SlideShare a Scribd company logo
Dr. M Nasir Mumtaz Bhutta
Institute of Computing
Bahauddin Zakariya University
Multan, Punjab, 60,000
Pakistan
Email: bhutta.nasir@gmail.com
www.bzu.edu.pk
Course: Information Security and Assurance
Cyber Security Laws
18 March 2015
Dr. M N M Bhutta www.bzu.edu.pk
Lecture Overview
• Why is it important to understand/define
Cyber Security Laws?
• Cyber Crimes.
• Well Known USA’s Cyber Security Laws.
• Pakistan’s Cyber Security Laws:
– Electronic Transaction Ordinance 2002.
– Electronic Cyber Crime bill/Act 2007.
• Recent Developments in Pakistan’s Cyber
Law.
2
Dr. M N M Bhutta www.bzu.edu.pk
Importance to Understand
Cyber Security Laws
• Cyber Security Laws are introduced:
– In response to cyber crimes.
– To improve organizational security.
– To protect people and their assets.
• Every country has its own set of laws.
• Organizations should ensure that which laws will be
applicable to them depending upon their location.
• Organizations should incorporate cyber laws as part of
their security policy and include lawyers in their security
decisions.
• Govt have laid down security compliance requirements
to protect people and their assets.
3
Dr. M N M Bhutta www.bzu.edu.pk
Cyber Crimes
• Some Latest Cybercrime Statistics
4
Dr. M N M Bhutta www.bzu.edu.pk
Cyber Crime Vs Conventional Crime
• Conventional Crime is:
– social and economic phenomenon and as old as
society.
– Legal wrong which can be followed by criminal
proceedings and can result in punishment.
• Cyber Crime is:
– Where computer is subject or object of crime.
– Unlawful act where computer is a tool or target or
both.
5
Dr. M N M Bhutta www.bzu.edu.pk
Complexity of Cyber Disputes
• Cyber crime takes place across whole world
geographic boundaries.
• Which court will have exclusive jurisdiction to the
crime?
• Different countries have different legal systems
and it can be extremely expensive depending
upon location.
• Doubts on efficacy of decisions given be courts
on global level and sanctions are questionable.
6
Dr. M N M Bhutta www.bzu.edu.pk
Types of Cyber Crimes
7
Dr. M N M Bhutta www.bzu.edu.pk
Targets of Cyber Crime
• Some important industries which are
targets of cyber crime are given below:
8
Dr. M N M Bhutta www.bzu.edu.pk
Cyber Security Technologies To
Fight Against Crimes & To
Improve Organizational Security
9
Dr. M N M Bhutta www.bzu.edu.pk
Penetration Testing/Ethical Hacking
(Web and Infrastructure Hacking)
• Penetration testing is legal and authorized exploitation of
computer systems to make them more secure.
• Penetration testing is performed in following phases:
– Reconnaissance: collecting detailed information about system
(e.g. all machines IP addresses etc. )
– Scanning: 1. Port Scanning (finding open ports on systems and
services being run). 2. Vulnerability Scanning (finding known
vulnerabilities for services running on the system)
– Exploitation: Attacking the system for the found vulnerabilities.
– Maintaining Access: After exploitation, creating a permanent
backdoor for easy access to the system later on.
– Reporting: Details about the found issues, detailed procedures
and presenting solutions to mitigate the security issues found.
10
Dr. M N M Bhutta www.bzu.edu.pk
Malware Analysis/Reverse Engineering
• Art of dissection of malware:
– To provide information about intrusion/attack (what exactly happened).
– The goal is exactly to find out: what a suspect binary program can do,
how to detect it, and how to measure and contain its damage.
• Host based signatures and network based signatures
are used to detect malwares on computers and
networks.
• Most often malware analysis is performed on executable files using
following techniques:
– Basic and Advanced Static Analysis
– Basic and Advanced Dynamic Analysis
11
Dr. M N M Bhutta www.bzu.edu.pk
Malware Analysis/Reverse
Engineering – II
• Basic Static Analysis
– It is performed on executable file without actually running it and without
viewing the instructions code.
– It answers whether file is malicious, provide information about its
functionality and some times to produce network signatures to detect
malwares.
• Advanced Static Analysis
– It is performed by dissecting the malware executable by loading it into
disassembler and looking into its instructions to find out what malware
do.
• Basic dynamic Analysis
– It involves running the malware and observing its behaviour on the system in
order to remove the files, produce effective signatures.
• Advanced Dynamic Analysis
– It involves debugging the internal state of malicious executable.
12
Dr. M N M Bhutta www.bzu.edu.pk
Digital Forensics (Computer & Network
Forensics)
• It is defined as application of science to law.
• It is the application of collection, examination
and analysis of data while preserving the
integrity of data and chain of custody.
• The process usually consists of following
phases:
– Collection: Identifying, collecting, labelling and storing data.
– Examination: Assessing and extracting particular interest of data.
– Analysis: Analysing the data using legally justifiable techniques.
– Reporting: Reporting results of analysis (actions to be taken to
secure against vulnerabilities, information about crime/attack etc)
13
Dr. M N M Bhutta www.bzu.edu.pk
CYBER LAWS
14
Dr. M N M Bhutta www.bzu.edu.pk
USA’s Cyber Security Laws - I
• Computer Fraud and Abuse Act (CFAA):
“Whoever … intentionally accesses a computer without authorization or exceeds authorized access,
and thereby obtains … information from any protected computer… shall be punished as provided in
subsection (c) of this section.”
