scholarly journals Cyber-Crimes and Cyber Laws of Pakistan: An Overview

2020 ◽  
Vol 2 (2) ◽  
pp. 133-143
Author(s):  
Rashida Zahoor ◽  
Naseem Razi

Communications have become the most essential and quite an easy as well as fast because of technology advancement. Developing states are also getting the same blessings of computer networks and internet like the developed nations of the world. Besides, such the blessings and curses take place on account of communications in the modern technology. Cyberspace - is the medium of communication on computer networking that is not safe. Criminals use such the technology to commit crimes on cyberspace. Meanwhile the sensitive data and information are hacked to injure the person, organization, society or even a state. These (cybercrimes) and criminal may be prevented by making the sufficient laws in a country. The principle aim of this study is to discuss the cybercrimes and examine the cyber laws in Pakistan. For this purpose, there are three parts of this paper. The first part addresses the cyber-crimes explicitly in Pakistan. The second part is dedicated to the legal framework of cyber laws in the country. While the last but not least part talks about the cyber security strategy of Pakistan.

Author(s):  
Thokozani Ian Nzimakwe

Cybersecurity is the practice of making the networks that constitute cyber space secure against intrusions. The aim is to maintain the confidentiality, the availability and integrity of information, by detecting interferences. Traditionally, cybersecurity has focused on preventing intrusions and monitoring ports. The evolving threat landscape, however, calls for a more dynamic approach. It is increasingly clear that total cybersecurity is impossible, unless government develops a cyber-security strategy. The aim of this chapter is to discuss government's dynamic approach to addressing challenges of cybersecurity. The chapter looks at the co-ordination of cyber-security activities so as to have a coordinated approach to cyber-crime. This chapter also highlights the idea of protecting sensitive data for the public good. It is generally accepted that technology has become indispensable in modern society. Government's cybersecurity presents a unique challenge simply because of the volume of threats that agencies working for government face on a daily basis.


Author(s):  
Mariam M. H. Alansari ◽  
Zainab M. Aljazzaf ◽  
Muhammad Sarfraz

The world has become more advanced in communication, especially after the invention of the internet. A key issue facing today's society is the increase in cybercrime or e-crimes (electronic crimes), another term for cybercrime. Thus, e-crimes pose threats to nations, organizations, and individuals across the globe. It has become widespread in many parts of the world, and millions of people are victims of e-crimes. Given the serious nature of e-crimes, its global nature, and implications, it is clear that there is a crucial need for a common understanding of such criminal activity internationally to deal with it effectively. This chapter covers the definitions, types, and intrusions of e-crimes. It has also focused on the laws against e-crimes in different countries. Cybersecurity and searching methods to get secured are also part of the study.


Author(s):  
Thokozani Ian Nzimakwe

Cybersecurity is the practice of making the networks that constitute cyber space secure against intrusions. The aim is to maintain the confidentiality, the availability and integrity of information, by detecting interferences. Traditionally, cybersecurity has focused on preventing intrusions and monitoring ports. The evolving threat landscape, however, calls for a more dynamic approach. It is increasingly clear that total cybersecurity is impossible, unless government develops a cyber-security strategy. The aim of this chapter is to discuss government's dynamic approach to addressing challenges of cybersecurity. The chapter looks at the co-ordination of cyber-security activities so as to have a coordinated approach to cyber-crime. This chapter also highlights the idea of protecting sensitive data for the public good. It is generally accepted that technology has become indispensable in modern society. Government's cybersecurity presents a unique challenge simply because of the volume of threats that agencies working for government face on a daily basis.


2018 ◽  
Vol 331 ◽  
pp. 313-323
Author(s):  
Andreas Düll ◽  
Anja Schoch ◽  
Matthias Straub

The coordinated Denial of Service attacks in Estonia 2007, the successful hacker attacks against the German Bundestag 2015 and the increasing number of cyber-crimes challenge the European Union (EU). In order to overcome these challenges the EU initiated a cyber security strategy in 2013. This paper follows up the question, whether the measures of this strategy are adequate in order to tackle the challenges of the cyberspace in modern times and which improvements can be done. The focus will rely on the analysis of the EU’s cyber security strategy 2013 as well as its advancement of 2017. The three issues ‘cyber resilience‘, ‘reducing cybercrime’ and ‘cyber defence policy and capabilities’ shall be analyzed. The unlimited sphere of the cyberspace, the invisible and barely identifiable opponents and the focus on national regulations seem to be an unsolved dilemma in the EU. After analyzing the current state, the paper shall formulate future recommendations for action to postulate an improved ‘pooling and sharing’ as well as the coordination and involvement of existing member states’ cyber capabilities. The devolution of responsibilities regarding cyber security to the EU stage is desirable in order to increase the European potency, because a divided EU will have great difficulties enforcing its interests over attacking opponents.


