ebook img

Cyber Warfare: Its Implications on National Security PDF

299 Pages·2016·3.25 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Cyber Warfare: Its Implications on National Security

Cyber Warfare Its Implications on National Security Cyber Warfare Its Implications on National Security by Col Sanjeev Relia United Service Institution of India New Delhi Vij Books India Pvt Ltd New Delhi (India) Published by Vij Books India Pvt Ltd (Publishers, Distributors & Importers) 2/19, Ansari Road Delhi - 110 002 Phones: 91-11-43596460, 91-11-47340674 Fax: 91-11-47340674 e-mail: [email protected] Copyright © 2015, United Service Institution of India, New Delhi ISBN   : 978-93-84464-82-0 All rights reserved. No part of this book may be reproduced, stored in a retrieval system, transmitted or utilised in any Form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owner. Application For such permission should be addressed to the publisher. The views expressed in the book are of the author and not necessarily those of the USI or the publishers. Contents Foreword Acknowledgements Abbreviations Introduction Chapters 1. Cyber Space – What does it Mean? 2. Global Cyber Hotspots 3. National Critical Information Infrastructure and its Relevance to National Security 4. Critical Information Infrastructure Protection in India 5. Cyber War Model 6. Cyberwar: The Way Ahead Conclusion Bibliography Index List of Tables, Figures and Maps Figures Figure 1: Four Layered Representation of Cyberspace Figure 2: TCP IP Network Figure 3: Attack Sophistication versus Intruder Knowledge Curve Figure 4: Projected Investment in Infrastructure in 12th Five Year Plan Figure 5: Interdependence of Critical Infrastructure Figure 6: Critical Info-Infrastructure Figure 7: Components of a Smart Grid Figure 8: Smart Grid with Cyber Security Module Figure 9: SCADA Architecture Figure 10: SCADA Systems in a Nuclear Power Plant Figure 11: Benefits of Growth of Telecom Industry Figure 12: Configuration of Satellite Based Communication Network Figure 13: Architecture of 3G Network Figure 14: Building Secure and Resilient Cyberspace Figure 15: Information Security Organisation for CII Figure 16: Key Components of Securing Cyberspace Figure 17: Risk Management Framework and Life Cycle Concept Figure 18: Critical Infrastructure Partnership Advisory Council Figure 19: Process of Risk Management Figure 20: Risk Assessment Figure 21: Cyber Incidence Response Cycle Figure 22: Cyber Asset and Inventory Management Figure 23: Objectives of War Figure 24: Components of a Networked Centric Force Figure 25: Typical Layout of Tactical Communication Network Figure 26: NCW Framework Figure 27: Indian Army Doctrine Figure 28: Cyber Organisation Structure at the National Level Figure 29: Proposed Cyber Organisation Structure at the National Level Figure 30: Proposed Division of National Cyber Budget Figure 31: Organisation of the USCYBERCOM Figure 32: Proposed Organisation of Armed Forces Cyber Command

Description:
Each era brings with it new techniques and methods of waging a war. While military scholars and experts have mastered land, sea, air and space warfare, time has come that they studied the art of cyberwar too. Our neighbours have acquired the capabilities to undertake this new form of asymmetric form
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.