Cyber Security and Analysis of Cyber-Crime Laws to Restrict Cyber Crime in Pakistan

Full Text (PDF, 548KB), PP.62-69

Views: 0 Downloads: 0

Author(s)

Qamar Atta Ul Haq 1,*

1. Computer Science Department, ISP University 9-KM Bosan Roads, Multan Pakistan +92-61-111-786-477 PAKISTAN

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2019.01.06

Received: 11 Nov. 2018 / Revised: 10 Dec. 2018 / Accepted: 14 Dec. 2018 / Published: 8 Jan. 2019

Index Terms

Cyber security, cyber jihad, hacking aggression, Intrusion detection system and intrusion prevention systems, Intellectual property, Computer security, Cyber terrorism, Security risks, Encryption, Hacking Vulnerability

Abstract

This research report analyses the plebeian interest and tension hostility between privacy and cyber security in Pakistan. I explore the areas threaten by hackers in means of ATM card hacks and social data sniffing. It explores the challenges for Cyber security belongs to privacy and data protection.

Cite This Paper

Qamar Atta Ul Haq, "Cyber Security and Analysis of Cyber-Crime Laws to Restrict Cyber Crime in Pakistan", International Journal of Computer Network and Information Security(IJCNIS), Vol.11, No.1, pp.62-69, 2019. DOI:10.5815/ijcnis.2019.01.06

Reference

[1]Seminar, “Security in Cyber Space: Implications and Challenges,” Center for International Strategic Studies (CISS), Islamabad Marriot Hotel, September 30, 2014.
[2]Deibert, Ron. Distributed Security as Cyber Strategy: Outlining a Comprehensive Approach for Canada in Cyberspace. Prepared for the Canadian Defense & Foreign Affairs Institute, August 2012.
[3]Oona A. Hathaway, Rebecca Crootof, Philip Levitz, Haley Nix, Aileen, Nowlan, William Perdue, Julia Spiegel; “The Law of Cyber Attack”; Forthcoming in the California Law Review, 2012.
[4]WSIS Thematic Meeting on Cyber security Geneva, 10 June 2005 A Comparative Analysis Cyber security Initiative Worldwide Page 3-4.
[5]The art of ensuring the existence and continuity of the information society of a nation, guaranteeing and protecting, in Cyberspace, its information, assets and critical infrastructure.” (Canongia & Mandarino, 2014).
[6]Dr. Sadiq Ali Khan Department of Computer Science National University of Computer and Emerging Sciences FAST.
[7]FIA, NAB, SEECS, PISA, CSP and NUST researches documents.
[8]APSCC. (2018, 11 10). step1.php. Retrieved from online.fpsc.gov.pk:online.fpsc.gov.pk/fpsc/gr/step1.php
[9]Brahima Sanou (Director, T. D. (2017). Global Cybersecurity Index (GCI). Global Cybersecurity Index (GCI), 65.
[10]J. Blackburn and G. Waters. Optimising Australia’s Response to the Cyber Challenge. Kokoda Foundation, 2011.
[11]M. Qiu, L. Zhang, Z. Ming, Z. Chen, X. Qin, and L. Yang. Securityaware optimization for ubiquitous computing systems with SEAT graph approach. J. of Computer and Syst. Sci., 79(5):518–529, 2013.
[12]M. Gallaher, A. Link, and B. Rowe. Cyber Security: Economic Strategies and Public Policy Alternatives. Edward Elgar Publishing, 2008.
[13]F. Pasqualetti, F. Dorfler, and F. Bullo. Attack detection and identification in cyber-physical systems. IEEE Transactions on Automatic Control, 58(11):2715–2729, 2013.
[14]Y. Yan, Y. Qian, H. Sharif, and D. Tipper. A survey on cyber security for smart grid communications. IEEE Communications Surveys & Tutorials, 14(4):998–1010, 2012.
[15]S. Subashini and V. Kavitha. A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1):1–11, 2011.
[16]M. Qiu, H. Su, M. Chen, Z. Ming, and L. Yang. Balance of security strength and energy for a PMU monitoring system in smart grid. IEEE Communications Magazine, 50(5):142–149, 2012.
[17]F. Hu, M. Qiu, J. Li, T. Grant, D. Taylor, and S. McCaleb et al. A review on cloud computing: Design challenges in architecture and security. J. of Computing and Info. Tech., 19(1):25–55, 2011.
[18]F. Liu, H. Lo, L. Chen, and W. Lee. Comprehensive security integrated model and ontology within cloud computing. J. of Internet Technology, 14(6):935–946, 2013.
[19]N. Rani, A. Satyanarayana, and P. Bhaskaran. Coastal vulnerability assessment studies over india: a review. Natural Hazards, 77(1):405– 428, 2015.
[20]K. Gai, M. Qiu, L. Tao, and Y. Zhu. Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Security and Communication Networks, pages 1–10, 2015.