Munish Sharma

img

Archive data: Person was Consultant at MP-IDSA from June 2015 to November 2020
Joined MP-IDSA
June 2015
Area of Interest
Cyber Security, Critical Information Infrastructure Protection, Space Security, Defence Technologies.
Current Project
Cyber Security
Education and Background
Munish Sharma is a Consultant in the Strategic Technologies Centre at the Manohar Parrikar Institute for Defence Studies and Analyses. He is an engineering graduate (Electronics and Communications) and holds a Masters degree in Geopolitics and International Relations. Prior to that, he was a software engineer for four years with Accenture Services.
His research interests include cybersecurity, critical information infrastructure protection, space security and geopolitical aspects of emerging technologies. He analyses technologies such as quantum computing and encryption, blockchain, Artificial Intelligence from a geopolitical perspective as well as concepts like cyber power, cyber espionage and cyber deterrence in the context of China. Munish has authored research papers, articles, briefs and commentaries for various journals, magazines and websites. His recent publications include: India’s Strategic Options in a Changing Cyberspace (2018); “Decrypting China’s Quantum Leap,” The China Journal, no. 80 (July 2018); Securing Critical Information Infrastructure: Global Perspectives and Practices (2017); and,  Securing Cyberspace: International and Asian Perspectives (2016).  He was a Chevening Cyber Security Fellow for 2017-18..

Consultant
E-mail: munish[dot]juit[at]gmail[dot]com
Phone: +91 11 2671 7983

Publication

//

Cryptocurrencies and the Regulators Dilemma

This special feature explores the mechanics and attributes which have led to the steep rise in the popularity of cryptocurrencies, delves into the risks they pose to the user and the state, and evaluates the opportunities, risks and policy options for India.

//

Data Theft: Implications for Economic and National Security

With the digitisation of services, such as in the case of governance and banking, or the electronic means of conducting commerce or trade, a large amount of data is generated, stored, processed; this also traverses, over digital devices and networks. The incidents of data theft compromise the integrity of this data. Data is at continuous risk from a myriad of threat actors varying from hacktivists to nation states.

//

Lashkar-e-Cyber of Hafiz Saeed

Terrorist groups like Lashkar-e-Taiba are increasingly taking to social media to further widen their outreach. By integrating social media with self-developed android apps, Lashkar is also turning from mere technology user into a product developer.

//

China’s Emergence as a Cyber Power

Cyberspace is increasingly becoming an area of contestation among nation states. Similar to the physical domains of land, sea, air and space, superiority in the cyber domain enables a nation state to exert its cyber power. In recent years, China has invested colossal amounts in building the requisite infrastructure and capabilities of its armed forces as well as governance practices to advance towards ‘informationalisation’. This article seeks to discern the motives, threats, objectives, strategy and intent that drive China to amass cyber power.