4.4 Pakistan’s Response Capabilities in Cyber Space. Currently, Pakistan lacks an organisational cap to counter any cyber threat. As part of digital society, Pakistan needs to take concrete initiatives at national level to improve the effects of its actions and policy of a responsible state against the abuse of cyberspace. The response mechanism and initiatives have two main compositions namely management and technology responses. The present capability of Pakistan in terms of management and technology response is discussed in subsequent paras.
4.4.1 Management Response. The cyberspace benefits as well as the threats are beyond the jurisdiction of normal and traditional geographical boundaries of the nations. The enormous speed of cyber
…show more content…
At present there are more than one hundred countries in the world who have established a certain level of cyber capacity at government level, out of which more than fifty percent countries have published their cyber security strategy by defining the national security objectives and goals intended to be achieved . Pakistan is yet to identify and define objectives and goals required to be achieved through cyber security in terms of a national cyber security strategy.
National Cyber Security Policy. Pakistan is among those countries in the world who has not defined their cyber security policy as yet. In Jul 2013, Senate Committee on Defence established a Task Force for Cyber Security that was given the mandate of defining the national cyber security policy . Till date it lacks highest level organisational body having sole responsible of defining and implementing the cyber security policy in the country by establishing the control mechanism and corresponding regularities to achieve each objective and goal defined in the national cyber security
…show more content…
The legislation by Pakistan government on cyber crimes started in 2002 by implementing the Electronic Transaction Ordinance (ETO). ETO was first step in providing accreditation to the service providers. The ordinance was having objectives to facilitate and documented the electronic transactions and ICT related information in electronic form. In 2009, Pakistan government issued first ordinance on cybercrimes named Prevention of Electronic Crimes Ordinance (PECO). PECO defined and laid down legal terminologies related to cybercrimes, types of crimes and punishments pertinent to each crime. However the ordinance was never debated in the National Assembly and has expired due to non-promulgation within constitutional timeframe. Currently the government has passed the cybercrime law after facing much criticism from the opposition as well as civil society. The act which has been given the title of the ‘Prevention of Electronic Crimes Act 2015’ provides legal mechanisms for the investigation, prosecution, trial and international cooperation of crimes in connection with information system. But till date the federal government has failed to implement this recently passed
In 520 AD, the prophet and messenger Muhammad came to spread Allah's word, and his followers became the first Muslims. Islam spread rapidly and this was was due to the choices that the leaders made through cultural diffusion, strategy for the wage of war, and esteemed morals. When Muslim merchants would trade, they would also spread the culture of Islam. The strategic wage of war helped Islam uphold a strong empire. The desirable morals of the faith led people into becoming Muslim.
FISMA act gives a great importance to risk based rules that helps in defining cost-effective security solutions to the organization. FISMA standard should be executed with the help of senior security officials, chief information security officers and security director who can help to conduct different annual reviews of the organization`s information security program and produce the report in front of management about its findings. The management will use this data in order to identify different security loopholes and apply the proper security measures in order to make the organization security compliant. It`s
During the Islamic Golden Age, science, economic development, and cultural works flourished in the Islamic world. As they spread to civilizations, such as Greece, Rome, and India, Muslims assimilated, advanced, and applied those cultures’ scholarships. They read books and built their knowledge to the point where they could make their own discoveries. They built a strong trading empire by using scientific instruments and the night sky to guide them, and they had access to plenty of resources and goods. These advancements affected numerous fields in their own society and, eventually, in European society.
There exact report on cyber crime is. “Our vision is a cyberspace that supports secure and resilient infrastructure, that enables innovation and prosperity, and that protects privacy and other civil liberties by design. It is one in which we can use cyberspace with confidence to advance our economic interests and maintain national security under all conditions”. Quadrennial Homeland Security Review Report 2010 This is important because being able to have trust in storing are personal data online is crucial.
However, some cases legislation came after arrangements between software companies and lawmaker. Which the focuses on crimes related to computer abuse, also measures to encourage cybercrime policing. Furthermore, police forces are having issues enforcing cyber policy is it time for police forces to create their own cybercrime police force, it is clear that police forces have issues with forcing impactfully policy on cybercrime. Furthermore, the problem does not generally reside with law enforcement agencies, therefore law enforcement agencies need support. What types of governance and regulation would be in this area, also how well the government well respond to cybercrimes.
