Case Study
Case Study
net/publication/308728597
CITATIONS READS
4 6,413
5 authors, including:
Hamid Asmat
University of Haripur
3 PUBLICATIONS 8 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
can we integrate any learning technique into bio inspired routing protocols for WSN. If yes, which will be most suitable for use View project
All content following this page was uploaded by Hamid Asmat on 13 February 2019.
Sultan Ullah, Muhammad Amir, Mudasser Khan Hamid Asmat, Kamran Habib
Department of Information Technology Department of Information Technology
The University of Haripur The University of Haripur
Haripur, Pakistan Haripur, Pakistan
{sultan,aamir,[email protected]} {hamid.asmat,[email protected] }
Abstract—The growth of internet in Pakistan is exceptional; it development of ICT which eliminated the concept of
reached to the heights of popularity for an ever changing geographical boundaries [4].
medium of information and communication in a major
conservative society. This brings freedom of expression, The governments are encouraging its people to use ICT
communication and information across the country which since its inception, but they are constantly working to
struggled to provide free speech and information access to its counteract the dark side of the technology as well and doing it
people. The internet penetration is increasing very rapidly; it is simultaneously. Legal and technical measures are taken to
very important to observe the impact of it on the society; protect and prevent ICT from catastrophes along with
especially when the government is constantly trying to formulate discouraging criminal behavior [4].
the regulation for controlling the cyber space. A well regulated
cyber space leads to the expansion of information technology Pakistan is also facing the problem of cyber security and is
services speedily. This paper focuses on the prevailing not free from this dilemma. In Pakistan the extraordinary
development of governance policies for cyber space and defies growth, accessibility of computer equipments and growth in
among the agencies and information technology venders. internet service providers leads to learn and communicate. On
Moreover, the case study of national bank of Pakistan and other the other hand, a few folks do utilize this powerful technology
cyber crime survey shows that a lot of law making is needed in for unlawful purposes too. In this paper it is tried to explore the
order to reduce the chances of cyber crime. problems that are faced and some of the laws that are already
available to counter these issues and suggestion which are
Keywords—Cybercrimes, Policies, Trends, Challenges, needed to strengthen these laws.
Preventions
I. INTRODUCTION
II. LITERATURE REVIEW
The growth of information and communication
technologies (ICT) is unprecedented and overwhelming during The emerging technologies of mobile and cloud computing,
the past decade. The expansion growth for internet users electronic commerce and social applications are primarily
increased at a rate of 5, 5001.2 percent during 2000 – 2005. changing the world’s perspective of business. The business
The adoption is slow as compared to early rise but still it is organizations are developing strategies to gain the unfold
increasing at a rate of 4.62 percent, and still it needs to be benefits of this latest technology in information sharing and
standardized according to internal standards [1]. conducting commerce on the internet [4, 5]. The total volume
of business transaction perform online is approximately eighty
This insurrection in information technologies have changed
the social order primarily and will possibly go on with it in the percent of the total transactions. Therefore, the requirement for
near future. Earlier only a few groups of the economic sector high level security is augmented to reduce the chances of
had changed its operational procedures due to the advent of transaction failure and customer dissatisfaction. Cyber Security
ICT, but merely any group of the economic or social society is is not limited to securing the local information technology
unaffected with this technology at the moment. It has intensely infrastructure of the organization; rather it is extended to much
changed the social structure of today’s world [2] [3]. more border network and information technology
infrastructure[6]. The role of cyber security cannot be ignored
The social and economical changes due these technologies in the current development and deployments of critical
are unparalleled on one hand but as every picture has two
computing and communication infrastructure [7]. National
sides, the technologies also have a darker side on the other
security and economical development are the key players for
hand as well. It leads to the appearance of new categories of
crimes in addition to commit the conventional crimes using the improvements in cyber security and protection of vital
emerging technologies. Furthermore, the effects of immoral digital infrastructures. It is essential to make the internet more
behavior can be broader as compared to earlier due to secure and protect the user of internet from cyber attacks in
Despite laws making, a few countries e.g. China and Saudi A lot of new apps and devices are developing, which
Arabia have implemented technical procedures of internet brought with them new security threats. The organization are
filtering. Kingdom of Saudi Arabia established internet service moving towards paper less economy where everything will be
unit (ISU), 2010. ISU is responsible for filtering the web traffic digital. They want to safe guard the sensitive information
allowing the user to access only the legitimate (the website rather than the physical security of the system only. The
which are not on the “Black List”) web sites [13]. companies are trying to get advantages from the cutting edge
technology of cloud rather mobile cloud computing but still
hesitant to migrate to it because of the security issues relating
III. EMERGING TRENDS AND CHALLENGES the privacy and availability [15, 17].