Skip to main content

Cyber Terrorism: A Growing Threat to India’s Cyber Security

  • Chapter
  • First Online:
Nontraditional Security Concerns in India

Abstract

The chapter draws attention to cyber threats, which endanger the safety of modern states, organisations and international relations. It explains the concept of cyber terrorism and what are the various dangers and challenges posed by cyber terrorism specifically for India’s national security? It further examines the various initiatives commenced by the Indian government to counter cyber terrorism both at the state and global level? The first part of the research aims to understand the concepts and meaning of cyber terrorism and delineate it from other terms like cybercrime, cyber-attacks, etc. Further, it will identify the people involved in these types of activities and what are the motives and intentions to carry out cyber terrorist’s attacks. The study also investigates the adverse impact of cyber terrorism on the national security of India. It describes various types of threats and challenges that India’s cybersecurity has been facing or is likely to be in the future. It tried to dig out the options about how cyber terrorism might become a bigger menace in the future which could threaten India’s security. And in the last part, it will evaluate several measures, initiatives adopted by the Indian government to counter cyber terrorism at national and as well as at the international level. It will underline the evolution of the cybersecurity policy in India. The study proceeds by critically analysing various policies that the Indian government has devised over the years as a response to counter these threats and challenges. At the national level, what are the several policies and acts that have been initiated and to what extent these initiatives have been able to counter cyber terrorism? It will identify its inadequacies as well as its prospects. At the international level, India is actively cooperating with other states like the United States, and international organisation like United Nations to tackle cyber terrorism. Lastly, the research will try to identify cyber threats and assess various policies, initiatives and international cooperation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Cert-In founded on in 2004 based on the US Computer Emergency Readiness Team publishes an annual report on cybersecurity incidents.

  2. 2.

    Gulshan Rai former head of the Cert at the DeitY became the first Coordinator.

References

  • Anand, Rasita (2015), “Cyber Security Policy in India Examining the Issues, Challenges and Framework”, [Online: web], Accessed 5 February 2018. http://hdl.handle.net/10603/150766.

  • Babić, V. (2015), “Cyber Terrorism” Lecture Delivered on 23- April 2015 at 4th International Scientific and Professional Conference, Zagreb: Croatia.

    Google Scholar 

  • Beggs, Christopher and Matthew Butler (2004), “Developing New Strategies to Combat Terrorism”, in Mehdi Khosrow-Pour (eds.) Innovations Through Information Technology. Idea Group Publishing: USA.

    Google Scholar 

  • Bogdanosk, Marjan (2017), “Contemporary Forms of Terrorism”, Contemporary Macedonian Defense, 17 (32): 61–72.

    Google Scholar 

  • Brenner, W. Susan (2007), “At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare”, The Journal of Criminal Law and Criminology, 97 (2): 379–475.

    Google Scholar 

  • Brenner, W. Susan and Marc D. Goodman (2002), “In Defense of Cyberterrorism: An Argument for Anticipating Cyber-Attacks”, Journal of Law, Technology & Policy, 1–43.

    Google Scholar 

  • Brunst, Phillips (2008), “Use of the Internet by Terrorists—A Threat Analysis”, in Centre of Excellence Defence Against Terrorism, (ed.) Responses to the Cyber Terrorism, Netherlands: IOS Press.

    Google Scholar 

  • Captain Chhabra S. (2016), “India’s National Cyber Security Policy (NCSP) and Organization—A Critical Assessment”, Naval War College Journal, 55–70.

    Google Scholar 

  • Choudhury, K. (2016), “Cyber Security: Israel Wants Joint Ecosystem with India”, Business Standard, New Delhi, 6 January 2016.

    Google Scholar 

  • Colarik, Andrew Michael (2006), Cyber Terrorism: Political Cyber-Terrorism in a Post Stuxnet World, and Economic Implications. Idea Group Publishing: London.

    Google Scholar 

  • Col. Raghav S.S. (2015), “Cyber Security in India’s Counter Terrorism Strategy”, [Online: Web], Accessed on 7 November 2017. https://www.worldwidejournals.com/paripex/file.php?val=Marc.

  • Curran, Kevin, Kevin, C. and Sean McKeever (2008), “Cyber Terrorism Attacks”, in Lech J. Janczewski and Andrew M. Colarik (eds). Cyber Warfare and Cyber Terrorism. Information Science Reference: USA.

