised Finance

The DeFi landscape is complex, encompassing digital assets, blockchain technology, and tokenization. Despite skepticism, it holds potential for financial inclusion, improved taxation, and democratizing investment in private markets.

Digital Dreams, Real Challenges: Key Factors Driving India’s AI Ecosystem
May 08, 2024

Digital Dreams, Real Challenges: Key Factors Driving India’s AI Ecosystem

India, like much of the rest of the world, is faced with the twin but opposing conditions of economic potential and social concerns that need to be negotiated to realise the digital dividends from artificial intelligence (AI) and achieve sustainable and balanced growth. AI systems involve layers of technological dependencies that necessitate and enable social and institutional interdependency between stakeholders, enabling conditions, and resourc

Digital hatred, real violence: Majoritarian radicalisation and social media in India
Aug 28, 2018

Digital hatred, real violence: Majoritarian radicalisation and social media in India

Social media’s impact on mainstream media, and the way people communicate with one another and disseminate information, has become a subject of serious study for journalists, academics and policymakers alike. While it has been a significant equaliser as a vehicle by which the fundamental right to freedom of expression is guaranteed everyone irrespective of class, creed or geography, these very same platforms are also becoming spaces where—in

Drones: Guidelines, regulations, and policy gaps in India
Mar 05, 2018

Drones: Guidelines, regulations, and policy gaps in India

Technology affects us in positive ways yet can also be disruptive; such is the case with Remotely Piloted Aircraft (RPA or more commonly known as drones). While drones are proving to be useful for military, commercial, civilian, and even humanitarian activities, their unregulated use carries serious consequences that need to be addressed. This paper examines drone operations in India and analyses the major policy gaps in the country’s evolving

Electronic and cyber warfare: A comparative analysis of the PLA and the Indian Army
Jul 17, 2019

Electronic and cyber warfare: A comparative analysis of the PLA and the Indian Army

Cyber Warfare (CW) and Electronic Warfare (EW) are crucial to combat in modern warfare. Both are products of Signals Intelligence and constitute one part of Information Warfare (IW) and what is known as Network Centric Warfare (NCW). This paper explores how the People’s Liberation Army (PLA) of China and the Indian Army (IA) have approached CW and EW. Both the PLA and the IA acknowledge NCW as doctrinally important. Organisationally and in Comm

EU-भारत सायबरसुरक्षा भागीदारीचा लाभ
Sep 14, 2023

EU-भारत सायबरसुरक्षा भागीदारीचा लाभ

दोन्ही भागीदारांनी परस्पर सुरक्षा आणि सहकार्य वाढवण्यासाठी विद्यमान राजनैतिक माध्यमांचा वापर केला पाहिजे.

Exploring the Metaverse: Challenges and Opportunities for India in the ‘Next Internet’
Aug 16, 2023

Exploring the Metaverse: Challenges and Opportunities for India in the ‘Next Internet’

The metaverse is a real-time, three-dimensional world that is accessible through Virtual Reality (VR) head-mounted display. Called ‘the next Internet’, the metaverse is multi-technology and incorporates hardware infrastructure with immersive technology, blockchain technology, computer vision, and ubiquitous interfaces. Globally, metaverse is still in the nascent stage as stakeholders work to figure out its innovative and practical app

Fixing Cyber Vulnerabilities: An Agenda for the Quad
Feb 16, 2024

Fixing Cyber Vulnerabilities: An Agenda for the Quad

The COVID-19 pandemic sparked rapid digitalisation worldwide, with work-from-home interactions, online payments, and online consultations for various services becoming acceptable practices. While this shift in the manner and nature of work brought enormous benefits, crucially in terms of access, it has also increased the kind of cyber security threats that countries face, with vulnerabilities felt particularly in the health and financial sectors.

G20 परिषदेच्या अध्यक्षपदासाठी भारताचं सायबर सुरक्षेला प्राधान्य
Dec 07, 2022

G20 परिषदेच्या अध्यक्षपदासाठी भारताचं सायबर सुरक्षेला प्राधान्य

सायबर क्षेत्र सुरक्षित करण्यासाठी आणि सायबर सुरक्षेच्या  समस्यांना प्राधान्य देण्यासाठी जागतिक भागीदारीचे नेतृत्व करण्याची भारताकडे आता संधी आहे.

