Challenges of Cyber Threat to National Security

  • R. Sudhakar
Keywords: Cyber Security, Digitalized Battle Field, Cyber Warfare, Cyber Defence, Revolution in Military Affairs

Abstract

The digital future in present scenario is truly a realistic prospect for any nation. In present digitized battlefield, where network infrastructure plays a major role as part of conventional weaponry, the most dangerous weapon on the earth could be the unassuming personnel computers. The threat of cyber attack, terrorism, or indeed cyber warfare, is an intangible concept, covering everything from a simple individual hacking into restricted databases up to sophisticated malwares capable of crippling national critical information infrastructure on a colossal scale. India’s hopeful economic growth is due to globalization and the ability to reliably connect to the rest of the world via cyber and Information Technology System. Indian armed forces are undoubtedly a major target for adversaries that include state and non-state actors. Hence, there is a need to evolve an appropriate strategy by military intelligence system and civil agencies in a synergic effort to protect valuable information being destroyed or reaching the hands of enemies. Therefore there is a need to implement comprehensive defensive measures in the field of information security in armed forces and other crucial sectors in the country. There is also a need to layout comprehensive cyber warfare capability within the Indian Armed Forces that could be used during the peacetime and most importantly in conflict situation. In this context, the important components would be Cyber Warfare Strategy, Cyber Warfare Intelligence, Cyber Warfare Offensive and Defensive Capabilities.

References

1. Sundaram Ranjit, (2012), “Emerging Technologies and their Impact on War Fighting”, MAI, Issue No.22, SP guide publications.
2. Bakshi, Prashant Terrorism Online, www.satp.org/satporgtp/publication/idr/vol_16(1)/Prashant.htm accessed on July 5, 2018
3. Conway Maura, “Cyber Terrorism: The Story So Far”, http://doras.dcu.ie/496/1/info_warfare_2_2_2003.pdf, accessed on May 24, 2018
4. Achkoski Jugoslav, Dojchinovski Metodija, “Cyber Terrosim and Cyber Crime-Threats for Cyber Security”, http://eprints.ugd.edu.mk/6502/2/__ugd.edu.
5. Weimann Gabriel, (March 2004) “www.terror.net How Modern Terrorism Uses the Internet”; Special Report, United States Institute of Peace, Washington.
6. Sirohi.M.N., (2015), “Cyber Terrorism and Information Warfare”, Vij Books India Pvt ltd, New Delhi.
7. “Indian Navy investigates cyber attack on military PCs”, BBC, July 04, 2012, in http://www.bbc.com/news/technology-18703508, accessed on July 7, 2014.
8. Dilipraj. E, (2017), “Cyber Enigma: Unraveling the Terrors in the Cyber world”, Knowledge World Publication, New Delhi.
Published
2018-10-27
Section
Articles