With the country and supervise territorial borders. It

With the growing volume and
sophistication of cyber attacks, the scale of these attacks reaches thousands
per day. Cybersecurity researchers have been working for many years to prevent
computers, databases, programs, systems, and networks from unauthorized access,
attack, alteration or destruction. In addition, it is also a critical issue in
government discussions and security policymakers in the current state of
security around the world. Pakistan played an important role in stopping the
global war on terrorism after 9/11. As a nuclear power and geopolitical
location, the potential for various internal and external security concerns
raised over the past decade. The Government of Pakistan implements defensive
policies that stop the entry of terrorists into the country and supervise
territorial borders. It also requires critical defense measures for important
cyber services in the country, such as the National Database and Registration
Authority, e-government services, And capital markets, the Government’s
interest in the current security situation. These services use firewalls and
other techniques to protect systems, however, there are many possibilities
through which terrorists can use the Internet as a source of attack and control
and stop basic ICT services. This paper discusses cyber challenges in today’s
unstable security situation in Pakistan. Modern societies rely on cyberspace,
which provides valuable and essential services to the functions of human life
and the environment as well as challenges and threats. Cybersecurity aims to
provide as well as an understanding of the ability to influence cyberspace
procedures and rules; this requires sufficient knowledge of the stability,
limitations, and vulnerabilities of ICTs and the improvement of critical
operating factors in cyberspace. the analysis of cybersecurity-related
regulatory issues raises some researchers but little attention has been paid by
researchers in cybersecurity and national development, most of them in the
opinion of states, those countries should develop their own security policies.
Is a major challenge for many countries, including Pakistan.

Of the possibilities of security
systems of sabotage from inside and outside sources,  it is recognized that cybercrime terrorists
may be able to create integrity, availability or attack on the Internet in
secret services or services related to the government database. The security,
flexibility and reliability of the country’s Internet and government assets and
services are also a major challenge to organizations as well as an increasing
number of serious attacks on confidential information that are also one of the
most serious economic and national security threats in Pakistan.

Cyber ??threats and policies in
Pakistan After the theft of classified information by the US National Security
Agency, the National Council for Communications and Information Technology
(NTSP) recommended policies to protect government and organizations and their
services from cyber attacks. The Cabinet Division says that “this scenario
raised serious concerns justifying the implementation of all policies and
guidelines in true letter and spirit,” and “the United States is the
leader in the field of ICT uses multiple tools mainly through electronic (Javed
Mirza 2013) Ground monitoring devices, terrestrial and air intelligence devices
such as satellite, telephone recording and public pulse collection through email
filtering, radio monitoring, leakage of communications and vulnerabilities in
IT-based networks Sensitive information and advanced means In August 2014, the
report (August 2013), that hackers began to attack Pakistani sites containing
classified information related to the security forces and the federal
government by launching attacks Denial of Service (DOS) industry, the FBI can
hardly deal with such attacks Because it requires training / experts who track
or stop these cyber attacks According to the official report of the nation
(Javid Mirza 2013) to deal with cybercrime, these attacks can be tracked by
hackers through proxies, such as Tor, a free software that enables Hide online
identity and control resistance.

Future solution should focus on
security and privacy of the internet, Cyber security needs more development in
Pakistan, even though it costs a fortune the government should try and save
money for it, the internet became very important for businesses, sharing
personal information and communication, by having weak security, information
can be easy to access to which put private and sensitive data . On threat, as
to this, technical changes are necessary.