Cyber Security of Pakistan – A failure:

Cybersecurity definition: 
سائبرسیکیوریٹی انٹرنیٹ سے منسلک سسٹمز کے لیے ڈیجیٹل خطرات کے خلاف سیکیورٹی ہے، جس میں ان کے
ہارڈ ویئر، سافٹ ویئر اور ڈیٹا شامل ہیں۔تفویض کردہ قدر کے مطابق نقصان، نقصان/بدعنوانی، سمجھوتہ، یا غلط استعمال کے امکانات کو کم کرنے کے لیے، سائبرسیکیوریٹی معلومات/ڈیٹا، اثاثوں، خدمات اور قدر کے نظام کی حفاظت کرتی ہے۔
Cybersecurity is the security against digital threats for systems connected to the internet, involving their hardware, software, and data.
In order to decrease the likelihood of loss, damage/corruption, compromise, or misuse to a level commensurate with the value assigned, cybersecurity protects information/data, assets, services, and systems of value.
protects information/data, assets, services, and systems of value.
کاروباری اداروں، تنظیموں، مالیاتی اداروں اور لاکھوں باقاعدہ صارفین کے لیے، انٹرنیٹ خود ضروری ہو گیا ہے۔ کمپیوٹر نیٹ ورکس کے تعاون سے متعدد سرگرمیوں کا نقصان ان تنظیموں کو تقریباً گھٹنے ٹیک دے گا۔ اس کی وجہ سے، سائبرسیکیوریٹی کے خطرات قومی سلامتی کے خدشات میں بدل گئے ہیں۔ انٹرنیٹ کو محفوظ رکھنا مشکل ہے۔ سائبرسیکیوریٹی صرف منظم طریقے سے تیار کی جا سکتی ہے۔ یہ آسانی سے حاصل نہیں کیا جا سکتا.
For businesses, organizations, financial institutions, and millions of regular users, the Internet itself has become essential. A loss of the numerous activities supported by computer networks would almost bring these organizations to their knees. Because of this, cybersecurity vulnerabilities have evolved into national security concerns. It’s challenging to keep the Internet secure. It can only be developed systematically; it cannot be achieved easily.
concerns. It’s challenging to keep the Internet secure. It can only be developed systematically; it cannot be achieved easily.
concerns. It’s challenging to keep the Internet secure. It can only be developed systematically; it cannot be achieved easily.
This subject is part of Computer science course and you learn Cyber security basics and somehow knowledge about cyberthreat and how to prevent from cyberthreats. And after graduating you can do Master degree program in it.
Cyber security Awareness:
Have you ever faced online bullies? How they may quickly identify your data and what you can do to protect yourself from these sneaky threats. It equips your personnel with the necessary information. Which type of tools you can use to identify and report any hazards before they cause any harm.
First to come, you have to know these two terms.
- Data leakage (Data leaks can happen without a cyberattack and are typically caused by bad data security procedures, human error, or inaction)
- Data breach (is a situation in which a cybercriminal accesses your sensitive, private, confidential, or protected information for fun and profit)
What you can do:
Here are some steps given below that you can consider for strong security of your devices.
- Before you click, consider.
- Software Updates
- Add a second factor for authentication.
- Create secure passwords.
- Back up your data every day.
- Install antivirus software or a firewall.
Cyber Security threats in Pakistan:
سال 2022 ان ہیکرز کے نام سے منسوب ہے جنہوں نے پاکستان کے وزیر اعظم ہاؤس کے ڈیٹا بیس کو ہیک کیا اور پاکستان میں کھیلی جانے والی گندی سیاست کو بے نقاب کیا۔آڈیو لیک پرائم منیسٹ کے بارے میں تھا
یہ سب غیر قانونی سافٹ ویئر کے استعمال کی وجہ سے ہوا ، جو سیکیورٹی خصوصیات کو ہٹانے کے لئے اکثر پہلے ہی “ان لاک” ہوتا ہے ، جس سے پاکستان کو ہیک کرنے کے لئے زیادہ کھلا بنا کر خطرہ بڑھ جاتا ہے۔
The year 2022 is dedicated to the hackers who hacked the databases of Pakistan’s Prime Minister House and exposed the dirty politics being played in Pakistan. Audio leakage was about the Prime minister Shahbaz sharif and Maryam Nawaz Also the PTI party suffered from same situation. Data was sold on dark web which is not shown on google search. However, it was an instance of grievous for whole Pakistan nation that their personal data is not even save and encrypted. Pakistan has a sizable internet user population, a rapidly digitizing security apparatus, and an internet-dependent banking system. Pakistan has also adopted regulations to address the threat posed by cyberattacks, but these rules don’t appear to go into great detail about the threats. This all happened due to the use of pirated software, which is frequently already “unlocked” to remove security features, adds to the threat to Pakistan by making it more open to hacks. The broad use of unlicensed software, incidentally, was listed as the cause of the FBR attack. There’s still a lot of work that needs to be done on the field and Government should review the whole cybersecurity system of Pakistan.
has a sizable internet user population, a rapidly digitizing security apparatus, and an internet-dependent banking system. Pakistan has also adopted regulations to address the threat posed by cyberattacks, but these rules don’t appear to go into great detail about the threats. This all happened due to the use of pirated software, which is frequently already “unlocked” to remove security features, adds to the threat to Pakistan by making it more open to hacks. The broad use of unlicensed software, incidentally, was listed as the cause of the FBR attack. There’s still a lot of work that needs to be done on the field and Government should review the whole cybersecurity system of Pakistan.
Here the question arises that why Pakistan is still suffering from cyberthreats? And the reason is people have less awareness about their privacy also the education rate of learning this subject is not good enough and Lack of highly technical staff that can handle national security that can advise government sectors and handle them carefully.
.
Scope of Cybersecurity in Pakistan:
It’s an excellent career, however in Pakistan, it takes time. You will initially be granted a job as a database administrator or another entry-level position or internship.
But There are numerous security-related sectors that offer a wealth of employment and research opportunities. The following are the well-known fields that provide rewarding job opportunities:
Suitable for a technical guy who enjoys creating and securing a computer network is network security. Initial growth will be moderate, but compared to other sectors, a network security professional with five or more years of experience will have an absurd number of jobs offers.
Application security is a fascinating area with lots of room for expansion. The daily developments in this subject must be regularly kept up with. Regardless of experience, the more knowledge you have, the more respected you are in this industry.
This is a specialized topic with few experts. You must be proficient with the various mobile operating systems, including Android, iOS.
Malware/Spyware Analysis:
From the perspective of archaeological research, this is a fascinating topic with a wide range of options.
Verifying that all security measures are in place and carrying out audit procedures are part of risk audit and management.
Zain ul Hassan
Nice work