Friday, 29 December 2023

**Title: The Impact of Cybersecurity Regulations on Data Privacy Rights**


**Introduction:**

In an era marked by rapid technological advancements, the intersection of law and technology has become increasingly complex. This research proposal aims to investigate the impact of cybersecurity regulations on data privacy rights. As technology evolves, so do the challenges associated with protecting sensitive information, necessitating a comprehensive examination of the legal frameworks governing cybersecurity and their implications for individual privacy rights.

**Objectives:**

1. **Assess the Current Cybersecurity Regulatory Landscape:**
   - Conduct a thorough analysis of existing cybersecurity regulations at the national and international levels.
   - Identify key provisions and requirements aimed at safeguarding digital systems and data.

2. **Examine the Relationship Between Cybersecurity and Data Privacy:**
   - Investigate the interplay between cybersecurity measures and the protection of individual data privacy rights.
   - Evaluate how current regulations strike a balance between the need for cybersecurity and the preservation of privacy.

3. **Evaluate the Efficacy of Cybersecurity Regulations in Protecting Privacy:**
   - Assess the effectiveness of current cybersecurity regulations in preventing data breaches and unauthorized access.
   - Analyze case studies to determine the impact of these regulations on mitigating cyber threats.

4. **Explore Legal and Ethical Implications:**
   - Examine the legal and ethical considerations arising from the implementation of cybersecurity measures.
   - Address potential conflicts between cybersecurity objectives and individual privacy rights.

5. **Recommendations for Future Regulatory Developments:**
   - Propose recommendations for enhancing existing cybersecurity regulations to better protect data privacy.
   - Consider the adoption of innovative legal approaches to address emerging challenges in cyberspace.

**Methodology:**

This research will employ a mixed-methods approach, combining legal analysis and empirical studies. The legal analysis will involve an in-depth examination of relevant national and international cybersecurity regulations, focusing on provisions related to data protection. Additionally, empirical studies will be conducted to gather insights into the real-world impact of cybersecurity regulations on privacy through surveys, interviews, and case analyses.

**Significance of the Study:**

As cyber threats continue to escalate, understanding the implications of cybersecurity regulations on data privacy becomes paramount. This research will contribute to the legal scholarship on the delicate balance between cybersecurity imperatives and the protection of individual privacy rights. The findings will have practical implications for policymakers, legal practitioners, and technology stakeholders seeking to navigate the evolving landscape of cyber law.

**Timeline:**

1. **Literature Review and Legal Analysis (Months 1-3):**
   - Review existing literature on cybersecurity regulations and data privacy.
   - Conduct a comprehensive legal analysis of relevant statutes and international agreements.

2. **Empirical Data Collection (Months 4-6):**
   - Develop survey instruments and interview protocols.
   - Collect data through surveys, interviews, and case studies.

3. **Data Analysis (Months 7-9):**
   - Analyze both legal and empirical data to identify patterns and correlations.
   - Interpret findings in the context of the research objectives.

4. **Drafting and Review (Months 10-11):**
   - Prepare a comprehensive research paper, integrating legal and empirical insights.
   - Seek feedback from legal experts and scholars.

5. **Submission of Final Research Paper (Month 12):**
   - Finalize the research paper incorporating feedback received.
   - Submit the paper for publication in reputable legal journals.

**Conclusion:**

This research aims to contribute valuable insights into the evolving landscape of cybersecurity regulations and their impact on individual data privacy rights. By addressing the legal, ethical, and practical dimensions of this complex issue, the study seeks to inform policymakers, legal practitioners, and stakeholders in fostering a more secure and privacy-respecting digital environment.

Saturday, 9 December 2023

Transmission Media

For any networking to be effective, raw stream of data is to be transported from one device to other over some medium. Various transmission media can be used for transfer of data. These transmission media may be of two types −

Guided − In guided media, transmitted data travels through cabling system that has a fixed path. For example, copper wires, fibre optic wires, etc.
Unguided − In unguided media, transmitted data travels through free space in form of electromagnetic signal. For example, radio waves, lasers, etc.
Each transmission media has its own advantages and disadvantages in terms of bandwidth, speed, delay, cost per bit, ease of installation and maintenance, etc. Let’s discuss some of the most commonly used media in detail.

Twisted Pair Cable
Copper wires are the most common wires used for transmitting signals because of good performance at low costs. They are most commonly used in telephone lines. However, if two or more wires are lying together, they can interfere with each other’s signals. To reduce this electromagnetic interference, pair of copper wires are twisted together in helical shape like a DNA molecule. Such twisted copper wires are called twisted pair. To reduce interference between nearby twisted pairs, the twist rates are different for each pair.

Twisted Cable

Up to 25 twisted pair are put together in a protective covering to form twisted pair cables that are the backbone of telephone systems and Ethernet networks.

