National Security in the Digital Age


Book Description

In this pioneering study, Sushma Devi explores the place of cybersecurity within the larger international debate on security issues. She argues that it is important to begin placing cybersecurity in the context of national security matters since the issues are most often relegated to technology debates. *National Security in the Digital Age *argues that cyber threats can be viewed as national security matters and therefore should be relevant to the security studies field and should be analyzed using security studies theories. It also highlights the policy and institutional responses to cybersecurity challenges undertaken by the government of India. Unexplored security issues frequently identified in the world today, including those in a critical region of international conflict, are thus central to this book. The use of internet is rapidly expanding and has become the core component of everyday society. Yet easy access to data brings along severe security issues. The large number of attacks in recent years have had serious economic and social consequences, resulting in state officials all over the world acknowledging the importance of effective cybersecurity. Nevertheless, implementing effective measures to secure cyberspace remains difficult. A cyber threat has the potential to breach all levels of security very quickly due to the speed with which actions can occur and the extent of our interconnectedness. For a geopolitical realist, states play a central role in addressing cyber threats to national security because they remain the actors with the power and authority to improve defenses against most existential cyber threats. While private sector actors in most countries are critical to security in cyberspace, the threat agents can be criminals, hackers, terrorists, and nation-states. The potential victims at risk from these threats are equally diverse. Threat actors often target personal information to commit fraud, an act that can, in the inter-connected world of cyberspace, make all individuals in a nation potential victims. Herein lies the complexity of analyzing the inflow/outflow of information across borders and the ramification of this analysis for national security.







Privacy and Security Challenges in Location Aware Computing


Book Description

Location-aware computing is a technology that uses the location (provides granular geographical information) of people and objects to derive contextual information. Today, one can obtain this location information free of cost through smartphones. Smartphones with location enabled applications have revolutionized the ways in which people perform their activities and get benefits from the automated services. It especially helps to get details of services in less time; wherever the user may be and whenever they want. The need for smartphones and location enabled applications has been growing year after year. Nowadays no one can leave without their phone; the phone seemingly becomes one of the parts of the human body. The individual can now be predicted by their phone and the identity of the phone becomes the person’s identity. Though there is a tremendous need for location-enabled applications with smartphones, the debate on privacy and security related to location data has also been growing. Privacy and Security Challenges in Location Aware Computing provides the latest research on privacy enhanced location-based applications development and exposes the necessity of location privacy preservation, as well as issues and challenges related to protecting the location data. It also suggests solutions for enhancing the protection of location privacy and therefore users’ privacy as well. The chapters highlight important topic areas such as video surveillance in human tracking/detection, geographical information system design, cyberspace attacks and warfare, and location aware security systems. The culmination of these topics creates a book that is ideal for security analysts, mobile application developers, practitioners, academicians, students, and researchers.




INDIA'S NATIONAL SECURITY: ISSUES AND CHALLENGES


Book Description

The book explores the critical and dominant issues that are present in the national security of India. The book examines some of the crucial problems that range from physical terrorism to advanced forms of security menaces that operate from diverse levels and various angles. As we all know that India’s national security has been a hotbed of numerous issues, and in contemporaneous times issues and challenges like cyberterrorism, new age militancy and usage of social media tools for spreading terrorism have a new trend for spreading terrorism has been one of the biggest and deadliest issues in our national security which have given a tough challenge for our national security bodyguards. The book tosses light on some of the essential issues that we are going to face at present or face in the future. The book debates the problems of terrorism mostly and argues how this sort of evolved structure of terrorism has enabled its terrorist associations to bolster their foundations. The book analyses issue like social media terrorism, cyber security issues like enjoying social media at the cost of cyber terrorism, and the rise of women in militancy-related cases from recruitment to radicalization, besides carrying forward the organization messages for recruitment and radicalization. Last but not least, the book also throws light on the issues and challenges that have surrounded India’s foreign policy, like India’s civil nuclear power and other forms of energy issues that can help India grow in terms of energy, thereby making India a self-reliant nation.




