• SECURITY AT A GLANCE (1-15.8.25).
  • OSINT Summary
  • Post-War Diplomacy: Iran-Pakistan Cooperation in a Changing Security…
  • SECURITY AT A GLANCE  (16-30.7.25)

The Strategic Brief

☰

The Strategic Brief

Need for Cyber Security Strategy

Strategic Brief - Security - January 5, 2025
Strategic Brief The Strategic Brief: Founded in 2018, The Strategic Brief is the…
61 views 8 mins 0 Comments

Dr. Naveed Elahi

With the gruesome incident of pager explosions in Beirut last year, the genie of cyber scare lurking in the shadows has come to the fore with a bang. The detonation with viral malware has added a new and palpable dimension to cyber threats. It is clear now that states will and can fight cyber wars with invisible sabers. It can cause colossal disruption and countless deaths in a jiffy. In Beirut, the detonation of thousands of devices led to the deaths of at least 20 people and injuries to more than 460 others. The Israeli intelligence agency Mossad orchestrated this operation by embedding military-grade explosives in 5000 pagers supplied to Hezbollah and detonated them simultaneously through malware. It was a combination of vulnerabilities within supply chain security and cyber strikes through communication technologies.

Fourteen years earlier, Mossad had conducted a cyber operation to sabotage Iran’s nuclear facility at Natanz, where centrifuges started malfunctioning. The malware Stuxnet, a highly sophisticated cyber weapon, significantly delayed its program for several years. It shows that the threat had emerged at least two decades ago, but now with the advent of artificial intelligence, it has grown at an alarming proportion and threats of asymmetrical war through cyber technology have increased manifold. The developed world had anticipated the lethality of the emerging cyber threats; therefore, they started devising cyber security policies and strategies almost at the same time. 

 The Centre for Strategic and International Studies stated in 2022 that there were 78 countries with national cyber security strategies, 63 with strategies for mitigating cyber threats to critical infrastructure, and 113 with policies that regulate the collection and handling of personal data. The United States was the first country to formulate a national cyber security strategy in 2003, which has been updated multiple times ever since.

 Like many governments around the world, Pakistan acknowledged, though slightly belatedly, the need for a national policy of cyber security and formulated the National Cyber Security Policy in 2021. This delayed response to cyber threats was caused by the slow pace of digitization, laid-back bureaucratic systems and limited technical or economic capacities. Additionally, its implementation has remained a far cry so far. The cyber security strategy is still in embryonic stage.  Naturally, it has hampered Pakistan’s ability to attend to the challenges required in this space.

It is high time for Pakistan to move fast to formulate and implement a robust cyber security strategy to address the foreboding challenges of cyber war. It should be kept in mind that from hacktivists to nation-states, all have the capabilities to conduct cyber-attacks. Pakistan, therefore, ought to take into consideration several common elements that typically emerge in national cybersecurity strategies.

First, Pakistan must adopt a national security-focused strategy, closely tied to its internal and external security and shaped by military and intelligence agencies. This includes countering hostile agencies’ cyber operations for intelligence gathering and prioritizing the cybersecurity of its military and intelligence systems.

Second, the protection of critical national infrastructures (CNIs), often referred to as ‘Crown Jewels’ is essential. It is crucial for Pakistan to identify and ensure the protection of critical networks, for example, communications, critical manufacturing, emergency services, energy, financial services, food and agriculture, and nuclear reactors on which economy and stability depend. Emulating other successful models, Pakistan must issue multiple guidelines and policy directives to prioritise CNIs as part of official cyber security strategies and to create specific public-private partnerships for their protection. Axiomatically, the topmost priority should be accorded to the nuclear facility.

Third, protection of confidentiality, integrity, and availability of personal data is increasingly crucial as cyber threats continue to evolve. Currently, Pakistan lacks a specific legislative framework that extensively covers the protection of personal data across various sectors. The absence of such laws exposes individuals’ data to potential misuse, loss, and unauthorized access. Pakistan should look to international best practices, such as the European Union’s General Data Protection Regulation (GDPR), which provides a strong framework that emphasizes transparency, security, and accountability by entities handling personal data.

