Cybersecurity in Nepal



Similar documents
Internet Safety and Security: Strategies for Building an Internet Safety Wall

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests

Cybercrime: risks, penalties and prevention

Cybersecurity in the Commonwealth: Setting the Stage

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Cybersecurity Awareness. Part 1

In an age where so many businesses and systems are reliant on computer systems,

Cyber Stability 2015 Geneva, 09 July African Union Perspectives on Cybersecurity and Cybercrime Issues.

U. S. Attorney Office Northern District of Texas March 2013

An Overview of Cybersecurity and Cybercrime in Taiwan

INFORMATION SECURITY AWARENESS & TRAINING PROGRAM

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Policies and Practices on Network Security of MIIT

Capacity Building in Cyberspace Security

Technology Crime Services

Cyber security Country Experience: Establishment of Information Security Projects.

Making Sense of Cyber Insurance: A Guide for SMEs

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Pacific Islands Telecommunications Association

INFORMATION SECURITY GOVERNANCE READINESS IN GOVERNMENT INSTITUTION

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

Certified Cyber Security Analyst VS-1160

Collateral Effects of Cyberwar

Cybersecurity. Are you prepared?

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

Public-Private Partnerships against cybercrime. Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Get on First Base with your Regulators and Cyber Security

OCIE Technology Controls Program

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

National Cyber Security Strategy of Afghanistan (NCSA)

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Romanian National Computer Security Incident Response Team CERT-RO.

Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits)

CYBERSECURITY HOT TOPICS

National Cyber Crime Unit

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

How-To Guide: Cyber Security. Content Provided by

WRITTEN TESTIMONY OF

VISA International Security Summit. Dr. Colonel Tran Van Hoa Deputy Director Viet Nam Hightech Crime Police Department

Cybersecurity Governance

POLICIES TO MITIGATE CYBER RISK

A brief on Two-Factor Authentication

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

THE WORLD IS MOVING FAST, SECURITY FASTER.

How To Protect Yourself From Cyber Crime

Cyber Security Strategy

Ed Ferrara, MSIA, CISSP Fox School of Business

Promoting a cyber security culture and demand compliance with minimum security standards;

Executive Director Centre for Cyber Victim Counselling /

The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency

Cyber Security Strategy of Georgia

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments

National Information Assurance and Cyber Security Strategy (NIACSS) Jordan s Approach to National CS&IA

IT Security Risks & Trends

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Cybercrime in Canadian Criminal Law

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

Meeting the Information Security Management Challenge in the Cyber-Age

October 24, Mitigating Legal and Business Risks of Cyber Breaches

The 2012/3 SA Cyber Threat Barometer. Craig Rosewarne

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

Cyber Security solutions

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Certified Cyber Security Analyst VS-1160

Cybersecurity: What CFO s Need to Know

CONSULTING IMAGE PLACEHOLDER

Social Media Policy & E- Safeguarding Staff & Student Guidance

Introduction to Cybersecurity Overview. October 2014

LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES

Cybersecurity-related international institutions: An assessment and a framework for nations strategic policy choices

Franchise Data Compromise Trends and Cardholder. December, 2010

Cyber ITU. By Tomas Lamanauskas, ITU

24/7 High Tech Crime Network

Transcription:

Cybersecurity in Nepal Presenter: Ambika Shrestha Chitrakar PhD candidate at Gjøvik University College Representing Nepal Linkedin: https://no.linkedin.com/in/ambikash IFIP TC3 ISES (Information Security Education & Solidarity) Initiative

Outline Nepal Geography Profile in general Internet services in Nepal Cybersecurity challenges in Nepal Types of cyber-crimes experienced in Nepal Cybersecurity strategy in general Cybersecurity necessity of international harmonization Cybersecurity in Nepal Possible next steps for Nepal Summary

Nepal - Geography

Nepal profile in general

Internet Services in Nepal The Internet was first introduced in Nepal in 1993 in a venture of Royal Nepal Academy of Science and Technology (RONAST) and Merchantile Office Systems (MOS) Now almost all big cities have Internet facilities with local ISP

Internet Services in Nepal (contd.) Table1: Statistics of data/internet service in Nepal based on the annual report of NTA (Nepal Telecom Authority) Table2: objectives of national broadband policy 2013/2014 by NTA (draft - section 8)

Cybersecurity challenges in Nepal Targeting to provide better Internet service Computer science education and Software industry is in high demand However in general, most of the people are not aware of cybersecurity people still use pirated softwares government has very weak regulations to govern cyber-crimes very few/no skilled security specialists Because of such reasons, Nepal is vulnerable to cyber-crimes and it's control could be very challenging

Types of cyber-crimes experienced in Nepal Cyber crime is handled by Nepal Police against the FIR and Kathmandu District court has been fixed to look after the cyber crimes. Following types of cyber crimes have been committed in Nepal: ATM pin steal Cloning of ATM Card Hacking Financial fraud in Internet banking Phishing Social networking related crime

Cybersecurity strategy in general It is necessary to have a regulatory body and strategy to set standards, prevent and handle cyber security related issues. In general, cybersecurity strategy should be able to ensure: Confidentiality, integrity and accessibility of electronic information and services provided in cyberspace, Safegurding of electronic communication networks, information systems and critical infrastructure against incidents and cyber attacks, Protection of personal data and privacy etc.

Cybersecurity - Necessity of international harmonization Lack of proper cyber security strategy creates an opportunity to the attackers to easily compromise the systems and then carry out the serious attacks even in the developed countries. It is difficult to prosecute the attacker if the attack is performed from a country whose regulation does not address the violated regulations of the country where attack took place.

Cybersecurity in Nepal Table 3: cybersecurity in Nepal updated by ITU on 10th march 2015

Possible next steps for Nepal Implementing a national cybersecurity strategy Implementation of national and sector-specific cybersecurity strategy Capacity building: awareness, education, R&D, certification Cooperation: intra-state, intra-agency, public sector partnership

Summary Cybersecurity is a global issue and there should be balance in cybersecurity strategy all over the world It is necessary to have internationally harmonized cybersecurity strategy even in developing countries like Nepal Currently, there is no/few manpower related to information security and no national cybersecurity strategy in Nepal Nepal needs international cooperation and support for capacity building and development of information security

Thank you!