The Information Security Manager reports in their capacity to the CEO. Company officers, executives, directors, employees, contractors and third party service providers cooperate and work with the Information Security Manager to ensure the protection of customer’s non-public information and Licensee’s Information Assets. Policies, such as Enterprise Antivirus Program, Network Access, Software Development Security Standards, Physical Security, Vendor Manangmenet Ativirus, Mobile Computing/Remote Access, Inromation Security Risk Assessment, Social Media, Data Loss Prevention, and Secuiryt Incident Response Policies have been implemented to protect customer’s non-public personal information and company Information
Due to this we need to apply an online set of rules that will guide us in our behaviour (IIE (PTY) Ltd, 2018). 6. Digital law It is the electronic responsibility for ethical or unethical acts (Ribble, 2011). As digital citizens there are laws for the way we behave and interact.
Thus, people are able to retrieve information easily from the internet and also people consistently communicate with their friends through the various systems including the SNS(Social Network System), applications, and emails. These benefits definitely have brought great comforts and conveniences to our society. On the other hand, the idea of easy access to the internet is causing serious side effects where it has created an environment for people or the internet users to easily conduct the criminal offenses, especially, related to the sexuality. As a result, Canada is under progress in proposing to amend the Criminal Code of Canada through a Bill titled “Protecting Children from Internet Predators Act” or also known
Cybersecurity has become a growing cause for concern in the United States and indeed countries around the world. On February 9, 2016 President Barack Obama announced his Cybersecurity National Action plan (CNAP) to further the nations efforts to protect government agencies, citizens, and businesses from cyber threats domestic and abroad. However, cybersecurity is not a new issue in fact it is as old as the internet itself. With that said, I keep thinking back to that warm September day stained with the image of an enormous fireball engulfing our small TV set. This horrific day changed the course of history forever along with my future career path.
Network Security refers to any activities that take place to protect the network; more likely to protect the usability, reliability, integrity, and safety of the network and data. Targeting the threats and stopping them to enter or spread on the network is the job of effective network security. Most common threats for any computer networks are: • Viruses, worms, and Trojan horses • Spyware and adware • Hacker attacks • Identity theft • Data interception To prevent these threats, multiple layers of security need to be implemented so if one fails, other stand. Anti-virus, anti-spyware, firewall are some of the components of network security system used to block unauthorized access to the network and Virtual Private Network (VPNs), to provide
National defence and security strategy are formulated through some fundamental considerations based on the security objectives and national interests. National defence and security policy refers to the government’s vision and mission that are realized proportionally, balanced and well-coordinated. To achieve this goal, the government has developed a national defence and national security strategy. “It includes strategic objectives, how to achieve the goals and defence resources in order to accomplish strong, effective and high deterrence state defence capabilities” . Based on that phenomenon, Darmono B. further described regarding the Indonesian national security concepts (Darmono, 2010): 1.
With computer technologies and the internet has connected the world together with the ability to communicate with people in different countries. As a society, we have become very dependent on computers and when the systems go down we cannot function as well, businesses cannot conduct their business. With the internet connecting the world together, it gives concerns for cyber-terrorism and cyber-attacks. Cyberterrorism is when a group attacks a target with intention of causing harm and further political, social, religious, or other goals. Cyber-attacks are attacks on a target system carried about by different people and may not be associated with a terrorist group.
Decades ago, people felt that cyber war was not a serious threat. However, in recent years, there have been numerous instances of cyber warfare that viewed as significant threats to security. In December 2010, a group calling itself the Pakistan Cyber Army
CYBER CRIME Cybercrime is one of the fastest growing type of crime in our society today and have also been a serious problem since it causes a lot of damages and also affect us in different ways. But before I go further let me start by telling you the meaning of cybercrime, Cybercrime is different and more heinous than normal crime that we know. This crime is committed in an electronic medium and here means read is not a requirement and is done in secret Feldman(2013). Cyber war takes place largely in secret, unknown to the general public of crimes include pornography, cyber fraud, defamation, cyber stalking, harassment, IPR theft, data hostage, money laundering, phishing, e-mail bombing, cyber war, illegal monitoring. Secondly let me talk about the effect of cybercrime in our society today.
INTRODUCTION Geo Politics is defined as the impact created by a country on other neighbouring countries due to its Geopolitical position. This impact also affects the politics of the region as a whole. Pakistan is at a location which is of great importance in political ,strategic and economic sectors. It has been centre of activities of great powers since the start and has witnessed intervention of three great powers i.e Britain, USSR, and USA. Pakistan is located in Southern Asia and shares border with four countries which include India, Afghanistan, China and Iran all of which are of great importance in the international politics and play a major role in it.