This Content Downloaded From 202.47.42.210 On Fri, 23 Jul 2021 00:08:44 UTC
This Content Downloaded From 202.47.42.210 On Fri, 23 Jul 2021 00:08:44 UTC
This Content Downloaded From 202.47.42.210 On Fri, 23 Jul 2021 00:08:44 UTC
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org.
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Sustainable Development Policy Institute is collaborating with JSTOR to digitize, preserve and
extend access to this content.
In recent years, there have been millions of cyber-attacks targeting infrastructure and services. In many
cases, hackers used ransom- ware to make money from the victims. It is, therefore vital that we acquire
the capability of not only defending against such attacks, but also the ability to launch counter cyber-
attacks. This is easier said than done, because in most cases the attacker’s identity is difficult to
establish. The nature of internet makes it possible to hide behind its free for all infrastructures. This is
especially so when cyber-attacks are state sponsored. Also because of the asymmetry of attacks, the
hackers enjoy anonymity.
Nevertheless, countries must adopt measures for effective cyber security. Cyber security has been
defined as the body of technologies, processes and practices designed to protect networks, computers,
programmes and data from attacks, damage or unauthorized access. In a computing context, security
includes both cyber security and physical security. Cyber security envelops computer networks,
infrastructure, software programmes, military command and control systems, utility services, etc. which
must be protected from disruption, hacking and cyber- attacks. As the technology advances at a fast
The last hundred years have brought much change to the ways states and non-state actors conduct the
art of war. This century is increasingly being called the “information age”, but has not come without its
downside. As the world relies more and more on internet, interconnectedness and technology, the threat
of cyber security being breached increases manifold and has the tendency to impose serious damage
(Rasool 2015). In the same way, Pakistan also faces threats from the cyber world. It’s not a surprise that
Pakistan is also facing cyber space dilemma. In case of Pakistan, cyberspace has been spreading into
the institutions of banking, education as well as, telecom sector, military and government sectors (Ibid).
The act itself has been hailed by some as a milestone and by some as a draconian law which would
hamper certain rights of citizens such as freedom of speech and give additional powers to the
government agencies and departments (Guranami 2017). Many civil society organizations and
politicians have raised concerns about the language of the document which leaves it open for
exploitation for agencies and departments. Human rights experts call for balance between security and
human rights (Khan 2016).
Similarly, other information technology-based services include financial services in Pakistan. Credit
cards, accounts information and other financial information can also be acquired for theft or fabrication.
In Pakistan, banking is increasing its user base at a brisk pace; the resulting threats are also multiplying.
Capital markets, which are the buying and selling financial markets for long-term debt or investment
purpose. This type of capital markets helps organization as well as government to invest their amount
by protecting them from frauds (Awan and Memon 2016). Nowadays, capital markets are upgraded into
computer-based electronic trading systems. These trading systems include stock exchanges, investment
banks, treasury departments and government departments (Ibid). Figure 2 highlights offshoots of
business and financial services,
Figure 2