• Electronic Protected Health Information (e-
PHI) and Health Insurance Portability and
Accountability Act (HIPAA):
– Protect information about individuals
identifiable health records.
– Protects information stored and information
available on network while being transferred.
15
Dr. M N M Bhutta www.bzu.edu.pk
Recent Developments In USA’s
Cyber Security Laws
• Cybersecurity Enhancement Act 2014
– Public-Private Collaboration on Cybersecurity
– Cybersecurity Research and Development
– Education and Workforce Development
– Cybersecurity Awareness and Preparedness
– Advancement of Cybersecurity Technical Standards
• National Cybersecurity Protection Act 2014
• Cybersecurity Workforce Assessment Act 2014
16
Dr. M N M Bhutta www.bzu.edu.pk
Pakistan’s Cyber Security Laws
Details About:
17
Dr. M N M Bhutta www.bzu.edu.pk
Cyber Laws in Pakistan
• There are different laws, promulgated in Pakistan.
• These laws not only deal with crime of Internet
• These deal with all dimensions related to computer
& networks.
• Two of them are most known.
• They are:
– Electronic Transaction Ordinance 2002
– Electronic / Cyber Crime Bill 2007
Dr. M N M Bhutta www.bzu.edu.pk
Electronic Transaction Ordinance
2002
• Overview
– The Electronic Transactions Ordinance (ETO), 2002, was
the first IT-relevant legislation created by national
lawmakers.
– A first step and a solid foundation for legal sanctity and
protection for Pakistani e-Commerce locally and globally.
– Laid the foundation for comprehensive Legal
Infrastructure.
– It is heavily taken from foreign law related to cyber crime.
Dr. M N M Bhutta www.bzu.edu.pk
Pre-ETO 2002
• No recognition of electronic documentation
• No recognition of electronic records
• No recognition of evidential basis of
documents/records
• Failure to authenticate or identify digital or electronic
signatures or forms of authentication
• No online transaction could be legally binding
• Electronic Data & Forensic Evidence not covered.
No Rules
Dr. M N M Bhutta www.bzu.edu.pk
ETO 2002
• Sections
– There are 43 sections in this ordinance
– It deals with following 8 main areas relating to e-
Commerce.
• Recognition of Electronic Documents
• Electronic Communications
• Digital Signature regime and its evidential consequences
• Web Site & Digital Signatures Certification Providers
• Stamp Duty
• Attestation, notarization, certified copies
• Jurisdiction
• Offences
Dr. M N M Bhutta www.bzu.edu.pk
ETO 2002
• Important Sections are:
– 36. Violation of privacy information
• gains or attempts to gain access
• to any information system with or without intent
• to acquire the information unauthorized
• Imprisonment 7 years
• Fine Rs. 1 million
Dr. M N M Bhutta www.bzu.edu.pk
ETO 2002
– 37. Damage to information system, etc.
• alter, modify, delete, remove, generate, transmit or
store information
• to impair the operation of,
• or prevent or hinder access to, information
• knowingly when not authorized to do so
• Imprisonment 7 years
• Fine Rs. 1 million
Dr. M N M Bhutta www.bzu.edu.pk
ETO 2002
– 38. Offences to be non-bailable,
compoundable and cognizable
• All offences under this Ordinance shall be non-
bailable, compoundable and cognizable.
– 39. Prosecution and trial of offences.
• No Court inferior to the Court of Sessions shall try
any offence under this Ordinance.
Dr. M N M Bhutta www.bzu.edu.pk
Post ETO 2002
• Electronic Documentation & Records
recognized
• Electronic & Digital forms of authentication
& identification given legal sanctity
• Messages through email, fax, mobile
phones, Plastic Cards, Online recognized.
Dr. M N M Bhutta www.bzu.edu.pk
Electronic/Cyber Crime Bill 2007
Dr. M N M Bhutta www.bzu.edu.pk
Overview
• “Prevention of Electronic Crimes Ordinance, 2007″
is in force now
• It was promulgated by the President of Pakistan on
the 31st December 2007
• The bill deals with the electronic crimes included:
– Cyber terrorism
– Data damage
– Electronic fraud
– Electronic forgery
– Unauthorized access to code
– Cyber stalking
– Cyber Spamming/spoofing
Dr. M N M Bhutta www.bzu.edu.pk
Electronic/Cyber Crime Bill 2007
• It offers penalties ranging from six months
imprisonment to capital punishment for 17
types of cyber crimes
• It will apply to every person who commits
an offence, irrespective of his nationality or
citizenship.
• It gives exclusive powers to the Federal
Investigation Agency (FIA) to investigate
and charge cases against such crimes.
Dr. M N M Bhutta www.bzu.edu.pk
Punishments
• Under this law there are defined
punishment for the offence.
• Every respective offence under this law
has its distinctive punishment which can
be imprisonment or fine.
Dr. M N M Bhutta www.bzu.edu.pk
Offence Imprisonment (years) Fine
Criminal Access 3 3 Lac
Criminal Data Access 3 3 Lac
Data Damage 3 3 Lac
System Damage 3 3 Lac
Electronic Fraud 7 7 Lac
Electronic Forgery 7 7 Lac
Misuse of Device 3 3 Lac
Unauthorized access to code 3 3 Lac
Malicious code 5 5 Lac
Defamation 5 5 Lac
Cyber stalking 3 3 Lac
Cyber Spamming 6 months 50,000
Spoofing 3 3 Lac
Pornography 10 -----
Cyber terrorism Life 10 Million
Dr. M N M Bhutta www.bzu.edu.pk
Sections
• Data Damage:
– Whoever with intent to illegal gain or cause
harm to the public or any person, damages
any data, shall come under this section.
• Punishment:
– 3 years
– 3 Lac
Dr. M N M Bhutta www.bzu.edu.pk
Electronic/Cyber Crime Bill 2007
• Electronic fraud:
– People for illegal gain get in the way or use
any data, electronic system or device or with
intent to deceive any person, which act or
omissions is likely to cause damage or harm.
• Punishment:
– 7 years
– 7 Lac