Advantages of twisted pair cable
Twisted pair cable are the oldest and most popular cables all over the world. This is due to the many advantages that they offer −

Trained personnel easily available due to shallow learning curve
Can be used for both analog and digital transmissions
Least expensive for short distances
Entire network does not go down if a part of network is damaged
Disadvantages of twisted pair cable
With its many advantages, twisted pair cables offer some disadvantages too −

Signal cannot travel long distances without repeaters
High error rate for distances greater than 100m
Very thin and hence breaks easily
Not suitable for broadband connections
Shielding twisted pair cable
To counter the tendency of twisted pair cables to pick up noise signals, wires are shielded in the following three ways −

Each twisted pair is shielded.
Set of multiple twisted pairs in the cable is shielded.
Each twisted pair and then all the pairs are shielded.
Such twisted pairs are called shielded twisted pair (STP) cables. The wires that are not shielded but simply bundled together in a protective sheath are called unshielded twisted pair (UTP) cables. These cables can have maximum length of 100 metres.

Shielding makes the cable bulky, so UTP are more popular than STP. UTP cables are used as the last mile network connection in homes and offices.

Coaxial Cable
Coaxial cables are copper cables with better shielding than twisted pair cables, so that transmitted signals may travel longer distances at higher speeds. A coaxial cable consists of these layers, starting from the innermost −

Stiff copper wire as core
Insulating material surrounding the core
Closely woven braided mesh of conducting material surrounding the insulator
Protective plastic sheath encasing the wire
Coaxial cables are widely used for cable TV connections and LANs.

Coaxial Cable

Advantages of Coaxial Cables
These are the advantages of coaxial cables −

Excellent noise immunity
Signals can travel longer distances at higher speeds, e.g. 1 to 2 Gbps for 1 Km cable
Can be used for both analog and digital signals
Inexpensive as compared to fibre optic cables
Easy to install and maintain
Disadvantages of Coaxial Cables
These are some of the disadvantages of coaxial cables −

Expensive as compared to twisted pair cables
Not compatible with twisted pair cables
Optical Fibre
Thin glass or plastic threads used to transmit data using light waves are called optical fibre. Light Emitting Diodes (LEDs) or Laser Diodes (LDs) emit light waves at the source, which is read by a detector at the other end. Optical fibre cable has a bundle of such threads or fibres bundled together in a protective covering. Each fibre is made up of these three layers, starting with the innermost layer −

Core made of high quality silica glass or plastic
Cladding made of high quality silica glass or plastic, with a lower refractive index than the core
Protective outer covering called buffer
Note that both core and cladding are made of similar material. However, as refractive index of the cladding is lower, any stray light wave trying to escape the core is reflected back due to total internal reflection.

Optical Fiber Cable

Optical fibre is rapidly replacing copper wires in telephone lines, internet communication and even cable TV connections because transmitted data can travel very long distances without weakening. Single node fibre optic cable can have maximum segment length of 2 kms and bandwidth of up to 100 Mbps. Multi-node fibre optic cable can have maximum segment length of 100 kms and bandwidth up to 2 Gbps.

Advantages of Optical Fibre
Optical fibre is fast replacing copper wires because of these advantages that it offers −

High bandwidth
Immune to electromagnetic interference
Suitable for industrial and noisy areas
Signals carrying data can travel long distances without weakening
Disadvantages of Optical Fibre
Despite long segment lengths and high bandwidth, using optical fibre may not be a viable option for every one due to these disadvantages −

Optical fibre cables are expensive
Sophisticated technology required for manufacturing, installing and maintaining optical fibre cables
Light waves are unidirectional, so two frequencies are required for full duplex transmission
Infrared
Low frequency infrared waves are used for very short distance communication like TV remote, wireless speakers, automatic doors, hand held devices etc. Infrared signals can propagate within a room but cannot penetrate walls. However, due to such short range, it is considered to be one of the most secure transmission modes.

Electromagnetic Spectrum

Radio Wave
Transmission of data using radio frequencies is called radio-wave transmission. We all are familiar with radio channels that broadcast entertainment programs. Radio stations transmit radio waves using transmitters, which are received by the receiver installed in our devices.

Both transmitters and receivers use antennas to radiate or capture radio signals. These radio frequencies can also be used for direct voice communication within the allocated range. This range is usually 10 miles.

Radio Wave

Advantages of Radio Wave
These are some of the advantages of radio wave transmissions −

Inexpensive mode of information exchange
No land needs to be acquired for laying cables
Installation and maintenance of devices is cheap
Disadvantages of Radio Wave
These are some of the disadvantages of radio wave transmissions −

Insecure communication medium
Prone to weather changes like rain, thunderstorms, etc.