India & Japan take recent shifts in their stride
Mar 23, 2022

India & Japan take recent shifts in their stride

Talks of a major rift were also put to rest by the joint statement, which largely hewed to India's stated position

India-UK ties amid British political flux
Jul 03, 2024

India-UK ties amid British political flux

India’s ties with the UK are at an interesting crossroads. Regardless of the direction taken, relations seem poised to move in an upward trajectory

Momentum in the India-Australia Relationship on Display With 2+2 Strategic Dialogue
Nov 27, 2023

Momentum in the India-Australia Relationship on Display With 2+2 Strategic Dialogue

Canberra and New Delhi look at each other as vital partners playing critical roles in maintaining peace and stability in the Indo-Pacific.

Securing digital terrain
Mar 17, 2015

Securing digital terrain

The Sony hack is a textbook example of the fog of cyberwar. The whole incident is a telling manifestation of the many aspects of cybersecurity: the question of state behavior in cyberspace; the threat to business advancing public-private cooperation in combating such attacks; and the question of motive

Securing the maritime commons: The role of artificial intelligence in naval operations
Jul 16, 2018

Securing the maritime commons: The role of artificial intelligence in naval operations

Artificial Intelligence (AI) and its limitless application in naval operations has grabbed the imagination of strategic planners worldwide. The applicability of AI to naval operations surpasses its usage in any other military domain due to the hostility, unpredictability and sheer size of the ocean environment. While these systems and vehicles can never be equivalent replacements for human naval commanders and traditional naval vessels, evidence

Social Media and Political Leaders: An Exploratory Analysis
Mar 15, 2022

Social Media and Political Leaders: An Exploratory Analysis

Politicians have always used the media to communicate with the electorate. What makes social media unique is the scale, speed, and minimal cost at which leaders can do this task. This paper analyses the relationship between political leaders and the microblogging site, Twitter. It provides a comprehensive and systematic analysis of the use of Twitter by two contemporary Indian political leaders—Narendra Modi and Rahul Gandhi. It describ

Terrorist Resources, Proclivity for Attacks, and an Effective Counterterrorism Framework
Dec 12, 2022

Terrorist Resources, Proclivity for Attacks, and an Effective Counterterrorism Framework

This paper proposes a counter-terrorism (CT) framework in terms of three types of CT policies—i.e., offensive, defensive, and confidence-building measures (CBMs)— targeted at a terror outfit that is either resource-constrained or resource-abundant. It argues that defensive measures are a ubiquitous element of CT, as these can prove effective irrespective of whether the targeted terrorist group is resource-abundant or resource-constrained. On

The Future of Cyber Warfare in the Indo-Pacific
Jan 13, 2023

The Future of Cyber Warfare in the Indo-Pacific

The rapid growth in military cyber capabilities of the countries in the Indo-Pacific combined with the use of assets from the cyberwarfare toolbox—in domestic and interstate contexts—is adding uncertainty to already competitive political, military, and economic relations. This issue brief assesses the cyberwarfare context in the Indo-Pacific, and reviews the military cyber capabilities of the region’s countries and their commitment to inter

The Future of Cyberwarfare in the Indo-Pacific
Jan 13, 2023

The Future of Cyberwarfare in the Indo-Pacific

The rapid growth in military cyber capabilities of the countries in the Indo-Pacific combined with the use of assets from the cyberwarfare toolbox—in domestic and interstate contexts—is adding uncertainty to already competitive political, military, and economic relations. This issue brief assesses the cyberwarfare context in the Indo-Pacific, and reviews the military cyber capabilities of the region’s countries and their commitment to inter

The G20 Digital Agenda: Cross-Presidency Priorities
Nov 24, 2023

The G20 Digital Agenda: Cross-Presidency Priorities

The G20 Digital Agenda: Cross-Presidency Priorities white paper, co-authored by the World Economic Forum and the Observer Research Foundation (ORF), underscores the importance of a cohesive digital strategy within the G20.

The Growing Tech Focus of the Quad
Jul 09, 2022

The Growing Tech Focus of the Quad

Writing new rules of the road for critical and emerging technologies is a key imperative for the Quad.

Vulnerable in cyberspace
Dec 16, 2016

Vulnerable in cyberspace

The ‘Legion’ hacks expose the dire state of cybersecurity in India. Frequent data breaches will steadily erode the confidence of Internet users and deter them from using digital gateways

We can’t escape the externalities of great power politics
Oct 28, 2022

We can’t escape the externalities of great power politics

As the US and China glare at each other and leave no ambiguity about their rivalrous intent, the rest of the world must watch these shifting dynamics closely for their potential implications

अमेरिका-जपान-दक्षिण कोरिया या त्रिपक्षीय युती समोरील चीनचे आव्हान
Sep 16, 2023

अमेरिका-जपान-दक्षिण कोरिया या त्रिपक्षीय युती समोरील चीनचे आव्हान

सुरक्षेपासून ते व्यापारापर्यंत अनेक बाबींमध्ये या त्रिपक्षीय युतीसमोर चीनचे मोठे आव्हान उभे आहे.