India’s Cybersecurity Policy


Book Description

This book examines India’s public policies on cybersecurity and their evolution over the past few decades. It shows how threats and vulnerabilities in the domain have forced nation-states to introduce new policies to protect digital ecosystems. It charts the process of securitisation of cyberspace by the international system from the end of the 20th century to the present day. It also explores how the domain has become of strategic interest for many states and the international bodies which eventually developed norms and policies to secure the domain. Consequently, the book discusses the evolution of cybersecurity policy at global level by great powers, middle powers, and states of concern and compares them with the Indian context. It also highlights the requirement of introducing/improving new cybersecurity guidelines to efficiently deal with emerging technologies such as 5G, Artificial Intelligence (AI), Big Data (BD), Blockchain, Internet of Things (IoT), and cryptocurrency. The book will be of great interest to scholars and researchers of cybersecurity, public policy, politics, and South Asian studies.




Strategies for e-Service, e-Governance, and Cybersecurity


Book Description

In the world of digitization today, many services of government and industry are carried out in electronic mode in order to avoid the misuse of natural resources. The implementation of e-services also provides transparency and efficiency. However, these e-services are vulnerable to cyber threats and need special measures in place to provide safety and security as they are being used in the cyber space. This new volume provides an introduction to and overview of cybersecurity in e-services and e-governance systems. The volume presents and discusses the most recent innovations, trends, and concerns, as well as the practical challenges encountered and solutions adopted in the fields of security and e-services. The editors bring together leading academics, scientists, researchers, and research scholars to share their experiences and research results on many aspects of e-services, e-governance, and cybersecurity. The chapters cover diverse topics, such as using digital education to curb gender violence, cybersecurity threats and technology in the banking industry, e-governance in the healthcare sector, cybersecurity in the natural gas and oil industry, developing information communication systems, and more. The chapters also include the uses and selection of encryption technology and software.




Understanding Cybersecurity Management in FinTech


Book Description

This book uncovers the idea of understanding cybersecurity management in FinTech. It commences with introducing fundamentals of FinTech and cybersecurity to readers. It emphasizes on the importance of cybersecurity for financial institutions by illustrating recent cyber breaches, attacks, and financial losses. The book delves into understanding cyber threats and adversaries who can exploit those threats. It advances with cybersecurity threat, vulnerability, and risk management in FinTech. The book helps readers understand cyber threat landscape comprising different threat categories that can exploit different types of vulnerabilties identified in FinTech. It puts forward prominent threat modelling strategies by focusing on attackers, assets, and software and addresses the challenges in managing cyber risks in FinTech. The authors discuss detailed cybersecurity policies and strategies that can be used to secure financial institutions and provide recommendations to secure financial institutions from cyber-attacks.




Cybersecurity Issues, Challenges, and Solutions in the Business World


Book Description

Cybersecurity threats have become ubiquitous and continue to topple every facet of the digital realm as they are a problem for anyone with a gadget or hardware device. However, there are some actions and safeguards that can assist in avoiding these threats and challenges; further study must be done to ensure businesses and users are aware of the current best practices. Cybersecurity Issues, Challenges, and Solutions in the Business World considers cybersecurity innovation alongside the methods and strategies for its joining with the business industry and discusses pertinent application zones such as smart city, e-social insurance, shrewd travel, and more. Covering key topics such as blockchain, data mining, privacy, security issues, and social media, this reference work is ideal for security analysts, forensics experts, business owners, computer scientists, policymakers, industry professionals, researchers, scholars, academicians, practitioners, instructors, and students.




Securing India in the Cyber Era


Book Description

This book explores the geopolitics of the global cyber space to analyse India's cyber security landscape. The volume reviews threats to Indian computer networks, analyses the country's policy responses to these threats, and suggests comprehensive measures to build resilience in the system.




India and Africa


Book Description

Among the most significant challenges that India and Africa face are reforms in global governance institutions, maritime security threats in the Indian Ocean, energy insecurity and the rise of extremism and terrorism. This volume combines Indian and African perspectives with regard to the common security challenges they are likely to face in the future.