Challenges of Cyber Threat to National Security
AbstractThe digital future in present scenario is truly a realistic prospect for any nation. In present digitized battlefield, where network infrastructure plays a major role as part of conventional weaponry, the most dangerous weapon on the earth could be the unassuming personnel computers. The threat of cyber attack, terrorism, or indeed cyber warfare, is an intangible concept, covering everything from a simple individual hacking into restricted databases up to sophisticated malwares capable of crippling national critical information infrastructure on a colossal scale. India’s hopeful economic growth is due to globalization and the ability to reliably connect to the rest of the world via cyber and Information Technology System. Indian armed forces are undoubtedly a major target for adversaries that include state and non-state actors. Hence, there is a need to evolve an appropriate strategy by military intelligence system and civil agencies in a synergic effort to protect valuable information being destroyed or reaching the hands of enemies. Therefore there is a need to implement comprehensive defensive measures in the field of information security in armed forces and other crucial sectors in the country. There is also a need to layout comprehensive cyber warfare capability within the Indian Armed Forces that could be used during the peacetime and most importantly in conflict situation. In this context, the important components would be Cyber Warfare Strategy, Cyber Warfare Intelligence, Cyber Warfare Offensive and Defensive Capabilities.
2. Bakshi, Prashant Terrorism Online, www.satp.org/satporgtp/publication/idr/vol_16(1)/Prashant.htm accessed on July 5, 2018
3. Conway Maura, “Cyber Terrorism: The Story So Far”, http://doras.dcu.ie/496/1/info_warfare_2_2_2003.pdf, accessed on May 24, 2018
4. Achkoski Jugoslav, Dojchinovski Metodija, “Cyber Terrosim and Cyber Crime-Threats for Cyber Security”, http://eprints.ugd.edu.mk/6502/2/__ugd.edu.
5. Weimann Gabriel, (March 2004) “www.terror.net How Modern Terrorism Uses the Internet”; Special Report, United States Institute of Peace, Washington.
6. Sirohi.M.N., (2015), “Cyber Terrorism and Information Warfare”, Vij Books India Pvt ltd, New Delhi.
7. “Indian Navy investigates cyber attack on military PCs”, BBC, July 04, 2012, in http://www.bbc.com/news/technology-18703508, accessed on July 7, 2014.
8. Dilipraj. E, (2017), “Cyber Enigma: Unraveling the Terrors in the Cyber world”, Knowledge World Publication, New Delhi.
Submission of an article implies that the work described has not been published previously (except in the form of an abstract or as part of a published lecture or academic thesis), that it is not under consideration for publication elsewhere, that its publication is approved by all authors and tacitly or explicitly by the responsible authorities where the work was carried out, and that, if accepted, will not be published elsewhere in the same form, in English or in any other language, without the written consent of the Publisher. The Editors reserve the right to edit or otherwise alter all contributions, but authors will receive proofs for approval before publication.
Copyrights for articles published in International Journal of Innovative Knowledge Concepts are retained by the authors, with first publication rights granted to the journal. The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.