Dr. M N M Bhutta www.bzu.edu.pk
Electronic/Cyber Crime Bill 2007
• Electronic Forgery:
– Whoever for unlawful gain interferes with data, electronic
system or device, with intent to cause harm or to commit
fraud by any input, alteration, or suppression of data,
resulting in unauthentic data that it be considered or acted
upon for legal purposes as if it were authentic, regardless
of the fact that the data is directly readable and intelligible
or not.
• Punishment:
– 7years
– 7 Lac
Dr. M N M Bhutta www.bzu.edu.pk
Electronic/Cyber Crime Bill 2007
• Malicious code:
– Whoever willfully writes, offers, makes
available, distributes or transmits malicious
code through an electronic system or device,
with intent to cause harm to any electronic
system or resulting in the theft or loss of data
commits the offence of malicious code.
• Punishment:
– 5 years
– 5 Lac
Dr. M N M Bhutta www.bzu.edu.pk
Electronic/Cyber Crime Bill 2007
• Cyber stalking:
– Whoever with intent to harass any person uses computer,
computer network, internet, or any other similar means of
communication to communicate obscene, vulgar, profane,
lewd, lascivious, or indecent language, picture or image.
– Make any suggestion or proposal of an obscene nature
– Threaten any illegal or immoral act
– Take or distribute pictures or photographs of any person
without his consent or knowledge
– Commits the offence of cyber stalking.
– 3 Years
– 3 Lac
Dr. M N M Bhutta www.bzu.edu.pk
Electronic/Cyber Crime Bill 2007
• Spamming:
– Whoever transmits harmful, fraudulent, misleading,
– illegal or unsolicited electronic messages in bulk to any
person
– without the express permission of the recipient,
– involves in falsified online user account registration or
falsified domain name registration for commercial purpose
commits the offence of spamming.
• Punishment:
– 6 month
– 50,000
Dr. M N M Bhutta www.bzu.edu.pk
Electronic/Cyber Crime Bill 2007
• Spoofing:
– Whoever establishes a website, or sends an
electronic message with a counterfeit source intended
to be believed by the recipient or visitor or its
electronic system to be an authentic source
– with intent to gain unauthorized access or obtain
valuable information
– Later, Information can be used for any lawful
purposes commits the offence of spoofing.
– 3 Years
– 3 Lac
Dr. M N M Bhutta www.bzu.edu.pk
Electronic/Cyber Crime Bill 2007
• Cyber terrorism:
– Any person, group or organization who, with terroristic
intent utilizes,
– accesses or causes to be accessed a computer or
computer network or electronic system or device or by any
available means,
– knowingly engages in or attempts to engage in a terroristic
act commits the offence of cyber terrorism.
• Punishment
– Whoever commits the offence of cyber terrorism and
causes death of any person shall be punished with death
– Or imprisonment for life, and with fine
– Otherwise he shall be punishable with imprisonment of ten
years or with fine ten million rupees
Dr. M N M Bhutta www.bzu.edu.pk
Recent Developments for Cyber
Laws in Pakistan
• In 2013, Pakistan came to know that USA through National Security
Agency (NSA) were spying on Pakistan through intercepting 13.5
billion pieces of email, phone and fax communication.
• Senate Committee on Defence and Defence production organized
seminar and following important points were concluded in that:
– To protect and promote Pakistan’s cyber security, relevant legislations to be
done.
– Cyber security threat should be accepted as new emerging national security
threat.
– Establishing a National Computer Emergency Response Team (PakCERT).
– Establishing Cyber Security Task Force consisting of relevant security
professionals to combat this threat.
– Inter-Services Cyber Command should be established to coordinated cyber
security and defence for the Pakistan Armed Forces.
– Pakistan should take initiative to talk to 8 SAARC Members.
39
Dr. M N M Bhutta www.bzu.edu.pk
Pakistan Cyber Security Task
Force
• Federal Investigation Agency (FIA) has
established Cyber Security Task Force to
combat the cyber security threat for
Pakistan.
• Pakistan Computer Emergency Response
Team (PakCERT) is established to protect
IT assets and professionals from cyber
crimes like hacking etc.
(www.pakcert.org).
40
Dr. M N M Bhutta www.bzu.edu.pk
Why we must know Cyber Laws?
• Under which organizations does the
organization operate and which specific laws
apply to Organization.
• By law, which information assets need to be
protected?
• How laws can be incorporated into
Organizational security policy.
• When conducting Vulnerability Assessments
and Penetration tests for organizations.
41
Dr. M N M Bhutta www.bzu.edu.pk
References:
• To prepare this lecture, following sources are consulted:
– https://www.congress.gov/bill/113th-congress/senate-
bill/1353/text?q=%7b%22search%22:%5b%22cybersecurity%22%5d%7d
– https://www.congress.gov/bill/113th-congress/senate-
bill/2519/text?q=%7b%22search%22:%5b%22cybersecurity%22%5d%7d
– https://www.congress.gov/bill/113th-congress/house-
bill/2952/text?q=%7b%22search%22:%5b%22cybersecurity%22%5d%7d
– http://www.go-gulf.com/blog/cyber-crime/
– Zibber Mohiuddin, “Cyber Laws in Pakistan: A Situational Analysis and Way
Forward”, June 2006.
– ISACA’s Cyber Security Student Handbook.
– http://www.dawn.com/news/1023706
– Justice Khalil ur Rehman, “Cyber Laws in Pakistan”.
– Tariq Bilal, “Modern Cyber Laws in Pakistan”.
– Taha Mehmood, “Cyber Laws in Pakistan”, PowerPoint presentation.
– Sehrish Mushtaq, “Cyber Laws in Pakistan”, PowerPoint Presentation.
42
Dr. M N M Bhutta www.bzu.edu.pk43
Thanks for listening !
»Questions ?

