Affiliation:
1. IICT, University of Sindh, Jamshoro, Pakistan
2. University of Sindh, Jamshoro, Pakistan
Abstract
In this digital world, innovations and advancement have increased the number of users and the user ratio continues to double, triple and so-on. Unfortunately, the increase of crime, malware activities, has also increased. Thus, the privacy and security of systems and services is a prominent challenge for organizations, and countries. In this connection, each and every developed or developing country is practicing to design policies, strategies, cyber laws to deal with illegal activities, taken place via the internet. Pakistan is also one of those developing countries who have no any legislative policy, strategy or cyber law to deal such activities, having outdated policies and acts. Therefore, this article discusses some of the most dangerous malware attacks such as WanaCry, and Stuxnet. The article also mentions some countries with cyber policies/strategies/laws comparing them to Pakistan. The role of Pakistan is also part of the article and calls for awareness of researchers, policy/law makers. Some recommendations/suggestions have also been elaborated in this article for the re-designing of existed cyber laws.
Subject
Information Systems and Management,Computer Networks and Communications,Hardware and Architecture,Safety Research,Safety, Risk, Reliability and Quality,Software
Reference30 articles.
1. Afique, M. (2013). Cyber Law in Malaysia. Retrieved January 28, 2019, from http://malaysiancyberwarriors.blogspot.com/2013/03/introduction-of-cyber-law-acts-in.html
2. Threats of Cyber Security and Challenges for Pakistan.;J.Awan;11th International Conference on Cyber Warfare and Security: ICCWS - 2016, Boston USA,2016
3. Security strategies to overcome cyber measures, factors and barriers.;J. H.Awan;Engineering Science and Technology International Research Journal,2017
4. Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities
5. A user friendly security framework for the protection of confidential information.;J. H.Awan;Int. J. Comput. Sci. Netw. Secur,2017
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献