Introduction to Cyber threats

Aleena Jaffari
2 min readFeb 1, 2022

--

In this globalized world the cyber based technologies are an important part of human’s lives. We can’t even imagine a day without these cyber based technologies as most of the important systems are based on it whether it is an office, bank, data management organization or super store. As the usage increases it also increases the threats to it. It needs a well-defined security. There is no awareness even in public for these kinds of threats. On national level there is no security policy or law regarding Cyber crimes.

The negligence over cyber security is worsening day by day and it may have worst consequences. It also harms the military based data and from this context it is becoming a direct threat to national security of the state. There is a huge lack of information and authority body who should control the cyber crimes and do research and make law or policies regarding cyber security. Unfortunately, if in any case research has been done for Cyber security it could not be implemented as the requirement. Cyber based technologies have changed all the systems economic, social or political but still there is less understanding of its security importance.[1] It is a fact that Before the attacks no state thought about this security even they are using Cyber base technologies in their daily lives. In today’s world the ideas recommendations, policies and laws are not capable of covering all the aspects of Cybersecurity. In Cybercrimes basically state actors play major role and no state in this world is fully capable of controlling Cyber Crime. Still it is the responsibility of the state to overcome this issue to secure their nation.[2]

On the other side, the cyber attackers comes with new techniques and ideas to harm websites and the number of attacks are increasing day by day. So, this issue needs attention of authorities that there should be a law to control it.

At international level US and China are working to secure their cyber based technologies. So, it is the right time to take actions for state rather than waiting for an incident to be happen.

[1] M Bishop, “What is Computer Security?”, 2003.

[2] Muhammad Shabbir, “Cybersecurity in Pakistan, Emerging Threats and Preventive mearsures”,2013

--

--