More Related Content

PPTX
Ethical Hacking
Tharindu Kalubowila
 
PPTX
Cyber Crime
Avinash Rajput
 
PPTX
Introduction to Information Security
Shreedevi Tharanidharan
 
PPTX
Implementing cybersecurity best practices and new technology ppt (1).pptx
damilolasunmola
 
PPTX
Cybercrime and Security
Noushad Hasan
 
PPTX
Cyber security and cyber laws
Dr. Prashant Vats
 
Ethical Hacking
Tharindu Kalubowila
 
Cyber Crime
Avinash Rajput
 
Introduction to Information Security
Shreedevi Tharanidharan
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
damilolasunmola
 
Cybercrime and Security
Noushad Hasan
 
Cyber security and cyber laws
Dr. Prashant Vats
 

What's hot (20)

PPSX
Cyber crime
Sanket Gogoi
 
PPTX
Cyber Terrorism
Shivam Lohiya
 
PPTX
Cyber crime
yazad dumasia
 
PPTX
Cyber Security Best Practices
Evolve IP
 
PPTX
National cyber security policy final
Indian Air Force
 
PPTX
Ethical Hacking
Nitheesh Adithyan
 
PPT
Introduction to Cyber Security
Stephen Lahanas
 
PPTX
cyber crime
Mosuud jilani lipon
 
PPTX
Cyber crime and security
Sharath Raj
 
PPTX
Cyber crime
Grant Thornton Bangladesh
 
PPTX
Cyber security
Pihu Goel
 
PPTX
cyber security
BasineniUdaykumar
 
PPT
Ethical Hacking Powerpoint
Ren Tuazon
 
ODP
Ethical hacking ppt
himanshujoshi238
 
PPTX
Cyber crime
Harendra Singh
 
PPTX
Cyber Security Presentation
HaniyaMaha
 
PPTX
Security threats and attacks in cyber security
Shri ramswaroop college of engineering and management
 
PPTX
Network security
quest university nawabshah
 
PPTX
Cyber Crime and Cyber Security
Sazed Salman
 
PPTX
Cybercrime & Security
Shreeraj Nair
 
Cyber crime
Sanket Gogoi
 
Cyber Terrorism
Shivam Lohiya
 
Cyber crime
yazad dumasia
 
Cyber Security Best Practices
Evolve IP
 
National cyber security policy final
Indian Air Force
 
Ethical Hacking
Nitheesh Adithyan
 
Introduction to Cyber Security
Stephen Lahanas
 
cyber crime
Mosuud jilani lipon
 
Cyber crime and security
Sharath Raj
 
Cyber security
Pihu Goel
 
cyber security
BasineniUdaykumar
 
Ethical Hacking Powerpoint
Ren Tuazon
 
Ethical hacking ppt
himanshujoshi238
 
Cyber crime
Harendra Singh
 
Cyber Security Presentation
HaniyaMaha
 
Security threats and attacks in cyber security
Shri ramswaroop college of engineering and management
 
Network security
quest university nawabshah
 
Cyber Crime and Cyber Security
Sazed Salman
 
Cybercrime & Security
Shreeraj Nair
 
Ad

Viewers also liked (13)

PPT
Cyber security standards
Vaughan Olufemi ACIB, AICEN, ANIM
 
PDF
Topics in network security
Nasir Bhutta
 
PPT
Security audit
Rosaria Dee
 
PPT
Securities Law And Regulation
guest37cbd035
 
PPT
Cyber Risks
RickWaldman
 
PPTX
Security Policies and Standards
primeteacher32
 
PPTX
Security Audit View
PLN9 Security Services Pvt. Ltd.
 
PPT
INDIAN CYBERLAW AND SECURITY
pattok
 
PDF
Cyber law-it-act-2000
Mayuresh Patil
 
PPTX
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
PPTX
Ipr trips&trims
Ruchir Shukla
 
PDF
Ccsit cyberlympics 2017 workshop 3 - presentation
Nasir Bhutta
 
PPTX
CYBER TERRORISM
Tejesh Dhaypule
 
Cyber security standards
Vaughan Olufemi ACIB, AICEN, ANIM
 
Topics in network security
Nasir Bhutta
 
Security audit
Rosaria Dee
 
Securities Law And Regulation
guest37cbd035
 
Cyber Risks
RickWaldman
 
Security Policies and Standards
primeteacher32
 
INDIAN CYBERLAW AND SECURITY
pattok
 
Cyber law-it-act-2000
Mayuresh Patil
 
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Ipr trips&trims
Ruchir Shukla
 
