This Content Downloaded From 202.47.42.210 On Fri, 23 Jul 2021 00:08:44 UTC

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Sustainable Development Policy Institute

Report Part Title: WHERE DOES PAKISTAN STAND?


Report Title: Cyber Security:
Report Subtitle: Where Does Pakistan Stand?
Report Author(s): Rubab Syed, Ahmed Awais Khaver and Muhammad Yasin
Sustainable Development Policy Institute (2019)

Stable URL: http://www.jstor.com/stable/resrep24376.10

JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org.

Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms

Sustainable Development Policy Institute is collaborating with JSTOR to digitize, preserve and
extend access to this content.

This content downloaded from


202.47.42.210 on Fri, 23 Jul 2021 00:08:44 UTC
All use subject to https://about.jstor.org/terms
6. CYBER ATTACK TARGETS
Cyber-attacks increased 24 per cent globally during the second quarter of 2017 compared with the first
three months of the year with the manufacturing industry being the most heavily targeted. Just over a
third of all documented attacks in the second quarter targeted the manufacturing industry, with
manufacturers appearing in the top three targets in five of six geographic regions throughout 2016.
Manufacturing (34 per cent) was followed by finance (25 per cent) and health care (13 per cent) as the
most targeted sectors. Banks have also been the favourite target of skilled cyber criminals. This has
been true for more than a decade. Cybercrime imposes a heavy cost on financial institutions as they
struggle to combat fraud and outright theft. One report says that banks spend three times as much on
cyber-security as non-financial institutions, and there is an agreement among bank regulators around
the work that cybercrime poses a “systematic” risk to financial stability. (Lewis, 2018) While the
number of attacks on media and entertainment decreased somewhat from last year (by 39 per cent), it
remains one of the most prominent targets. As audiences around the world increase their demands for
instantaneous access to quality content and the ability to view that content anywhere and on any device,
the media and entertainment industry is becoming an increasingly favoured target for hackers looking
to steal Personal Identifiable Information (PII). The media and entertainment industry also offer hackers
looking for recognition or recruits higher visibility. While the internet and telecom industry are among
the most targeted ones for DoS attacks, studies show that a large percentage of these attacks were on
gaming websites, which links this particular category to the most-targeted industry of gaming. This
connection could easily lead to internet and telecom quickly moving up the most-targeted list. Again,
internet and telecom are highly reliant on a reputation for resiliency and uptime. Any drop-in service
levels can have a dramatic effect on the bottom line.

7. WHERE DOES PAKISTAN STAND?


The expanding cyber space, which involves the enhanced use of information technology (IT) and
Telecommunications (Telecom), invites hackers to misuse and disrupt the use of cyber space. Attack
space for hackers has also expanded to the extent that they can, at will, disable networks. Just imagine
what will happen if the financial, electric grid system, transport and military command and control
system of a country is paralyzed.

In recent years, there have been millions of cyber-attacks targeting infrastructure and services. In many
cases, hackers used ransom- ware to make money from the victims. It is, therefore vital that we acquire
the capability of not only defending against such attacks, but also the ability to launch counter cyber-
attacks. This is easier said than done, because in most cases the attacker’s identity is difficult to
establish. The nature of internet makes it possible to hide behind its free for all infrastructures. This is
especially so when cyber-attacks are state sponsored. Also because of the asymmetry of attacks, the
hackers enjoy anonymity.

Nevertheless, countries must adopt measures for effective cyber security. Cyber security has been
defined as the body of technologies, processes and practices designed to protect networks, computers,
programmes and data from attacks, damage or unauthorized access. In a computing context, security
includes both cyber security and physical security. Cyber security envelops computer networks,
infrastructure, software programmes, military command and control systems, utility services, etc. which
must be protected from disruption, hacking and cyber- attacks. As the technology advances at a fast

This content downloaded from


202.47.42.210 on Fri, 23 Jul 2021 00:08:44 UTC
All use subject to https://about.jstor.org/terms
rate, household devices will also be open to hacking and disruptions. Therefore, cyber security is a very
vast field which will be an uphill task.

The last hundred years have brought much change to the ways states and non-state actors conduct the
art of war. This century is increasingly being called the “information age”, but has not come without its
downside. As the world relies more and more on internet, interconnectedness and technology, the threat
of cyber security being breached increases manifold and has the tendency to impose serious damage
(Rasool 2015). In the same way, Pakistan also faces threats from the cyber world. It’s not a surprise that
Pakistan is also facing cyber space dilemma. In case of Pakistan, cyberspace has been spreading into
the institutions of banking, education as well as, telecom sector, military and government sectors (Ibid).

7.1.1. Prevention of Electronic Crimes Act, 2016


Pakistan is cognizant of the threats it faces from cyber realm. In response to these threats and challenges,
the Prevention of Electronic Crimes Act was passed in 2016, which proposes punishments for cyber
offenders. According to the Act, any unauthorized access to information system constitutes a punishable
offense, so does unauthorized copying of any data, access to any critical infrastructure, electronic fraud,
tampering with communication information, offences against person modesty or decency, writing
malicious codes or their transmission, cyber stalking, hate speech or glorification of an offence. The
Act proposes both fines and jail terms for these offences. Additionally, a provision is made for
Computer Emergency Response Teams, who would constitute personnel of expertise in issues
pertaining to cyber security on critical infrastructure or information data. Similarly, intelligence
agencies officials are to be made part of these teams as well (Ibid). The Act also proposes international
cooperation in this regard to thwart or instigate threats of cyber security.

The act itself has been hailed by some as a milestone and by some as a draconian law which would
hamper certain rights of citizens such as freedom of speech and give additional powers to the
government agencies and departments (Guranami 2017). Many civil society organizations and
politicians have raised concerns about the language of the document which leaves it open for
exploitation for agencies and departments. Human rights experts call for balance between security and
human rights (Khan 2016).

7.1.2. Essential IT services in Pakistan:


In 21st century, countries and business firms alike are employing latest innovative technologies to make
information accessible to all, secure and confidential if need be. States have an especially significant
role in his regard to keep record of their citizens. National Database and Registration Authority
(NADRA) is the only organization which registers and stores the information about the population
(Awan and Memon 2016). In Pakistan’s bid to fight terrorism, information about its citizen is essential.
NADRA further relays the information to other government agencies for their related purposes. This
information is sensitive and faces a threat of being stolen or fabricated. NADRA may be current target
for cyber terrorism to block or sabotage its essential services, hack human confidential information and
use them for their illegal purposes.

This content downloaded from


202.47.42.210 on Fri, 23 Jul 2021 00:08:44 UTC
All use subject to https://about.jstor.org/terms
Figure 1: NADRA and its important services

Source: Awan and Memon 2016

Similarly, other information technology-based services include financial services in Pakistan. Credit
cards, accounts information and other financial information can also be acquired for theft or fabrication.
In Pakistan, banking is increasing its user base at a brisk pace; the resulting threats are also multiplying.
Capital markets, which are the buying and selling financial markets for long-term debt or investment
purpose. This type of capital markets helps organization as well as government to invest their amount
by protecting them from frauds (Awan and Memon 2016). Nowadays, capital markets are upgraded into
computer-based electronic trading systems. These trading systems include stock exchanges, investment
banks, treasury departments and government departments (Ibid). Figure 2 highlights offshoots of
business and financial services,

Figure 2

Source: Awan and Memon, 2016

This content downloaded from


202.47.42.210 on Fri, 23 Jul 2021 00:08:44 UTC
All use subject to https://about.jstor.org/terms

You might also like