Dr. E. Dilipraj - Academia.edu (original) (raw)

Uploads

Books by Dr. E. Dilipraj

Research paper thumbnail of CYBER ENIGMA: UNRAVELING THE TERRORS IN THE CYBER WORLD

Knowledge World Publications - 2017 | Routledge, 2019

Cyber and its related technologies such as Internet was introduced to the world only in late 1980... more Cyber and its related technologies such as Internet was introduced to the world only in late 1980s, and today it is unimaginable to think of a life without these all pervasive technologies. Despite being ubiquitous around the world, cyber technology is still seen as an enigma by many, mainly due to its rapid development and high level of science involved with it. In addition to the existing complexities of the technology, the level of threat matrix surrounding the cyber domain further lead to various misconceptions and exaggerations apart from elevating the complexity to a few notches above. It is evident that the world in the future is going to be fully dependent on the cyber technology and hence humans are forced to understand this complex domain in order to survive and evolve successfully as 'technological' beings. It is in this context of understanding the enigma around the cyber domain, the book attempts to analyse and disentangle the various issues related to cyber technology. The book also attempts to unravel the various threats that terrorise the cyber world in detail by categorising them according to the perpetrators. The book aims to decrypt the cyber domain and at the same time exhibit the realities in terms of the threat vector, technological sophistication and the rapid development of the domain itself. The book also tries to present the existing reality of cyber environment in India and charts out a few recommendations and suggestions for enhancing the country's cyber security architecture. The eight chapters of the book attempts to decipher the cyber world through detailed analysis of the various issues like hacking, dark web, cyber enabled terrorism, covert cyber capabilities of countries like the US and China apart from studying the cyber environment of India.

Chapters in Edited Volumes by Dr. E. Dilipraj

Research paper thumbnail of China’s Pivot to Latin America: Political, Economic and Security Cooperation

Book: Asian Defence Review 2019, Knowledge World (KW) Publications, New Delhi, 2019

Research paper thumbnail of China in Latin America: The Evolving Asymmetric Relations

Book: Contemporary Concerns, Gyan Books Pvt. Ltd., New Delhi, 2018

Research paper thumbnail of CHINA-US CYBERSPACE ENGAGEMENTS - THE DRAGON DETHRONING THE EAGLE?

Book: Asian Defence Review 2018, Knowledge World Publishers, New Delhi, 2018

Research paper thumbnail of CYBER INDIA: FROM DAWN TO THE TIME AHEAD

Book: Asian Defence Review 2017, Knowledge World Publishers, New Delhi, 2017

Research paper thumbnail of INEVITABLE WARFARE TECHNOLOGIES: PRAGMATIC ROLE OF ROBOTICS, 3D PRINTING AND SUPERCOMPUTERS IN FUTURE WARS

Book: Asian Defence Review 2016, Knowledge World Publishers, New Delhi, 2016

Research paper thumbnail of SOUTH ASIAN CYBER SECURITY ENVIRONMENT: AN ANALYTICAL PERSPECTIVE

Book: Asian Defence Review 2014-2015, Knowledge World Publishers, New Delhi, 2015

Journal Articles by Dr. E. Dilipraj

Research paper thumbnail of China's Increasing Cyber Sovereignty - Dragon Demarcating its Virtual Territory

Defence & Diplomacy, 2019

Research paper thumbnail of JuD's social outreach: Understanding Digital terrorism

Defence and Diplomacy, 2018

Research paper thumbnail of CYBERSPACE REGULATION: THE NEED OF THE HOUR

Defence and Diplomacy, 2018

It is observed that the biggest problem or complication that the cyber world is facing at present... more It is observed that the biggest problem or complication that the cyber world is facing at present is not of its being a universal domain but being a domain which is still highly unregulated. For a domain which is clearly three decades old, the existing regulations are clearly not sufficient. Cyber space is replete with conflicts, and threatened by a variety of threats caused by different players like unethical hackers/crackers, terrorists and non-state actors, and also by the use of covert cyber capabilities by nation states. However, the global cyber community is more focussed on enhancing and upgrading the technology in use, rather than taking coherent measures to stabilise and secure the domain, in spite of awareness about the growing threat perceptions. This is evident from the fact that new advances and further upgradation in technology are taking place daily and, as a result, new threats are emerging, while safety and security related developments are put on the back burner, and are not so often in the news. Hence, there is an urgent need to rectify this scenario and a pragmatic solution has to be found to regulate cyber space to the extent possible.