Ccsit cyberlympics 2017 workshop 3 - presentation
Nasir Bhutta
 
CYBER TERRORISM
Tejesh Dhaypule
 
Ad

Similar to Cyber security laws (20)

PPTX
Cyber Crime
Mazhar Nazik
 
PPT
Cyber Governemace In Pakistan
Shakeel Ahmed
 
PPTX
Cyber crimes presentation
Digital Marketing Evangelist
 
PPTX
Cyber crime ppt
Gracy Joseph
 
PDF
Cyber Security Attacks - Critical Legal and Investigation Aspects
Benjamin Ang
 
PPTX
Cyber laws in pakistan
Sajeel Bhatti
 
PPTX
Cyber Laws in Pakistan
Ayesha Majid
 
PDF
Cyber Crime Laws in Pakistan regarding electronic and social media
akashsaqi444
 
PDF
Cyber Crime and Security ppt by Neeraj Ahirwar
Neeraj Ahirwar
 
PPTX
Module 2_ Cyber offenses & Cybercrimes(Updated).pptx
placementstwc
 
PPTX
Cyber forensic 1
anilinvns
 
PPTX
Cyber Crime
Muhammad Irfan
 
PPTX
Cyber crime.pptx
Dawood Faheem Abbasi
 
PPTX
Present Cyber Laws and Discovery of Digital Evidence
Shahid Jamal Tubrazy
 
PPTX
Cyber crime & law
AkshayKumar Kavar
 
PPTX
cyber security and its importance .pptx
bhaskarnayak18
 
PDF
CYBER SECURITY (R18A0521).pdf
JayaMalaR6
 
PDF
Cybersecurity attacks critical legal and investigation aspects you must know
Benjamin Ang
 
DOCX
BCC -401-aktu-Cyber-Security Unit-1.docx
pubgnewstate1620
 
PPSX
Cyber security & Data Protection
Dr. Hemant Kumar Singh
 
Cyber Crime
Mazhar Nazik
 
Cyber Governemace In Pakistan
Shakeel Ahmed
 
Cyber crimes presentation
Digital Marketing Evangelist
 
Cyber crime ppt
Gracy Joseph
 
Cyber Security Attacks - Critical Legal and Investigation Aspects
Benjamin Ang
 
Cyber laws in pakistan
Sajeel Bhatti
 
Cyber Laws in Pakistan
Ayesha Majid
 
Cyber Crime Laws in Pakistan regarding electronic and social media
akashsaqi444
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Neeraj Ahirwar
 
Module 2_ Cyber offenses & Cybercrimes(Updated).pptx
placementstwc
 
Cyber forensic 1
anilinvns
 
Cyber Crime
Muhammad Irfan
 
Cyber crime.pptx
Dawood Faheem Abbasi
 
Present Cyber Laws and Discovery of Digital Evidence
Shahid Jamal Tubrazy
 
Cyber crime & law
AkshayKumar Kavar
 
cyber security and its importance .pptx
bhaskarnayak18
 
CYBER SECURITY (R18A0521).pdf
JayaMalaR6
 
Cybersecurity attacks critical legal and investigation aspects you must know
Benjamin Ang
 
BCC -401-aktu-Cyber-Security Unit-1.docx
pubgnewstate1620
 
Cyber security & Data Protection
Dr. Hemant Kumar Singh
 

More from Nasir Bhutta (11)

PDF
Blockchain for Interdisciplinary Research
Nasir Bhutta
 
PDF
Basics of Blockchain Technology
Nasir Bhutta
 
PPS
secure smart cities
Nasir Bhutta
 
PDF
Introduction to Ethical Hacking
Nasir Bhutta
 
PDF
Penetration Testing Execution Phases
Nasir Bhutta
 
PPT
Different types of networks
Nasir Bhutta
 
PDF
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Nasir Bhutta
 
PPTX
Multilayer Security Architecture for Internet Protocols
Nasir Bhutta
 
PPTX
Cyber Security: Trends and Globar War
Nasir Bhutta
 
PPT
Introduction to Delay/Disruption Tolerant Networking and Applications
Nasir Bhutta
 
PPTX
Cloud computing overview & current research
Nasir Bhutta
 
Blockchain for Interdisciplinary Research
Nasir Bhutta
 
Basics of Blockchain Technology
Nasir Bhutta
 
secure smart cities
Nasir Bhutta
 
Introduction to Ethical Hacking
Nasir Bhutta
 
Penetration Testing Execution Phases
Nasir Bhutta
 
Different types of networks
Nasir Bhutta
 
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Nasir Bhutta
 
Multilayer Security Architecture for Internet Protocols
Nasir Bhutta
 
Cyber Security: Trends and Globar War
Nasir Bhutta
 
Introduction to Delay/Disruption Tolerant Networking and Applications
Nasir Bhutta
 
Cloud computing overview & current research
Nasir Bhutta
 

Recently uploaded (20)

PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Doc9.....................................
SofiaCollazos
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
The Future of Artificial Intelligence (AI)
Mukul
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 