Author(s):  
Abdullahi Chowdhury ◽  
Gour Karmakar ◽  
Joarder Kamruzzaman

With the rapid expansion of digital media and the advancement of the artificial intelligence, robotics has drawn the attention of cyber security research community. Robotics systems use many Internet of Things (IoT) devices, web interface, internal and external wireless sensor networks and cellular networks for better communication and smart services. Individuals, industries and governments organisations are facing financial loses, losing time and sensitive data due these cyber attacks. The use these different devices and networks in robotics systems are creating new vulnerabilities and potential risk for cyber attacks. This chapter discusses about the possible cyber attacks and economics losses due to these attacks in robotics systems. In this chapter, we analyse the increasing uses of public and private robots, which has created possibility of having more cyber-crimes. Finally, contemporary and important mitigation approaches for these cyber attacks in robotic systems have been discussed in this chapter.


2019 ◽  
pp. 1426-1441
Author(s):  
Abdullahi Chowdhury ◽  
Gour Karmakar ◽  
Joarder Kamruzzaman

With the rapid expansion of digital media and the advancement of the artificial intelligence, robotics has drawn the attention of cyber security research community. Robotics systems use many Internet of Things (IoT) devices, web interface, internal and external wireless sensor networks and cellular networks for better communication and smart services. Individuals, industries and governments organisations are facing financial loses, losing time and sensitive data due these cyber attacks. The use these different devices and networks in robotics systems are creating new vulnerabilities and potential risk for cyber attacks. This chapter discusses about the possible cyber attacks and economics losses due to these attacks in robotics systems. In this chapter, we analyse the increasing uses of public and private robots, which has created possibility of having more cyber-crimes. Finally, contemporary and important mitigation approaches for these cyber attacks in robotic systems have been discussed in this chapter.


Author(s):  
MalathiEswaran, Et. al.

In the world of modern technology many devices are frequently handled by the people via network. Since the network has been utilized in communication across the world and also in data sharing, there may be a chance of cyber-attacks and intruding into the personal data of the user. This survey provides a witness in large amount of cyber-attacks widespread in the recent times. The issue also deals with the system under use and with the storage devices concerned. Inorder to manage large amount of data, cloud computing plays a vital role in managing the data and also prevents data from intruders. Many intrusion detection systems help in detecting anomalies, that caused by various cyber-attacks. This proposed survey focuses on types of attacks and also the methodology involved in detecting such type of attacks.


2011 ◽  
Vol 1 (1) ◽  
pp. 24-34 ◽  
Author(s):  
Christian Czosseck ◽  
Rain Ottis ◽  
Anna-Maria Talihärm

At the time of the state-wide cyber attacks in 2007, Estonia was one of the most developed nations in Europe regarding the ubiquitous use of information and communication technology (ICT) in all aspects of society. Relaying on the Internet for conducting a range of business transactions is common practice. But naturally, the more a society depends on ICT, the more it becomes vulnerable to cyber attacks. Unlike other research on the Estonian incident, this paper does not focus on the analysis of the events themselves. Instead, the authors examine Estonia’s cyber security policy and subsequent changes made in response to the cyber attacks. As such, the authors provide a comprehensive overview of the strategic, legal, and organisational changes based on lessons learned by Estonia after the 2007 cyber attacks. The analysis is based on a review of national security governing strategies, changes in the Estonia’s legal framework, and organisations with direct impact on cyber security. The paper discusses six important lessons learned and manifested in actual changes: each followed by a set of cyber security policy recommendations appealing to national security analysts as well as nation states developing their own cyber security strategy.


Webology ◽  
2020 ◽  
Vol 17 (2) ◽  
pp. 587-598
Author(s):  
M. Murugesan ◽  
P. Balamurugan ◽  
J. Santhosh ◽  
G. Arulkumaran

Cyber security plays a significant role in science. Data or information security is one of the crucial issues facing the world, when there is discussion about the rapidly growing cyber-crimes, the government and many corporations are taking many steps to stop such crimes. Driven by several different measures, cybercrime continues to expand day by day. In this review, the problems confronting cyber security from emerging technological advances and developments are briefly discussed and, in turn, the paper also reflects on the newest cyber security technologies, trends and other ethics throughout the cyber security field.


Sign in / Sign up

Export Citation Format

Share Document