Research paper thumbnail of ORGANISATIONAL GOVERNANCE OF CYBERSPACE IN INDIA

Research paper thumbnail of AIR GAPPING OF SENSITIVE COMPUTER SYSTEMS: IS IT AN OBSOLETE PRACTICE

Defence and Diplomacy, 2017

Research paper thumbnail of HACKING: TRACING THE HISTORY: WHAT CAN INDIA DO WITH ITS HACKERS?

Liberal Studies Journal, 2016

Research paper thumbnail of CHALLENGES OF CYBER SECURITY TO NUCLEAR INFRASTRUCTURE

Defence and Diplomacy, 2016

Research paper thumbnail of ELECTRONIC WARFARE: RUSSIA'S ENHANCED CAPABILITIES

Defence and Diplomacy, 2016

Research paper thumbnail of CYBER SECURITY CHALLENGES FOR INDIA - AN ASSESSMENT OF ITS PREPAREDNESS

Defence and Diplomacy, 2015

Research paper thumbnail of CHALLENGES OF TERRORISM IN CYBER SPACE

Defence and Diplomacy, 2015

Research paper thumbnail of COVERT CYBER CAPABILITIES OF THE US

Research paper thumbnail of MAPPING THE CYBER DRAGON: CHINA'S CONDUCT OF TERROR IN THE CYBER WORLD

Defence and Diplomacy, 2014

Research paper thumbnail of 3-DIMENSIONAL PRINTING AND THE FUTURE OF DEFENCE MANUFACTURING

Defence and Diplomacy, 2014

Research paper thumbnail of CYBER ENIGMA: UNRAVELING THE TERRORS IN THE CYBER WORLD

Knowledge World Publications - 2017 | Routledge, 2019

Cyber and its related technologies such as Internet was introduced to the world only in late 1980... more Cyber and its related technologies such as Internet was introduced to the world only in late 1980s, and today it is unimaginable to think of a life without these all pervasive technologies. Despite being ubiquitous around the world, cyber technology is still seen as an enigma by many, mainly due to its rapid development and high level of science involved with it. In addition to the existing complexities of the technology, the level of threat matrix surrounding the cyber domain further lead to various misconceptions and exaggerations apart from elevating the complexity to a few notches above. It is evident that the world in the future is going to be fully dependent on the cyber technology and hence humans are forced to understand this complex domain in order to survive and evolve successfully as 'technological' beings. It is in this context of understanding the enigma around the cyber domain, the book attempts to analyse and disentangle the various issues related to cyber technology. The book also attempts to unravel the various threats that terrorise the cyber world in detail by categorising them according to the perpetrators. The book aims to decrypt the cyber domain and at the same time exhibit the realities in terms of the threat vector, technological sophistication and the rapid development of the domain itself. The book also tries to present the existing reality of cyber environment in India and charts out a few recommendations and suggestions for enhancing the country's cyber security architecture. The eight chapters of the book attempts to decipher the cyber world through detailed analysis of the various issues like hacking, dark web, cyber enabled terrorism, covert cyber capabilities of countries like the US and China apart from studying the cyber environment of India.

Research paper thumbnail of China’s Pivot to Latin America: Political, Economic and Security Cooperation

Book: Asian Defence Review 2019, Knowledge World (KW) Publications, New Delhi, 2019

Research paper thumbnail of China in Latin America: The Evolving Asymmetric Relations

Book: Contemporary Concerns, Gyan Books Pvt. Ltd., New Delhi, 2018

Research paper thumbnail of CHINA-US CYBERSPACE ENGAGEMENTS - THE DRAGON DETHRONING THE EAGLE?

