Query Result Set
Skip Navigation Links
   ActiveUsers:446Hits:18079342Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
SHARMA, MUNISH (8) answer(s).
 
SrlItem
1
ID:   142686


China’s emergence as a cyber power / Sharma, Munish   Article
Sharma, Munish Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Cyberspace is increasingly becoming an area of contestation among nation states. Similar to the physical domains of land, sea, air and space, superiority in the cyber domain enables a nation state to exert its cyber power. In recent years, China has invested colossal amounts in building the requisite infrastructure and capabilities of its armed forces as well as governance practices to advance towards ‘informationalisation’. This article seeks to discern the motives, threats, objectives, strategy and intent that drive China to amass cyber power.
Key Words China  Cyber Threats  Cyber Power  Informationalisation  Cyber Domain 
        Export Export
2
ID:   136033


Cloud computing for defence / Sharma, Munish   Article
Sharma, Munish Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Technology has always played the key role in defining the outcome of war. A modern-day military is investing in cutting-edge technologies to leverage their benefits in the evolving nature of warfare, which encompasses every aspect of science. In the case of information and communication technology (ICT), the research and development has unleashed vast potential for civilian and military applications, which vary from simple logic execution to high-end supercomputing. As cloud computing has made inroads in the operations of private sector, it is slated to perform a central role in the functioning of governments and defence and security agencies. Under the aegis of ICT, the emerging cloud computing can find applications in defence sector as it offers numerous advantages over traditional information technology (IT) systems such as scalability, agility and interoperability. The article is an attempt to identify the key defence operations where cloud computing could help in addressing the IT needs while keeping the acquisition and maintenance costs at minimal. It brings in the concerns and challenges lying ahead in the way of adopting cloud computing while taking stock of initiatives taken by the governments of leading militaries of the world.
        Export Export
3
ID:   136778


Geopolitics of cyber espionage / Sharma, Munish   Article
Sharma, Munish Article
0 Rating(s) & 0 Review(s)
Summary/Abstract There is an intricate relationship between the methods of cyber espionage and the evolution of information and communications technology, of which information security is a key aspect. This article is an attempt to establish forward and backward linkages of cyber espionage. It examines the geopolitics, methods, role of information security technology and, most importantly, how the future of cyber espionage is being shaped by emerging technologies such as supercomputing, quantum computing and ‘big data’, from an Indian perspective.
        Export Export
4
ID:   162273


India's strategic options in a changing cyberspace / Samuel, Cherian; Sharma, Munish 2019  Book
Samuel, Cherian Book
0 Rating(s) & 0 Review(s)
Publication New Delhi, Pentagon Press, 2019.
Description xv, 175p.hbk
Standard Number 9789386618665
        Export Export
Copies: C:2/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
059544005.8/SAM 059544MainOn ShelfGeneral 
059545005.8/SAM 059545MainOn ShelfGeneral 
5
ID:   177282


Modeling Attribution of Cyber Attacks Using Bayesian Belief Networks / Sharma, Munish   Journal Article
Sharma, Munish Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The article makes an attempt to bring to the fore the various factors which are considered in the due process of attribution of a cyber-attack and the correlation of credible attribution with cyber deterrence. The focal point of the article is a three-step approach to model the decision-making process behind attribution of cyber-attacks using Bayesian Belief Networks and a case study to elucidate on the functioning of the model. Bayesian Belief Networks represent relationships between variables or multiple events and they are used to draw inference or estimate the probability to help decision-making under the conditions of uncertainty.
        Export Export
6
ID:   132138


Relevance of cloud computing for defence / Lele, Ajey; Sharma, Munish   Journal Article
Lele, Ajey Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract Technology has always played the key role in defining the outcome of war. A modern-day military is investing in cutting-edge technologies to leverage their benefits in the evolving nature of warfare, which encompasses every aspect of science. In the case of information and communication technology (ICT), the research and development has unleashed vast potential for civilian and military applications, which vary from simple logic execution to high-end supercomputing. As cloud computing has made inroads in the operations of private sector, it is slated to perform a central role in the functioning of governments and defence and security agencies. Under the aegis of ICT, the emerging cloud computing can find applications in defence sector as it offers numerous advantages over traditional information technology (IT) systems such as scalability, agility and interoperability. The article is an attempt to identify the key defence operations where cloud computing could help in addressing the IT needs while keeping the acquisition and maintenance costs at minimal. It brings in the concerns and challenges lying ahead in the way of adopting cloud computing while taking stock of initiatives taken by the governments of leading militaries of the world.
        Export Export
7
ID:   169766


Road to 5G: technology, politics and beyond / Sharma, Munish 2019  Book
Sharma, Munish Book
0 Rating(s) & 0 Review(s)
Publication New Delhi, IDSA, 2019.
Description 120p.pbk
Series IDSA Monograph Series no; 65
Standard Number 9789382169888
Key Words Technology  Politics  China  5G 
        Export Export
Copies: C:2/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
059788621.38456/SHA 059788MainOn ShelfGeneral 
059789621.38456/SHA 059789MainOn ShelfGeneral 
8
ID:   152435


Securing critical information infrastructure: global perspectives and practices / Sharma, Munish 2017  Book
Sharma, Munish Book
0 Rating(s) & 0 Review(s)
Publication New Delhi, IDSA, 2017.
Description 116p.pbk
Series IDSA Monograph Series no.; 60
Standard Number 9789382169741
        Export Export
Copies: C:2/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
059013004.3/SHA 059013MainOn ShelfGeneral 
059014004.3/SHA 059014MainOn ShelfGeneral