By developing a legal framework that protects personal data, Pakistan can enhance its cybersecurity posture, promote digital economic growth, and align more closely with international standards, which could also facilitate trade and secure information exchanges with other countries.

Fourth, it is the need of the hour to enact and strengthen cybercrime laws and procedures to prevent computer misuse. In fighting the persistent threat of cybercrimes, many governments have laws that prohibit ‘computer networks’ misuse in criminal activities and, in some cases, in disinformation campaigns. Pakistan is in the whirlwind of the last activity.

To address this, Pakistan can take a cue from the UK government’s Computer Misuse Act. This act defines unlawful acts including unauthorised access to computer material and unauthorised access with intent to commit or facilitate the commission of further offences, unauthorised acts with intent to impair, or with recklessness as to impair the operation of a computer, among others (UK Public General Acts, 1990). 

Fifth, the multi-stakeholder nature of cybersecurity necessitates that government policies effectively collaborate with private entities, offering appropriate incentives to ensure these organizations secure their systems and invest in the security of their hardware and software. They must build collaborative networks to address and ensure cybersecurity at the national and citizen levels.

Sixth, the lack of established internet conduct rules heightens cybersecurity risks, resulting in an unpredictable and fragmented landscape. To address these challenges, government and organizations should invest in threat intelligence, and ensure they meet varied regulatory standards.

Whatever national cybersecurity strategy Pakistan may adopt, security measures should include reducing cyber incidents, improving response times, and enhancing cybersecurity awareness. Compliance with international standards, strengthening the legal framework, and fostering public-private collaboration are essential. Protecting critical infrastructure and increasing investment in cybersecurity are also key metrics. These measures can be tracked through reports from National Data Registration Authority (NADRA), Federal Investigation Agency (FIA) Cyber Crime Wing, National Information Technology Board (NITB), HEC, and CERT-PK.

Given the magnitude of the threat and the seriousness of the situation, we cannot afford to fall behind due to ignorance, laziness or lack of initiative. The genie of cyber threats must be contained and countered in a collaborative and sustained manner.

The author is Chief Editor of The Strategic Brief

TAGS:
PREVIOUS
SECURITY AT A GLANCE
NEXT
SECURITY AT A GLANCE
Related Post
June 9, 2025
Price of Peace
February 2, 2025
SECURITY AT A GLANCE
July 26, 2024
SURGE IN MILITANCY IN INDIAN OCCUPIED JAMMU & KASHMIR
July 18, 2025
SECURITY AT A GLANCE (1–15 July 2025)
Leave a Reply

Click here to cancel reply.

Recent Posts

  • SECURITY AT A GLANCE (1-15.8.25).
  • OSINT Summary
  • Post-War Diplomacy: Iran-Pakistan Cooperation in a Changing Security Landscape
  • SECURITY AT A GLANCE  (16-30.7.25)
  • The Strategy of Inaction

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023

Categories

  • Counter Terrorism
  • Defence
  • Extremism
  • Heads up
  • International
  • Latest News
  • Pakistan
  • Region
  • Security
  • Terrorism
  • Uncategorized
  • Violence
Categories
Counter Terrorism Defence Extremism Heads up International Latest News Pakistan Region Security Terrorism Uncategorized Violence

Recent Comments

  1. Azhar Khan on Price of Peace
  2. Zahoor Hussain on INDO-ISRAEL TIES TOUCHING NEW HIGHS
  3. Azhar Khan on Noble rode in the valley of death!
  4. Javaid on Quetta Railway Station Carnage: It’s a War
  5. Hafiz M Awais on Countering Terrorists from Skies
The Strategic Brief

The Strategic Brief is the only magazine in Pakistan that delivers analytics on a range of topics related to national and regional security and defence

Recent Posts
  • SECURITY AT A GLANCE (1-15.8.25).
  • OSINT Summary
  • Post-War Diplomacy: Iran-Pakistan Cooperation in a Changing Security Landscape
  • SECURITY AT A GLANCE  (16-30.7.25)
  • The Strategy of Inaction
Categories
Counter Terrorism Defence Extremism Heads up International Latest News Pakistan Region Security Terrorism Uncategorized Violence
Scroll To Top
© Copyright 2025 - The Strategic Brief . All Rights Reserved