Switching Techniques

In large networks, there may be more than one paths for transmitting data from sender to receiver. Selecting a path that data must take out of the available options is called switching. There are two popular switching techniques – circuit switching and packet switching.

Switching

Circuit Switching
When a dedicated path is established for data transmission between sender and receiver, it is called circuit switching. When any network node wants to send data, be it audio, video, text or any other type of information, a call request signal is sent to the receiver and acknowledged back to ensure availability of dedicated path. This dedicated path is then used to send data. ARPANET used circuit switching for communication over the network.

Advantages of Circuit Switching
Circuit switching provides these advantages over other switching techniques −

Once path is set up, the only delay is in data transmission speed
No problem of congestion or garbled message
Disadvantages of Circuit Switching
Circuit switching has its disadvantages too −

Long set up time is required
A request token must travel to the receiver and then acknowledged before any transmission can happen
Line may be held up for a long time
Packet Switching
As we discussed, the major problem with circuit switching is that it needs a dedicated line for transmission. In packet switching, data is broken down into small packets with each packet having source and destination addresses, travelling from one router to the next router.


Communication Technologies – Terminologies

Before we dive into details of networking, let us discuss some common terms associated with data communication.

Channel
Physical medium like cables over which information is exchanged is called channel. Transmission channel may be analog or digital. As the name suggests, analog channels transmit data using analog signals while digital channels transmit data using digital signals.

In popular network terminology, path over which data is sent or received is called data channel. This data channel may be a tangible medium like copper wire cables or broadcast medium like radio waves.

Data Transfer Rate
The speed of data transferred or received over transmission channel, measured per unit time, is called data transfer rate. The smallest unit of measurement is bits per second (bps). 1 bps means 1 bit (0 or 1) of data is transferred in 1 second.

Here are some commonly used data transfer rates −

1 Bps = 1 Byte per second = 8 bits per second
1 kbps = 1 kilobit per second = 1024 bits per second
1 Mbps = 1 Megabit per second = 1024 Kbps
1 Gbps = 1 Gigabit per second = 1024 Mbps
Bandwidth
Data transfer rates that can be supported by a network is called its bandwidth. It is measured in bits per second (bps). Modern day networks provide bandwidth in Kbps, Mbps and Gbps. Some of the factors affecting a network’s bandwidth include −

Network devices used
Protocols used
Number of users connected
Network overheads like collision, errors, etc.
Throughput
Throughput is the actual speed with which data gets transferred over the network. Besides transmitting the actual data, network bandwidth is used for transmitting error messages, acknowledgement frames, etc.

Throughput is a better measurement of network speed, efficiency and capacity utilization rather than bandwidth.

Protocol
Protocol is a set of rules and regulations used by devices to communicate over the network. Just like humans, computers also need rules to ensure successful communication. If two people start speaking at the same time or in different languages when no interpreter is present, no meaningful exchange of information can occur.

Similarly, devices connected on the network need to follow rules defining situations like when and how to transmit data, when to receive data, how to give error-free message, etc.

Some common protocols used over the Internet are −

Transmission Control Protocol
Internet Protocol
Point to Point Protocol
File Transfer Protocol
Hypertext Transfer Protocol
Internet Message Access Protocol

History Of Networking

ARPANET – the First Network
ARPANET − Advanced Research Projects Agency Network − the granddad of Internet was a network established by the US Department of Defense (DOD). The work for establishing the network started in the early 1960s and DOD sponsored major research work, which resulted in development on initial protocols, languages and frameworks for network communication.

It had four nodes at University of California at Los Angeles (UCLA), Stanford Research Institute (SRI), University of California at Santa Barbara (UCSB) and University of Utah. On October 29, 1969, the first message was exchanged between UCLA and SRI. E-mail was created by Roy Tomlinson in 1972 at Bolt Beranek and Newman, Inc. (BBN) after UCLA was connected to BBN.
Internet
ARPANET expanded to connect DOD with those universities of the US that were carrying out defense-related research. It covered most of the major universities across the country. The concept of networking got a boost when University College of London (UK) and Royal Radar Network (Norway) connected to the ARPANET and a network of networks was formed.

The term Internet was coined by Vinton Cerf, Yogen Dalal and Carl Sunshine of Stanford University to describe this network of networks. Together they also developed protocols to facilitate information exchange over the Internet. Transmission Control Protocol (TCP) still forms the backbone of networking.

Telenet
Telenet was the first commercial adaptation of ARPANET introduced in 1974. With this the concept of Internet Service Provider (ISP) was also introduced. The main function of an ISP is to provide uninterrupted Internet connection to its customers at affordable rates.

World Wide Web
With commercialization of internet, more and more networks were developed in different part of the world. Each network used different protocols for communicating over the network. This prevented different networks from connecting together seamlessly. In the 1980s, Tim Berners-Lee led a group of Computer scientists at CERN, Switzerland, to create a seamless network of varied networks, called the World Wide Web (WWW).