Cyber security laws

  • 1. Dr. M Nasir Mumtaz Bhutta Institute of Computing Bahauddin Zakariya University Multan, Punjab, 60,000 Pakistan Email: [email protected] www.bzu.edu.pk Course: Information Security and Assurance Cyber Security Laws 18 March 2015
  • 2. Dr. M N M Bhutta www.bzu.edu.pk Lecture Overview • Why is it important to understand/define Cyber Security Laws? • Cyber Crimes. • Well Known USA’s Cyber Security Laws. • Pakistan’s Cyber Security Laws: – Electronic Transaction Ordinance 2002. – Electronic Cyber Crime bill/Act 2007. • Recent Developments in Pakistan’s Cyber Law. 2
  • 3. Dr. M N M Bhutta www.bzu.edu.pk Importance to Understand Cyber Security Laws • Cyber Security Laws are introduced: – In response to cyber crimes. – To improve organizational security. – To protect people and their assets. • Every country has its own set of laws. • Organizations should ensure that which laws will be applicable to them depending upon their location. • Organizations should incorporate cyber laws as part of their security policy and include lawyers in their security decisions. • Govt have laid down security compliance requirements to protect people and their assets. 3
  • 4. Dr. M N M Bhutta www.bzu.edu.pk Cyber Crimes • Some Latest Cybercrime Statistics 4
  • 5. Dr. M N M Bhutta www.bzu.edu.pk Cyber Crime Vs Conventional Crime • Conventional Crime is: – social and economic phenomenon and as old as society. – Legal wrong which can be followed by criminal proceedings and can result in punishment. • Cyber Crime is: – Where computer is subject or object of crime. – Unlawful act where computer is a tool or target or both. 5
  • 6. Dr. M N M Bhutta www.bzu.edu.pk Complexity of Cyber Disputes • Cyber crime takes place across whole world geographic boundaries. • Which court will have exclusive jurisdiction to the crime? • Different countries have different legal systems and it can be extremely expensive depending upon location. • Doubts on efficacy of decisions given be courts on global level and sanctions are questionable. 6
  • 7. Dr. M N M Bhutta www.bzu.edu.pk Types of Cyber Crimes 7
  • 8. Dr. M N M Bhutta www.bzu.edu.pk Targets of Cyber Crime • Some important industries which are targets of cyber crime are given below: 8
  • 9. Dr. M N M Bhutta www.bzu.edu.pk Cyber Security Technologies To Fight Against Crimes & To Improve Organizational Security 9
  • 10. Dr. M N M Bhutta www.bzu.edu.pk Penetration Testing/Ethical Hacking (Web and Infrastructure Hacking) • Penetration testing is legal and authorized exploitation of computer systems to make them more secure. • Penetration testing is performed in following phases: – Reconnaissance: collecting detailed information about system (e.g. all machines IP addresses etc. ) – Scanning: 1. Port Scanning (finding open ports on systems and services being run). 2. Vulnerability Scanning (finding known vulnerabilities for services running on the system) – Exploitation: Attacking the system for the found vulnerabilities. – Maintaining Access: After exploitation, creating a permanent backdoor for easy access to the system later on. – Reporting: Details about the found issues, detailed procedures and presenting solutions to mitigate the security issues found. 10
  • 11. Dr. M N M Bhutta www.bzu.edu.pk Malware Analysis/Reverse Engineering • Art of dissection of malware: – To provide information about intrusion/attack (what exactly happened). – The goal is exactly to find out: what a suspect binary program can do, how to detect it, and how to measure and contain its damage. • Host based signatures and network based signatures are used to detect malwares on computers and networks. • Most often malware analysis is performed on executable files using following techniques: – Basic and Advanced Static Analysis – Basic and Advanced Dynamic Analysis 11
  • 12. Dr. M N M Bhutta www.bzu.edu.pk Malware Analysis/Reverse Engineering – II • Basic Static Analysis – It is performed on executable file without actually running it and without viewing the instructions code. – It answers whether file is malicious, provide information about its functionality and some times to produce network signatures to detect malwares. • Advanced Static Analysis – It is performed by dissecting the malware executable by loading it into disassembler and looking into its instructions to find out what malware do. • Basic dynamic Analysis – It involves running the malware and observing its behaviour on the system in order to remove the files, produce effective signatures. • Advanced Dynamic Analysis – It involves debugging the internal state of malicious executable. 12
  • 13. Dr. M N M Bhutta www.bzu.edu.pk Digital Forensics (Computer & Network Forensics) • It is defined as application of science to law. • It is the application of collection, examination and analysis of data while preserving the integrity of data and chain of custody. • The process usually consists of following phases: – Collection: Identifying, collecting, labelling and storing data. – Examination: Assessing and extracting particular interest of data. – Analysis: Analysing the data using legally justifiable techniques. – Reporting: Reporting results of analysis (actions to be taken to secure against vulnerabilities, information about crime/attack etc) 13
  • 14. Dr. M N M Bhutta www.bzu.edu.pk CYBER LAWS 14
  • 15. Dr. M N M Bhutta www.bzu.edu.pk USA’s Cyber Security Laws - I • Computer Fraud and Abuse Act (CFAA): “Whoever … intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains … information from any protected computer… shall be punished as provided in subsection (c) of this section.” • Electronic Protected Health Information (e- PHI) and Health Insurance Portability and Accountability Act (HIPAA): – Protect information about individuals identifiable health records. – Protects information stored and information available on network while being transferred. 15