आता धोका चीनी सायबर हल्ल्याचा!
Jul 01, 2020

आता धोका चीनी सायबर हल्ल्याचा!

जगभरातील एक तृतियांश हल्ले सायबर हल्ले हे चीनमधून झाले आहेत. भारतातही लॉकडाऊनच्या काळात फिशिंग, स्पॅमिंग, डेटा चोरीच्या घटना तब्बल तिपटीने वाढल्या आहेत.

आफ्रिकेत सर्वसमावेशक डिजिटल परिवर्तनाचे उद्दिष्ट
Aug 09, 2023

आफ्रिकेत सर्वसमावेशक डिजिटल परिवर्तनाचे उद्दिष्ट

पुरेशा लोक-केंद्रित सायबर सुरक्षा उपायांशिवाय आफ्रिकेतील डिजिटल विभाजन कमी करणे शक्य होणार नाही.

एकाकी दहशतवादाचा वाढता धोका
Dec 23, 2022

एकाकी दहशतवादाचा वाढता धोका

GOI ला एकाकी दहशतवादाला आळा घालण्यासाठी नवीन कट्टरतावादी कार्यक्रम आणि राज्य-पर्यवेक्षित समुपदेशन उपक्रम विकसित करावे लागतील.

ऑनलाइन गेमिंग : सायबर सुरक्षेला असलेले धोके
Aug 18, 2023

ऑनलाइन गेमिंग : सायबर सुरक्षेला असलेले धोके

जगभरातल्या देशांची सरकारे आणि धोरणकर्त्यांनी गेमिंग उद्योगाकडे अधिक लक्ष देण्याची गरज आहे. गेमिंग उद्योगामुळे सायबर सुरक्षेला धोके निर्माण होत आहेत आणि अशा घटनांमध्य�

ऑनलाइन गेमिंग में साइबर सुरक्षा के ख़तरे: भारत के लिए क्या है सबक!
May 21, 2024

ऑनलाइन गेमिंग में साइबर सुरक्षा के ख़तरे: भारत के लिए क्या है सबक!

यह सारपत्र वैश्विक ऑनलाइन गेमिंग उद्योग की तीव्र वृद्धि और इसके परिणामस्वरूप साइबर ख़तरों में वृद्धि की पड़ताल करता है. सूक्ष्म लेन-देन (माइक्रोट्रांज़ैक्शन), धन शोधन (मन�

चीनकडून आयओटी आणि स्मार्ट तंत्रज्ञानाचा धोका: भारताच्या सैन्यासाठी मार्ग
Aug 11, 2023

चीनकडून आयओटी आणि स्मार्ट तंत्रज्ञानाचा धोका: भारताच्या सैन्यासाठी मार्ग

चिनी सॉफ्टवेअर आणि अॅप्लिकेशन्सवर भारतात कारवाई होत असताना, चिनी स्मार्ट तंत्रज्ञानामुळे उद्भवलेल्या राष्ट्रीय सुरक्षेच्या धोक्याकडे त्वरित लक्ष देणे आवश्यक आहे.

चीनी सायबर हल्ले आणि भारत
Mar 19, 2021

चीनी सायबर हल्ले आणि भारत

भारत-चीन सिमेवर तणाव असतांना वीज ग्रिडवर सायबर हल्ला होणे, ही काहीशी नवी आणि आश्चर्यकारक अशी बाजू यावेळी समोर आली आहे.

डिजीटल डेटा प्रोटेक्शन कायद्याचा डळमळीत पाया
Oct 28, 2023

डिजीटल डेटा प्रोटेक्शन कायद्याचा डळमळीत पाया

पाच वर्षांतील विविध मसूदे, सल्लामसलती व मुत्सद्देगिरीचा परिपाक म्हणून जरी डीपीडीपी कायद्याकडे पाहिले जात असले तरी एका ठोस उपायापेक्षा या उपायापर्यंत पोहोचण्याची ही सु

नव्या युगातील गुन्ह्यांवर लक्ष केंद्रित करण्यासाठी जी-२० परिषदेची व्याप्ती वाढवणे
Oct 20, 2023

नव्या युगातील गुन्ह्यांवर लक्ष केंद्रित करण्यासाठी जी-२० परिषदेची व्याप्ती वाढवणे

जी-२० परिषदेने डिजिटल अर्थव्यवस्थेच्या दृष्टिकोनातून सायबरसुरक्षा समस्यांकडे पाहिले असले तरी, सायबर सुरक्षेचे कायद्याच्या अंमलबजावणीशी असलेले संबंध दुर्लक्षित केल