    Google Scholar 

  • Dalal, Praveen (2008), “Cyber Terrorism and Its Solutions: An Indian Perspective”, [Online: web], Accessed on 5 February 2018. http://www.naavi.org/cl_editorial_04/praveen_dalal/pd_cyber_terrorism_oct25_04_02.htm.

  • Datta, S. (2015), “The Deadly New Age War”, The Hindu, New Delhi, 23 June 2015.

    Google Scholar 

  • Datta, S. (2016), “Cyber Security, Internet Governance and India’s Foreign Policy: Historical Antecedents”, [Online: Web], Accessed on 3 September 2017. https://internetdemocracy.in/reports/cybersecurity-ig-ifp-saikat-datta/.

  • Dayson, J. D. (2002), “The Myth of_Cyber-Terrorism”, [Online Web], Accessed on 12 September 2017. http://www.treachery.net/articles_papers/tutorials/the_myth_of_cyber-terrorism/The_Myth_of_Cyber-Terrorism.pdf.

  • Duic, I. V. Cvrtila and T. Ivanjko (2017), “International Cyber Security Challenges” MIPRO/ISS, 1525–1529.

    Google Scholar 

  • Ebert, Hannes (2018), “Building Resilience India Cyber Security 2000–16”, in Sumit Ganguly, Nicolas Blarel and Majeet Pardesi (eds.) The Oxford Handbook of India’s National Security. Oxford University Press: Oxford.

    Google Scholar 

  • Ebert, H. and T. Maurer (2013), “CyberSpace and Rising Powers”, Third World Quarterly, 34 (5): 1054–1074.

    Google Scholar 

  • Hansen, Lene and Helen Nissenbaum Digital Disaster (2009), “Cyber Security, and the Copenhagen School”, International Studies Quarterly, 53 (4): 1155–1175.

    Google Scholar 

  • Jain, Shaily and Shrishti Soumya (2017), “Study of Acts of Terrorism Through Cyberspace in India: Prevention and Remedies Dealing with Cyber and Technology Related Crimes”, Law Journal on Crime and Criminology, 1 (3): 1–16.

    Google Scholar 

  • Janczewski, Lech J and Andrew M. Colarik (2007), Cyber Warfare and Cyber Terrorism, IGI Global Publisher: UK.

    Google Scholar 

  • Kenney, Michael (2015), “Cyber-Terrorism in a Post-Stuxnet World”, Orbis, 59 (1): 111128.

    Google Scholar 

  • Kshetri, N. (2015), “India’s Cyber Security Landscape: The Roles of the Private Sector and Public Private Partnership”, IEEE Security Privacy, 13 (3): 16–23.

    Google Scholar 

  • Koops, Bert-Jaap (2016), “Megatrends and Grand Challenges of Cybercrime and Cyberterrorism Policy and Research”, in Babak Akhgar and Ben Brewster (eds.) Combatting Cybercrime and Cyberterrorism Challenges, Trends and Priorities. Springer: Switzerland.

    Google Scholar 

  • Knop, von Katharina (2008), “Institutionalization of a Web-Focused, Multinational Counter-Terrorism Campaign—Building a Collective Open Source Intelligent System”, in Centre of Excellence Defence Against Terrorism (ed.) Responses to the Cyber Terrorism. IOS Press: Netherlands.

    Google Scholar 

  • Kumar, Devendra (2017), “India’s Cyber Security: Architecture and Imperatives”, [Online: Web], Accessed on 5 February 2018, http://www.indiafoundation.in/indias-cyber-security-architecture-and-imperatives/.

  • Mavropalias, Kostas (2011), “Cybercrime & Cyberterrorism: Inducing Anxiety & Fear on Individuals”, [Online Web], Accessed on 8 October 2017. http://iconof.com/blog/cybercrime-cyberterrorism-inducing-anxiety-fear-on-individuals/.

  • Mcardle, Jennifer and Michael Cheetham (2014), “Indo-US Cyber Security Cooperation”, [Online Web], Accessed on 4 September 2017. http://www.indiaseminar.com/2014/655/655_jennifer_&_cheetham.htm.

  • Mukerji, Kumar Asoke (2017), “Prospects for Effective International Cooperation on Cyber Security”, [Online Web], Accessed on 10 October 2017. http://www.indiafoundation.in/prospects-for-effective-international-cooperation-on-cyber-security/.