  • 16. Dr. M N M Bhutta www.bzu.edu.pk Recent Developments In USA’s Cyber Security Laws • Cybersecurity Enhancement Act 2014 – Public-Private Collaboration on Cybersecurity – Cybersecurity Research and Development – Education and Workforce Development – Cybersecurity Awareness and Preparedness – Advancement of Cybersecurity Technical Standards • National Cybersecurity Protection Act 2014 • Cybersecurity Workforce Assessment Act 2014 16
  • 17. Dr. M N M Bhutta www.bzu.edu.pk Pakistan’s Cyber Security Laws Details About: 17
  • 18. Dr. M N M Bhutta www.bzu.edu.pk Cyber Laws in Pakistan • There are different laws, promulgated in Pakistan. • These laws not only deal with crime of Internet • These deal with all dimensions related to computer & networks. • Two of them are most known. • They are: – Electronic Transaction Ordinance 2002 – Electronic / Cyber Crime Bill 2007
  • 19. Dr. M N M Bhutta www.bzu.edu.pk Electronic Transaction Ordinance 2002 • Overview – The Electronic Transactions Ordinance (ETO), 2002, was the first IT-relevant legislation created by national lawmakers. – A first step and a solid foundation for legal sanctity and protection for Pakistani e-Commerce locally and globally. – Laid the foundation for comprehensive Legal Infrastructure. – It is heavily taken from foreign law related to cyber crime.
  • 20. Dr. M N M Bhutta www.bzu.edu.pk Pre-ETO 2002 • No recognition of electronic documentation • No recognition of electronic records • No recognition of evidential basis of documents/records • Failure to authenticate or identify digital or electronic signatures or forms of authentication • No online transaction could be legally binding • Electronic Data & Forensic Evidence not covered. No Rules
  • 21. Dr. M N M Bhutta www.bzu.edu.pk ETO 2002 • Sections – There are 43 sections in this ordinance – It deals with following 8 main areas relating to e- Commerce. • Recognition of Electronic Documents • Electronic Communications • Digital Signature regime and its evidential consequences • Web Site & Digital Signatures Certification Providers • Stamp Duty • Attestation, notarization, certified copies • Jurisdiction • Offences
  • 22. Dr. M N M Bhutta www.bzu.edu.pk ETO 2002 • Important Sections are: – 36. Violation of privacy information • gains or attempts to gain access • to any information system with or without intent • to acquire the information unauthorized • Imprisonment 7 years • Fine Rs. 1 million
  • 23. Dr. M N M Bhutta www.bzu.edu.pk ETO 2002 – 37. Damage to information system, etc. • alter, modify, delete, remove, generate, transmit or store information • to impair the operation of, • or prevent or hinder access to, information • knowingly when not authorized to do so • Imprisonment 7 years • Fine Rs. 1 million
  • 24. Dr. M N M Bhutta www.bzu.edu.pk ETO 2002 – 38. Offences to be non-bailable, compoundable and cognizable • All offences under this Ordinance shall be non- bailable, compoundable and cognizable. – 39. Prosecution and trial of offences. • No Court inferior to the Court of Sessions shall try any offence under this Ordinance.
  • 25. Dr. M N M Bhutta www.bzu.edu.pk Post ETO 2002 • Electronic Documentation & Records recognized • Electronic & Digital forms of authentication & identification given legal sanctity • Messages through email, fax, mobile phones, Plastic Cards, Online recognized.
  • 26. Dr. M N M Bhutta www.bzu.edu.pk Electronic/Cyber Crime Bill 2007
  • 27. Dr. M N M Bhutta www.bzu.edu.pk Overview • “Prevention of Electronic Crimes Ordinance, 2007″ is in force now • It was promulgated by the President of Pakistan on the 31st December 2007 • The bill deals with the electronic crimes included: – Cyber terrorism – Data damage – Electronic fraud – Electronic forgery – Unauthorized access to code – Cyber stalking – Cyber Spamming/spoofing
  • 28. Dr. M N M Bhutta www.bzu.edu.pk Electronic/Cyber Crime Bill 2007 • It offers penalties ranging from six months imprisonment to capital punishment for 17 types of cyber crimes • It will apply to every person who commits an offence, irrespective of his nationality or citizenship. • It gives exclusive powers to the Federal Investigation Agency (FIA) to investigate and charge cases against such crimes.
  • 29. Dr. M N M Bhutta www.bzu.edu.pk Punishments • Under this law there are defined punishment for the offence. • Every respective offence under this law has its distinctive punishment which can be imprisonment or fine.
  • 30. Dr. M N M Bhutta www.bzu.edu.pk Offence Imprisonment (years) Fine Criminal Access 3 3 Lac Criminal Data Access 3 3 Lac Data Damage 3 3 Lac System Damage 3 3 Lac Electronic Fraud 7 7 Lac Electronic Forgery 7 7 Lac Misuse of Device 3 3 Lac Unauthorized access to code 3 3 Lac Malicious code 5 5 Lac Defamation 5 5 Lac Cyber stalking 3 3 Lac Cyber Spamming 6 months 50,000 Spoofing 3 3 Lac Pornography 10 ----- Cyber terrorism Life 10 Million
  • 31. Dr. M N M Bhutta www.bzu.edu.pk Sections • Data Damage: – Whoever with intent to illegal gain or cause harm to the public or any person, damages any data, shall come under this section. • Punishment: – 3 years – 3 Lac
  • 32. Dr. M N M Bhutta www.bzu.edu.pk Electronic/Cyber Crime Bill 2007 • Electronic fraud: – People for illegal gain get in the way or use any data, electronic system or device or with intent to deceive any person, which act or omissions is likely to cause damage or harm. • Punishment: – 7 years – 7 Lac