World Wide Web is a complex web of websites and web pages connected together through hypertexts. Hypertext is a word or group of words linking to another web page of the same or different website. When the hypertext is clicked, another web page opens.

The evolution from ARPANET to WWW was possible due to many new achievements by researchers and computer scientists all over the world. Here are some of those developments −

Year Milestone
1957 Advanced Research Project Agency formed by US
1969 ARPANET became functional
1970 ARPANET connected to BBNs
1972 Roy Tomlinson develops network messaging or E-mail. Symbol @ comes to mean “at”
1973 APRANET connected to Royal Radar Network of Norway
1974 Term Internet coined
First commercial use of ARPANET, Telenet, is approved

1982 TCP/IP introduced as standard protocol on ARPANET
1983 Domain Name System introduced
1986 National Science Foundation brings connectivity to more people with its NSFNET program
1990 ARPANET decommissioned
First web browser Nexus developed

HTML developed

2002-2004 Web 2.0 is born



Communication Technologies

Communication Technologies – Introduction
Exchange of information through the use of speech, signs or symbols is called communication. When early humans started speaking, some 5,00,000 years ago, that was the first mode of communication. Before we dive into modern technologies that drive communication in contemporary world, we need to know how humans developed better communication techniques to share knowledge with each other.

History of Communication
Communicating with people over a distance is known as telecommunication. The first forms of telecommunication were smoke signals, drums or fire torches. The major disadvantage with these communication systems was that only a set of pre-determined messages could be transmitted. This was overcome in the 18th and 19th century through development of telegraphy and Morse code.

History of Communication

Invention of telephone and establishment of commercial telephony in 1878 marked a turnaround in communication systems and real telecommunication was born. International Telecommunication Union (ITU) defines telecommunication as transmission, emission and reception of any signs, signals or messages by electromagnetic systems. Now we had the communication technology to connect with people physically located thousands of kilometers away.

Telephones slowly gave way to television, videophone, satellite and finally computer networks. Computer networks have revolutionized modern day communication and communication technologies. That will be the subject of our in-depth study in subsequent chapters.

Saturday, 25 November 2023

Title: **"Uniting for Change: Join the Write for Rights Campaign in Pakistan"**

In a world fraught with challenges, the power of the written word remains a potent force for change. Amnesty International's annual "Write for Rights" campaign transcends borders, echoing the voices of individuals whose rights have been unjustly denied. As the campaign gains momentum globally, it is time for Pakistan to join hands, contributing to a collective movement advocating for justice and human rights.


**Background:**

Amnesty International, a global champion of human rights, initiates the Write for Rights campaign annually, bringing attention to individuals facing persecution, injustice, and suppression. This year, one of the compelling stories calls for our attention right here in Pakistan – the case of Justyna Wydrzyńska.


**Justyna's Story:**

Justyna Wydrzyńska's journey mirrors the struggles of countless individuals navigating the complexities of justice. In 2020, she extended a helping hand to a woman trapped in an abusive relationship, providing support in a situation where despair seemed insurmountable. Her act of sending abortion pills to the distressed woman, however, led to her own legal predicament. Now, she is in the process of appealing a conviction that threatens not only her freedom but also the accessibility of safe abortions for women in similar situations.


**Your Support Matters:**

This is not merely a distant narrative; it's a call for solidarity from within our own communities. By joining the Write for Rights campaign, individuals in Pakistan can actively participate in defending the rights of people like Justyna Wydrzyńska. The campaign's impact reaches beyond geographical boundaries, fostering a global network of support that can influence change.


**How to Participate:**

1. **Spread Awareness:** Share Justyna's story and information about the Write for Rights campaign on social media platforms, creating a ripple effect of awareness.


2. **Write a Letter:** Craft a letter advocating for Justyna and others in similar situations. Address it to the concerned authorities, urging a fair review of her case and a reevaluation of laws affecting women's reproductive rights.


3. **Organize Events:** Host local events or discussions to engage the community in conversations about human rights. This could include film screenings, panel discussions, or awareness campaigns.


4. **Use Your Platform:** If you have a blog, vlog, or any other platform, use it to amplify the message of Write for Rights. Encourage others to join the cause.


**Conclusion:**

In Pakistan, where the struggle for human rights is an ongoing endeavor, the Write for Rights campaign provides a tangible way for individuals to contribute to a global movement. By standing up for Justyna and others like her, we can make a meaningful difference. Let our voices echo the values of justice, compassion, and the unwavering belief in the power of collective action. Join the Write for Rights campaign, and let your support become a beacon of hope for those in need.


Written by Dr. Zafeer Siddiqui

Vice President

Central Peace Committee 

For Interfaith Harmony