Professional Documents
Culture Documents
HACKING IN PAKISTAN
Arshee Ahmed
Dr. Sadiq Ali Khan
Telecom Engineer
National University of Computer and Emerging Sciences-
Associate Professor
FAST
Karachi University
ahmed.arshee28@gmail.com
msakhan@uok.edu.pk
Abstract:
1. INTRODUCTION
After the advent of the internet, it has been the most efficient
mean of communication. No doubt there are uncountable
1.1Cybercrimes in Pakistan:
of fraudulent.
which have been committed during the past five years .On
number of cybercrimes which take place in our day to day life. Financial Crimes
Cyber pornography
Email Spoofing
1.2 The Role of Social Network Sites:
The SNS plays the vital role in cyber crimes. The sites like
Facebook, twitter are at the top. In SNS one can easily create
false profile [3].The criminal usually create the dummy
Forgery
Cyber defamation
Cyber stalking
Unauthorized access to computer systems or networks:
Salami attacks
Denial of Service attack
Virus/worm attacks
Logic bombs
Physically damaging a computer system
ethical hacker uses all the tools and techniques that hacker
does to exploit the security system. So, it is required for all of
Riphah
Hacker program.
Institute
of
Systems
Engineering
(RISE)
in
is also a cyber-crime.
Criminal access
Criminal data access
Data damage
System damage
Electronic fraud
Electronic forgery
Misuse of devices
Misuse of encryption
Malicious code
Cyber stalking
law
Spamming
border
cyberspace[4].And most
Spoofing
enforcements,
line
do
not
hold
Unauthorized interception
in
private
Cyber Terrorism
ensure
network[6].There
the
are
highly
41
secured
internet
and
crimes
prospered
have
been
make it easier
blasphemous sites.
2. LITERATURE SURVEY:
Israel.Its
target
was
Irans
nuclear
enrichment
newspaper
and
news. The
next
question
3. METHODOLOGY:
In this research paper I have conducted a survey on the
security issues and ethical hacking..Questions were distributed
in such a way that it covered all of the relevant material. In
first question people knowledge about the cyber-crime was
judged. The purpose of the first question was to determine
how much of the people are aware of this term. The second
question was designed to determine the internet usage among
the people. In my next question I asked whether people
consider cybercrime a threat or not. Because I have studied the
cases in which victim especially females have been black
mailing via social media sites In fourth question the reason
behind committing crime have been asked. Six options have
five
security
measures
.These
are
Deterrence,
The result shows that people are familiar with the number of
ways in which a person can used different forms of the crimes
How often you use the internet in your daily routine?
Fig 3.1.1
54%
34%
13%
Fig 3.1.3
Fig 3.1.2
Greed
Power
Publicity
Revenge
Desire to access forbidden
11%
13%
10%
11%
information
Destructive mindset
31%
23%
Table 3.1.2
Financial Crimes
Occur Frequently
Occur more frequently
53%
24%
21%
2%
Occur infrequently
Has not occurred
Cyber pornography
Fig 3.1.4
Occur Frequently
Occur more frequently
Agree
Strongly agree
Disagree
Strongly disagree
47%
34%
19%
0%
49%
Occur infrequently
41%
7%
4%
Table 3.1.5
Table 3.1.3
Occur Frequently
Occur more frequently
35%
38%
22%
5%
Occur infrequently
Has not occurred
23%
Hacking
40%
19%
1%
Occurrence of Hacking
If an ethical hacker is employed by a company, the
Table 3.1.7
Web Jacking
Occur Frequently
Occur infrequently
Has not occurred
34%
36%
9%
90-100%
70-80%
50-60%
12%
60%
28%
Table 3.1.10
Table 3.1.8
day to day routine. Only those people who have been the
victim
Pakistan?
of
Pakistans
the
crime
have
taken
some
preventive
misuse of technology.
References
[8] Rizik M.H Al-Sayyed atel ; Search Engines in Website Security Leak ;
Groups, How Law Enforcement & Intelligent Can Better Utilize Social
[5] Maslin Masrom, Nik Hasnaa Nik Mahmood, Othman Zainon, Hooi Lai
Wan, Nadia Jamal ;Information and Communication Technology Issues: A
Case of Malaysian Primary School ; VOL. 2, NO. 5, June 2012 ISSN 22257217 ARPN Journal of Science and Technology 2011-2012. All rights
reserved.
[6] Jeffy Mwakalinga and Stewart Kowalski; ICT Crime Cases Autopsy:
Using the Adaptive Information Security Systems Model to Improve ICT
Security ; IJCSNS International Journal of Computer 114 Science and
Network Security, VOL.11 No.3, March 2011
10