  • Ogun, M. N. (2015), Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses. Io Press: Amsterdam.

    Google Scholar 

  • Pierre, Thomas and D. Ian Hopper (2000), “Canadian Juvenile Charged in Connection with February “Denial of Service” Attacks”, [Online: Web], Accessed on 10 September 2016. http://archives.cnn.com/2000/TECH/computing/04/18/hacker.arrest.01/.

  • Reddy, G. Nikhita and G. J. Ugander Reddy (2014), A Study of Cyber Security Challenges and Its Emerging Trends on Latest Technologies. International Journal of Engineering and Technology, 4 (1): 1–5.

    Google Scholar 

  • Reich, P. (2012), “Case Study: India- Terrorism and Terrorist Use of the Internet/Technology in Law, Policy and Technology”, in P. Reich and E. Gelbstein (eds.) Cyberterrorism, Information Warfare and Internet Immobilisation. Hershley.

    Google Scholar 

  • Samuel, Cherian (2011), “Prospects for India–US Cyber Security Cooperation”, Strategic Analysis, 35 (5): 770–780.

    Google Scholar 

  • Sidhu, Balraj K (2017), “Governing the Internet Need for Effective Cybersecurity Policy, Law, and Institutional Framework”, Economic & Political Weekly, 1 (48).

    Google Scholar 

  • Singh, Swaran and Jayanna Krupakar (2014), “Indo–US Cooperation in Countering Cyber Terrorism: Challenges and Limitations”, Strategic Analysis, 38 (5): 703–716

    Google Scholar 

  • Sirohi, Dr M. N. (2015), Cyber Terrorism and Information Warfare. Delhi Alpha Editions.

    Google Scholar 

  • Srikanth, Divya (2014), “Non-traditional Security Threats in the 21st Century”, A Review International Journal of Development and Conflict, 460–68.

    Google Scholar 

  • Sukhmani, Dhaliwal (2016), “The Future of Cyber-Terrorism: Where the Physical and Virtual Worlds Converge”, International Journal of Scientific Research and Management, 4 (9): 4621–4629.

    Google Scholar 

  • Sukumar, A. and R. K. Sharma (2016), “The cyber command: Upgrading India’s National Security Architecture”, ORF Special Report 9, Observer Research Foundation: New Delhi.

    Google Scholar 

  • Thoma, S. M. et al. (2014), Cyberterrorism: Understanding, Assessment, and Response. Springer: London.

    Google Scholar 

  • Uzair Iqbal, Syed Mohd (2013), “Cyber Crime and Cyber Terrorism in India”, [Online: web], Accessed on 5 February 2018. http://hdl.handle.net/10603/63591.

  • Valeriano Brandon and Ryan C. Maness (2014), “The Dynamics of Cyber Conflict Between Rival Antagonists 2001–11”, Journal of Peace Research, 51(3): 347–360.

    Google Scholar 

  • Verma, A. and A. Sharma (2014), “Cyber Security Issues and Recommendations”, International Journal of Advanced Research in Computer Science and Software Engineering, 4 (4): 629–634.

    Google Scholar 

  • Vilić, Vida M. (2017), “Cyber Terrorism and Cyber Warfare: Dark Side of the Cyberspace Balkan”, Social Science Review, 10: 7–25.

    Google Scholar 

  • Westby, Jody R. (2007), “Countering Terrorism with Cyber Security”. Jurimetrics, 47 (3): 297–313.

    Google Scholar 

  • Weimann, G. (2004), “Cyber Terrorism—How Real Is the Threat? Special Report 119”, [Online Web], Accessed on 15 September 2017. http://www.usip.org/files/resources/sr119.pdf

  • Wilske, S. and T. Schiller (1997), “International Jurisdiction in Cyberspace: Which States May Regulate the Internet”, Federal Communications Law Journal, 50 (1): 117–178.

    Google Scholar 

  • Yardley, J. (2012), “India Asks Pakistan to Investigate Panic Tied to Assam”, New York Times, New York, 19 August 2012

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Prasad, S., Kumar, A. (2022). Cyber Terrorism: A Growing Threat to India’s Cyber Security. In: Singh, S.K., Singh, S.P. (eds) Nontraditional Security Concerns in India. Palgrave Macmillan, Singapore. https://doi.org/10.1007/978-981-16-3735-3_4

Download citation

Publish with us

Policies and ethics