  • 33. Dr. M N M Bhutta www.bzu.edu.pk Electronic/Cyber Crime Bill 2007 • Electronic Forgery: – Whoever for unlawful gain interferes with data, electronic system or device, with intent to cause harm or to commit fraud by any input, alteration, or suppression of data, resulting in unauthentic data that it be considered or acted upon for legal purposes as if it were authentic, regardless of the fact that the data is directly readable and intelligible or not. • Punishment: – 7years – 7 Lac
  • 34. Dr. M N M Bhutta www.bzu.edu.pk Electronic/Cyber Crime Bill 2007 • Malicious code: – Whoever willfully writes, offers, makes available, distributes or transmits malicious code through an electronic system or device, with intent to cause harm to any electronic system or resulting in the theft or loss of data commits the offence of malicious code. • Punishment: – 5 years – 5 Lac
  • 35. Dr. M N M Bhutta www.bzu.edu.pk Electronic/Cyber Crime Bill 2007 • Cyber stalking: – Whoever with intent to harass any person uses computer, computer network, internet, or any other similar means of communication to communicate obscene, vulgar, profane, lewd, lascivious, or indecent language, picture or image. – Make any suggestion or proposal of an obscene nature – Threaten any illegal or immoral act – Take or distribute pictures or photographs of any person without his consent or knowledge – Commits the offence of cyber stalking. – 3 Years – 3 Lac
  • 36. Dr. M N M Bhutta www.bzu.edu.pk Electronic/Cyber Crime Bill 2007 • Spamming: – Whoever transmits harmful, fraudulent, misleading, – illegal or unsolicited electronic messages in bulk to any person – without the express permission of the recipient, – involves in falsified online user account registration or falsified domain name registration for commercial purpose commits the offence of spamming. • Punishment: – 6 month – 50,000
  • 37. Dr. M N M Bhutta www.bzu.edu.pk Electronic/Cyber Crime Bill 2007 • Spoofing: – Whoever establishes a website, or sends an electronic message with a counterfeit source intended to be believed by the recipient or visitor or its electronic system to be an authentic source – with intent to gain unauthorized access or obtain valuable information – Later, Information can be used for any lawful purposes commits the offence of spoofing. – 3 Years – 3 Lac
  • 38. Dr. M N M Bhutta www.bzu.edu.pk Electronic/Cyber Crime Bill 2007 • Cyber terrorism: – Any person, group or organization who, with terroristic intent utilizes, – accesses or causes to be accessed a computer or computer network or electronic system or device or by any available means, – knowingly engages in or attempts to engage in a terroristic act commits the offence of cyber terrorism. • Punishment – Whoever commits the offence of cyber terrorism and causes death of any person shall be punished with death – Or imprisonment for life, and with fine – Otherwise he shall be punishable with imprisonment of ten years or with fine ten million rupees
  • 39. Dr. M N M Bhutta www.bzu.edu.pk Recent Developments for Cyber Laws in Pakistan • In 2013, Pakistan came to know that USA through National Security Agency (NSA) were spying on Pakistan through intercepting 13.5 billion pieces of email, phone and fax communication. • Senate Committee on Defence and Defence production organized seminar and following important points were concluded in that: – To protect and promote Pakistan’s cyber security, relevant legislations to be done. – Cyber security threat should be accepted as new emerging national security threat. – Establishing a National Computer Emergency Response Team (PakCERT). – Establishing Cyber Security Task Force consisting of relevant security professionals to combat this threat. – Inter-Services Cyber Command should be established to coordinated cyber security and defence for the Pakistan Armed Forces. – Pakistan should take initiative to talk to 8 SAARC Members. 39
  • 40. Dr. M N M Bhutta www.bzu.edu.pk Pakistan Cyber Security Task Force • Federal Investigation Agency (FIA) has established Cyber Security Task Force to combat the cyber security threat for Pakistan. • Pakistan Computer Emergency Response Team (PakCERT) is established to protect IT assets and professionals from cyber crimes like hacking etc. (www.pakcert.org). 40
  • 41. Dr. M N M Bhutta www.bzu.edu.pk Why we must know Cyber Laws? • Under which organizations does the organization operate and which specific laws apply to Organization. • By law, which information assets need to be protected? • How laws can be incorporated into Organizational security policy. • When conducting Vulnerability Assessments and Penetration tests for organizations. 41
  • 42. Dr. M N M Bhutta www.bzu.edu.pk References: • To prepare this lecture, following sources are consulted: – https://www.congress.gov/bill/113th-congress/senate- bill/1353/text?q=%7b%22search%22:%5b%22cybersecurity%22%5d%7d – https://www.congress.gov/bill/113th-congress/senate- bill/2519/text?q=%7b%22search%22:%5b%22cybersecurity%22%5d%7d – https://www.congress.gov/bill/113th-congress/house- bill/2952/text?q=%7b%22search%22:%5b%22cybersecurity%22%5d%7d – http://www.go-gulf.com/blog/cyber-crime/ – Zibber Mohiuddin, “Cyber Laws in Pakistan: A Situational Analysis and Way Forward”, June 2006. – ISACA’s Cyber Security Student Handbook. – http://www.dawn.com/news/1023706 – Justice Khalil ur Rehman, “Cyber Laws in Pakistan”. – Tariq Bilal, “Modern Cyber Laws in Pakistan”. – Taha Mehmood, “Cyber Laws in Pakistan”, PowerPoint presentation. – Sehrish Mushtaq, “Cyber Laws in Pakistan”, PowerPoint Presentation. 42
  • 43. Dr. M N M Bhutta www.bzu.edu.pk43 Thanks for listening ! »Questions ?