Navigating the Indian Cyberspace Maze Guide for Policymakers

Navigating the Indian Cyberspace Maze Guide for Policymakers

Brigadier Ashish Chhibbar is presently Cyberspace has turned out to be one Senior Fellow with the Strategic Navigating the Indian of the greatest discoveries of mankind. Technologies Centre at the Manohar Today, we have more than four-and- Navigating the Indian Navigating the Indian Parrikar Institute for Defence Studies a-half billion people connected to the and Analyses New Delhi, and his Cyberspace Maze Cyberspace Maze internet and this number is all set interests lie in cyberspace policy and to increase dramatically as the next disruptive technologies of Artificial Guide for Policymakers generational Internet of Things (IoT) Intelligence, block chain and big data devices and 5G technology gets fully analysis. operational. Brigadier Chhibbar is an alumnus India has been at the forefront of this amazing digital revolution and of the National Defence Academy, is a major stakeholder in the global Defence Services Staff College, and cyberspace ecosystem. As the world Military College of Telecommunication embarks on embracing internet 2.0 Engineering, and has varied experience characterised by 5G high-speed of over three decades in all types of wireless interconnect, generation of terrain and operational assignments. vast quantities of data and domination He completed his Masters in of transformational technologies Telecommunication Engineering of Artificial Intelligence (AI), block from the Indian Institute of Science, chain and big data, India has been Bangalore and holds a PhD in Strategic presented with a unique opportunity to Decision Making from Chaudhary leapfrog from a developing country to a Charan Singh University, Meerut. developed knowledge-based nation in a matter of years and not decades. Ashish Chhibbar This book presents an exciting and fascinating journey into the world of cyberspace with focus on the impactful technologies of AI, block chain and Big Data analysis, coupled with an appraisal of the Indian cyberspace ecosystem. It has been written especially for a policymaker in order to provide a lucid overview of the cyberspace domain in adequate detail. ` 1280.00 ISBN 978-93-89137-47-7 KNOWLEDGE WORLD KW PUBLISHERS PVT LTD Ashish Chhibbar www.kwpub.com Front jacket image courtesy Martin Dodge Navigating the Indian Cyberspace Maze Guide for Policymakers Navigating the Indian Cyberspace Maze Guide for Policymakers Ashish Chhibbar KNOWLEDGE WORLD KW Publishers Pvt Ltd New Delhi Copyright © 2020 Manohar Parrikar Institute for Defence Studies and Analyses, New Delhi All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without first obtaining written permission of the copyright owner. Disclaimer: The views expressed in this book are those of the author(s) and do not necessarily reflect those of the Manohar Parrikar Institute for Defence Studies and Analyses, or the Government of India. Manohar Parrikar Institute for Defence Studies and Analyses No. 1, Development Enclave, Delhi Cantt. New Delhi-110 010 Phone: +91-11-26717983 Website: www.idsa.in ISBN 978-93-89137-47-7 Hardback Published in India by Kalpana Shukla KW Publishers Pvt Ltd 4676/21, First Floor, Ansari Road Daryaganj, New Delhi 110 002 Phone: +91 11 23263498/43528107 Marketing: [email protected] Editorial: [email protected] Website: www.kwpub.com Printed and bound in India The content of this book is the sole expression and opinion of its author(s), and not of the publisher. The publisher in no manner is liable for any opinion or views expressed by the author(s). While best efforts have been made in preparing the book, the publisher makes no representations or warranties of any kind and assumes no liabilities of any kind with respect to the accuracy or completeness of the content and specifically disclaims any implied warranties of merchantability or fitness of use of a particular purpose. The publisher believes that the contents of this book do not violate any existing copyright/intellectual property of others in any manner whatsoever. However, in case any source has not been duly attributed, the publisher may be notified in writing for necessary action. Contents Abbreviations vii 1. Introduction 1 2. A Brief Introduction to Cyberspace 10 3. Artificial Intelligence as a Strategic Force Multiplier 87 4. Blockchain and Big Data: Enablers of National Security 133 5. Appraisal of India’s Cyberspace Ecosystem 166 6. Recommendations and Conclusion 200 Appendix A Cyberspace Architecture And Building Blocks 220 Appendix B Essentials of Artificial Intelligence 242 Appendix C Recommended Structure of Ministry of Cyberspace 259 Index 261 Abbreviations ACO Ant Colony Optimiser AES Advanced Encryption Standard AGI Artificial General Intelligence AGR Adjusted Gross Revenue