Desperate need to arrest cyber crimes
(Technology Times (Pakistan) Via Acquire Media NewsEdge) With the rise in technology, the risks and crimes have also come along. Cyber crimes like websites hacking, information stealing especially of sensitive nature or viruses injection have become pain in the neck of internet users both individuals and governments. The developed states have got control to much extent over this menace by securing data protection at almost all levels, but as far as the developing states are concerned they still need to do a lot in this regard as week internet security is incurring heavy losses to them.
Generally, governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great deal of confidential information on computers and transmit that data across networks to other computers. This trend is still prone to internet security threats and at times they had to pay the price in terms of websites hacking or theft of highly sensitive data.
Presently, there are three types of computer crimes - attacking the computers of others by spreading viruses, using a computer to commit “traditional crime” or illegal gambling, and using a computer as a “fancy filing cabinet” to store illegal or stolen information. With the growing volume of cyber-attacks, more attention is required to protect sensitive business and personal information, as well as safeguard national security. Though IT departments and security departments of the educational institutions are created with the aim to increase the awareness of the associated risks of computer and network use, yet it needs to be ensured that these mechanisms deliver.
These departments need to work in collaboration with numerous academic partners such as quality assurance agencies, technical education centers, information systems centres and other academic programmes or associations committed to cyber security training, education, professional development, and research. In this regard, everyone has to play a role in cyber security as constantly evolving cyber threats require the regular engagement of the entire nation - from government and law enforcement agencies to the private sector and most importantly, the public. As a step forward to this effect, the government most recently has announced that the IT and Telecom policy draft has been finalized and would be implemented in coming June to control cyber crimes. However, this is yet to be seen in terms of implementation of this policy as laws are enacted in Pakistan but they hardly see the implementation stage.
[ Back To Cloud Computing 's Homepage ]