Book: Asian Defence Review 2018, Knowledge World Publishers, New Delhi, 2018

Research paper thumbnail of CYBER INDIA: FROM DAWN TO THE TIME AHEAD

Book: Asian Defence Review 2017, Knowledge World Publishers, New Delhi, 2017

Research paper thumbnail of INEVITABLE WARFARE TECHNOLOGIES: PRAGMATIC ROLE OF ROBOTICS, 3D PRINTING AND SUPERCOMPUTERS IN FUTURE WARS

Book: Asian Defence Review 2016, Knowledge World Publishers, New Delhi, 2016

Research paper thumbnail of SOUTH ASIAN CYBER SECURITY ENVIRONMENT: AN ANALYTICAL PERSPECTIVE

Book: Asian Defence Review 2014-2015, Knowledge World Publishers, New Delhi, 2015

Research paper thumbnail of China's Increasing Cyber Sovereignty - Dragon Demarcating its Virtual Territory

Defence & Diplomacy, 2019

Research paper thumbnail of JuD's social outreach: Understanding Digital terrorism

Defence and Diplomacy, 2018

Research paper thumbnail of CYBERSPACE REGULATION: THE NEED OF THE HOUR

Defence and Diplomacy, 2018

It is observed that the biggest problem or complication that the cyber world is facing at present... more It is observed that the biggest problem or complication that the cyber world is facing at present is not of its being a universal domain but being a domain which is still highly unregulated. For a domain which is clearly three decades old, the existing regulations are clearly not sufficient. Cyber space is replete with conflicts, and threatened by a variety of threats caused by different players like unethical hackers/crackers, terrorists and non-state actors, and also by the use of covert cyber capabilities by nation states. However, the global cyber community is more focussed on enhancing and upgrading the technology in use, rather than taking coherent measures to stabilise and secure the domain, in spite of awareness about the growing threat perceptions. This is evident from the fact that new advances and further upgradation in technology are taking place daily and, as a result, new threats are emerging, while safety and security related developments are put on the back burner, and are not so often in the news. Hence, there is an urgent need to rectify this scenario and a pragmatic solution has to be found to regulate cyber space to the extent possible.

Research paper thumbnail of ORGANISATIONAL GOVERNANCE OF CYBERSPACE IN INDIA

Research paper thumbnail of AIR GAPPING OF SENSITIVE COMPUTER SYSTEMS: IS IT AN OBSOLETE PRACTICE

Defence and Diplomacy, 2017

Research paper thumbnail of HACKING: TRACING THE HISTORY: WHAT CAN INDIA DO WITH ITS HACKERS?

Liberal Studies Journal, 2016

Research paper thumbnail of CHALLENGES OF CYBER SECURITY TO NUCLEAR INFRASTRUCTURE

Defence and Diplomacy, 2016

Research paper thumbnail of ELECTRONIC WARFARE: RUSSIA'S ENHANCED CAPABILITIES

Defence and Diplomacy, 2016

Research paper thumbnail of CYBER SECURITY CHALLENGES FOR INDIA - AN ASSESSMENT OF ITS PREPAREDNESS

Defence and Diplomacy, 2015

Research paper thumbnail of CHALLENGES OF TERRORISM IN CYBER SPACE

Defence and Diplomacy, 2015

Research paper thumbnail of COVERT CYBER CAPABILITIES OF THE US

Research paper thumbnail of MAPPING THE CYBER DRAGON: CHINA'S CONDUCT OF TERROR IN THE CYBER WORLD

Defence and Diplomacy, 2014

Research paper thumbnail of 3-DIMENSIONAL PRINTING AND THE FUTURE OF DEFENCE MANUFACTURING

Defence and Diplomacy, 2014

Research paper thumbnail of TERROR IN THE DEEP AND DARK WEB

Research paper thumbnail of SUPERCOMPUTER CAPABILITIES - INTERPRETING ITS ROLE IN DEFENCE

Defence and Diplomacy, 2013

Research paper thumbnail of CYBER WARFARE AND NATIONAL SECURITY - AN ANALYSIS OF INCIDENTS BETWEEN INDIA AND PAKISTAN