AH Authentication Header AI Artificial Intelligence AIM Analytics India Magazine AIS Artificial Immune System AISHE All India Survey on Higher Education ALIS Autonomic Logistics Infrastructure System ANN Artificial Neural networks APT Advance Persistent Threat APT Asia Pacific Telecommunication ARP Address Resolution Protocol AtoN Aids to Navigation BaaS Blockchain as a Service BBNL Bharat Broadband Network Limited BCH Bitcoin cash (Crypto currency) BCO Bee Colony Optimiser BFSI Banking, Financial Services and Insurance BI Business Intelligence BIMSTEC Bay of Bengal Initiative for Multi-Sectoral Technical and Economic Cooperation BPO Business Process Outsourcing BSNL Bharat Sanchar Nigam Limited BSV Bitcoin Satoshi Vision (Crypto currency) BTC Bitcoin (Crypto currency) viii • Navigating the Indian Cyberspace Maze BTS Base Transreceiver System C2W Command & Control Warfare CAN Campus Area Network CAS Chinese Academy of Science CCA Controller of Certifying Authority CCMF Cyber Combat Mission Force CDMA Code Division Multiplexing Access CDS Clinical Decision Support CDS Chief of Defence Staff CEO Chief Executive Officer CERT Computer Emergency Response Team CII Critical Information Infrastructure CIIO Critical Information Infrastructure Operators CISO Chief Information Security Officer CNMF Cyber National Mission Force CNO Computer Network Operations CO Cyberspace Operations COA Courses Of Actions CODE Collaborative Operations in Denial Environment COMEST Commission on the Ethics of Scientific Knowledge and Technology COP Common Operating Picture CPU Central Processing Unit CSAIL Computer Science and Artificial Intelligence laboratory CSC Common Service Centres CSIS Center for Strategic and International Studies CSOC Cyber Security Operation Centre CSSS Champion Services Sector Scheme CTO Chief Technological Officer CyPAD Cyber Prevention, Awareness and Detection DAE Department of Atomic Energy DAG Directed Acyclic Graphs DAO Distributed Autonomous Organisation DARPA Defense Advanced Research Projects Agency DART Dynamic Analysis and Replanning Tool DASH Dash (Crypto currency) Abbreviations • ix DBT Direct Benefit Transfer DCA Defence Cyber Agency DCN Defence Communication Network DCO Defensive Cyberspace Operations DDOS Distributed Denial of Service DeitY Department of Electronics and Information Technology DES Data Encryption Standard DG Deep Green DHCP Dynamic Host Configuration Protocol DIARA Defence Information Assurance & Research Agency DLA Defense Logistics Agency DMZ De-Militarised Zone DNC Democratic National Committee DNS Domain Name Service DOD Department of Defence DODIN Department of Defence Information Network DOF Degree of Freedom DOS Denial of Service DWDM Dense Wave Division Multiplexers EBL Explanation Based Learning ELMo Embedded for language Models EM Electro Magnetic EMI Electromagnetic Interference ERCIM European Research Consortium for Informatics and Mathematics ESP Encapsulation Security Payload ETH Ethereum (Crypto currency) EW Electronic Warfare FDMA Frequency Division Multiplexing Access FIR First Incident Report FIRST Forum of Incident Response and Security Teams FISMA Federal Information Security Management Act FLM Fuzzy logic Model FTP File Transfer Protocol GA Genetic Algorithms GAN Generative Adversarial Networks x • Navigating the Indian Cyberspace Maze GBPS Giga Bit Per Second GCI Global Complex for Innovation GDP Gross Domestic Product GDPR General Data Protection Regulation GFS Google File System GGE Group of Governmental Experts GIS Geo-Spatial information System GLADS Global Administration Data System GOI Government of India GP Gram Panchayats GPR Government Process Reengineering GPS General Positioning System GVA Gross Value Added HADR Humanitarian Assistance and Disaster Relief HDFS Hadoop Distributed File System HITS Hyper Link-Induced Topic Search HMM Hidden Markov Model HR Human Resource HSPD Homeland Security Presidential Directive HTTP Hyper Text Transfer Protocol I/O Input /Output I4C Indian Cyber Crime Coordination Centre IaaS Infrastructure as a Service IAB Internet Architecture Board IANA Internet Assigned Numbers Authority IARPA Intelligence Advanced Research Projects Activity IBW Intelligence Based Warfare IC Integrated Circuit ICANN The Internet Cooperation for Assigned Names and Numbers ICERT Indian Computer Emergency Response Team ICMP Internet Control Message Protocol ICT Information Communication Technology IDS Integrated Defence Staff IDSA Institute for Defence Studies and Analyses IDSS Intelligent Decision Support Systems Abbreviations • xi IE Information Environment IEEE Institute of Electrical and Electronics Engineers IESG Internet Engineering Steering Group IETF Internet Engineering

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    284 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us