The subjects of these attacks were the banking sector, telecom industry, educational sector, and critical infrastructure, with the military and government sectors being the main targets of the attackers.12 In the first quarter of 2024, spyware attacks in Pakistan surged by an alarming 300% compared to the same period in 2023, indicating a sharp rise in espionage and data infiltration threats. [...] The former was the first legislation on the IT sector and focused on legally facilitating electronic transactions in the country, whereas the latter was established as a regulatory authority for the media industry in Pakistan, which was mushrooming at that time.41 Moreover, due to the absence of any direct legislation on data protection, data privacy was being regulated through the provisions of E. [...] The delegation of both legislative and judicial powers to the Pakistan Telecommunication Authority (PTA), which can remove and block online content, is seen as a violation of Article 19 of the Constitution, which protects free speech.47 The Act is also seen as ineffective in many cases, particularly due to the non-cognizable, bailable, and compoundable nature of most of its provisions. [...] National Centre for Cyber Security The government established the National Centre for Cyber Security (NCCS) in 2018 as a collaborative effort between the Higher Education Commission (HEC) and the Planning Commission ‘to build national capabilities and capacities in Cyber Security and produce indigenous professionals and solutions in the field of Cyber Security.53 Following an open call for proposa. [...] In the context of cyber security, the complexity of inter-agency collaboration and the rapid evolution of cyber threats exacerbate these challenges.
Related Organizations
- Pages
- 32
- Published in
- Pakistan
Table of Contents
- 2024 2
- President Air Marshal Javaid Ahmed Retd Editor Layout Hira Mumtaz All correspondence pertaining to this publication should be addressed to CASS Islamabad through post or email at the following address 2
- Research Assistant 3
- TABLE OF CONTENTS 5
- Abstract ....................................................................................................... 1 5
- Introduction ................................................................................................ 2 5
- Cyber Security Threats Impacting Pakistan ................................................ 3 5
- Pakistans Cyber Security Architecture ..................................................... 10 5
- Cyber Security Risk Governance Looking Ahead ...................................... 18 5
- Conclusion ................................................................................................. 24 5
- Abstract 7
- Swift progress in technology has accelerated digitalisation globally with Pakistan 7
- This Working Paper critically examines Pakistans cyber security landscape 7
- Distributed Denial of Service DDoS attacks. Through an analysis of the 7
- Keywords 7
- 1. Introduction 8
- Working Paper 9
- 2. Cyber Security Threats Impacting Pakistan 9
- 2.1. Rapid Increase in Data Theft 11
- 2.2. Phishing 12
- 2.3. Ransomware 13
- 2.4. Distributed Denial-of-Service DDoS Attack 14
- 2.5. Cyber Threats to Critical Infrastructure 15
- 3. Pakistans Cyber Security Architecture 16
- 3.1. Initial Organisational Developments 17
- 3.2. Pakistan Electronic Crimes Prevention Act PECA 2016 17
- 3.3. National Centre for Cyber Security 19
- 3.4. National Cyber Security Policy NCSP 2021 20
- 3.5. Cyber Security Strategy for the Telecom Sector 22
- 3.6. Computer Emergency Response Teams CERTs Rules 2023 23
- 3.7. National Cyber Crimes Investigation Agency NCCIA 2024 23
- 4. Cyber Security Risk Governance Looking Ahead 24
- 4.1. Reduce Fragmentation and Bureaucratic Overlap in 25
- Cyber Security Governance 25
- 4.2. Apply Structured Cyber Risk Governance Protocols 25
- 4.3. Increase Digital Literacy and Cyber Security Awareness 26
- 4.4. Expand Infrastructure Connectivity and Access 26
- 4.5. Regulate Inclusive Policy on Data Protection 27
- 4.6. Adopt Advanced Cyber Security Technologies 28
- 4.7. Move towards Indigenisation and Data Localisation 29
- 4.8. Information Sharing and Global Collaboration 29
- 5. Conclusion 30
- Cyber Security Risk Governance 30
- ABOUT THE AUTHOR 31
- ABOUT CASS 32
- VISION 32
- To serve as a thought leader in the aerospace and security domains 32
- MISSION 32
- To provide independent insight and analysis on aerospace and 32
- CORE AREAS OF RESEARCH 32