Cyber Sovereignty and the Challenges of Cyber Security in Contemporary World

Authors

  • Narendra Singh
  • Arpit Parakh

Keywords:

Cyber security, cyber sovereignty, cyber terrorism, global commons, sovereign domain

Abstract

With the advancement of technology and cyberspace, basic principle of International law i.e. Sovereignty has been shaken up. Initially only users were leading over internet and therefore basic notion was that it is immune from sovereignty of state because of its cross-border nature. But in current scenario with the outburst in number of internet users, and various laws and regulations framed by different nations to govern cyber sovereignty and security of cyber data, cyber space is not wholly immune from state governance. Now a day Cyber security has become worldwide issue & is on the path to become top most security menace for all countries. As the internet user are growing day by day across the globe, states desired greater sovereignty over the cyberspace due to increase in number of cyber threats. This Research paper will discuss the concept of Sovereignty over Cyberspace, Challenges to Cyber Security and Indian position dealing with Cyber Security and Governance of Cyberspace.

References

Anis Ahmad, Cyber Security Challenges: Some Reflections on Law and Policy in India, 1 HPJ (2017).

Marie Baezner and Patrice Robin, Cyber sovereignty, Cyber defense Trend Analysis, Center for Security Studies (CSS), ETH Zurich (2018).

Sovereignty, Black’s Law Dictionary (11th ed. 2019).

See Internet Assigned Numbers Authority, Introducing IANA, http://www.iana.org/about/ (last visited December 15, 2021).

See Internet Corporation for Assigned Names and Numbers, ICANN Factsheet, http://www.icann.org/en/factsheets/fact-sheet.html (last visited December 15, 2021).

Jack L. Goldsmith & Tim Wu, Who Controls The Internet?: Illusions of A Borderless World 29-46 (Oxford University Press, New York 2006).

For example, “The National Strategy to Secure Cyberspace lists a number of critical infrastructures that are dependent upon cyberspace such as Banking & Finance, Chemical, Oil, Gas and Water.”

Supra note 3, at 17.

See U.S. DEP’T OF DEF., The National Military Strategy for Cyberspace Operations 3 (2006), available at http://www.dod.mil/pubs/foi/ojcs/07-F-2105doc 1.pdf

David R. Luber & David H. Wilkinson, Defining Cyberspace for Military Operations, 93 MARINE CORPS GAZETTE, 40 (2009).

Supra note 5.

Reddy, G. N. & G. J. U. Reddy, A Study of Cyber Security Challenges and Its Emerging Trends on Latest Technologies, ArXiv (2014).

Lieutenant General Davinder Kumar, Cyber Security: Fundamental to India’s Sovereignty (Vivekananda International Foundation, 2018).

India’s Cyber Security Challenge, Cyber Security-An Overview, IDSA Task Force Report 21 (March 2012)

Id. at 9.

Id. at 24.

The Information Technology Act, 2000, § 43, No. 21, Act of Parliament, 2000 (India).

The Information Technology Act, 2000, § 65, No. 21, Act of Parliament, 2000 (India).

The Information Technology Act, 2000, § 66, No. 21, Act of Parliament, 2000 (India).

The Information Technology Act, 2000, § 66B, No. 21, Act of Parliament, 2000 (India).

The Information Technology Act, 2000, § 66D, No. 21, Act of Parliament, 2000 (India).

The Information Technology Act, 2000, § 66F, No. 21, Act of Parliament, 2000 (India).

Published

2022-09-13