Cyber Security Context in Nepal, the event organized by the Center For Cyber Security Research and Innovation (CSRI) and Information Security Response Team Nepal (npCert) in association with Nepal Telecommunications Authority, CSIT Association of Nepal and CAN Federation was successfully conducted today, Tuesday at 3 pm.
This event was hosted to focus on the Cyber Security Context in Nepal (Past / Present/way) with the resource person Mr. Narayan Koirala. He is a Software Engineer along with an MBA degree. He is also a certified ISO 27001:2013 Auditor and a certified CISCO CCNA CyberOps professional. Besides, he is associated with the Nepalese Young Entrepreneurs’ Forum (NYEF), Lions Club International, and CAN Federation.
Mr. Koirala has been featured in numerous National and International Media and shared his thoughts about rising cybercrime and prevention in various conferences/ events. His articles about Cyber Hygiene and Data Security in the fast-paced technological advancement are being followed by many individuals and organizations.
With all his experiences and knowledge it was a pleasure to listen to his thoughts about the Cyber Security context in Nepal. Here is the short summary of the event that he had shared with us.
Summary of Event
According to him, Individuals should know about their digital assets like hardware, software, software access, and social accounts that they use. Then only they can focus on how to secure the assets that are at the organizational level.
Pillars of Cybersecurity
The three basic pillars of Cybersecurity are;
History of CyberSecurity
- In the early 1990s when technology just started its growth there was a very low risk of cyber threats.
- Later with the high growth in development and deployment, there was an increase in internet usage in the year 2000. With that growth came several viruses, trojans in the system.
- Similarly, the advancement in technology also brought cyber threats like Financial Fraud, Cross Border Crime, political crime in the 2010s.
- The current Scenario in 2020 seems to have more cyber threats than late histories like Intelligent Stealing, Cross country warfare, Deep fakes, and more political crimes and issues.
Current status of CyberSecurity in Nepal
#1. Information Technology Landscape
- Growth in Development and Deployment of IT systems
- Use of modern-day technologies for personal and professional life
- Ecommerce has revolutionalized the way
- Rise in the digital payment ecosystem.
#2. Common Attack Surface
- Communication channel
- Software Application
- Network Infrastructure
#3. Limited understanding of Tech assests and risk areas
#4. Ignorance of people towards protection of assests/goodwill(knowledge vs practice)
#5. Existence of process but poor execution
#6.Ignorance towards cyber security by organizations
#7. Weak governance(national/institutional)
#8. Less preparance in Incident Handling
#9. Less prepared in continuos monitoring of assets and behaviour
Future of CyberSecurity
Major threats seems to be in;
- Social Engineering Attacks
- Targeted Ransomware Attacks
- Remote Worker Endpoint Security
- Cloud Security
- API Level attacks
- Misinformation and Deep fakes
- Mobile Malware/ Attacks
- 5G to Wifi Breaches
Threats as per sector
- Biological and Chemical Warfare
- Cyber Warfare
Solutions/ Things we should consider for CyberSecurity in Nepal
360 View of Cyber Security
There is massive opportunity ahead at various subdomains of CyberSecurity.
Some of the Queries by Audience
What are the counter measurements for defending threads and vulnerabilities in College/ Campus Level?
It depends on level of protection that college level is trying to solve. That may be network level or Software level. For Network level, go with Firewall defense mechanism and system updates while for software level go with OS level fixation.
Cyber Security career scope for students in Nepal
He suggested to start from the Software development level. One should have proper knowledge from building software to breaking the software to properly build a secure system and fix the issues. So, better to make a base in the knowledge of the software industry to dive into the various scopes of Cyber Security.
Question by Prof. Subarna Shakya- What are the Scopes of Security Audit and how much investment does it require?
-Conceptual Knowledge is required as an investment to audit.
-Investment as in for Knowledge and resource person is required.
Lastly, with all this, the event was successfully conducted with the certification of recognition and appreciation to the resource Speaker Mr. Narayan Koirala.
If you have missed the live event, here is the attached video ;
People are Loving
A Complete and Powerful Guide for Google Search Console (GSC) 
Google Search Console (GCS): Google Search Console is a webmaster tools which helps to check the website statistics and index...
Blue Screen Error on Microsoft Surface Pro: Fix it with some Simple Methods
The latest Microsoft Surface Pro models have great functionality. But they’re not immune to the common issues you face in...
8 ways to grow your Tiktok followers and get famous
Are you wondering about how to grow your Tiktok followers? TikTok is one of the latest social media sites, and...
Tips and Tricks to Make Siri More Useful
Everyone has love and hate relationship with Siri. Siri is Apple’s voice controlled digital assistant of iOS. Siri is powered...
How to remove Microsoft Edge from Windows 10?
Browsers Overview Many people use Google Chrome browser, Mozilla Firefox, Microsoft Edge, Safari Browser, and some of the professional user...
August 7 @ August 7 - August 7
10 Hits in 30 Days
Share Market4 weeks ago
IPO Result of Manakamana Smart Laghubitta Bittiya Sanstha Limited. When will Manakamana Smart Laghubitta IPO Result Publish?
Computer4 weeks ago
People are using these 8 easy tips to stop spam in their mail.
Auto Life2 weeks ago
Bike Tax Rate in Nepal [ 2078/79 – Latest Update ]
OPINION3 weeks ago
Nest Nepal Hosting Review: Is it worth buying Nest Nepal’s Hosting in Nepal?
Auto Life3 weeks ago
Suzuki Bikes Price in Nepal
Digital Marketing2 weeks ago
How to Choose Websites for Quality Link Building
Camera3 weeks ago
Insta360 Go 2 Price in Nepal with Specifications
Masters of Computer Science3 weeks ago
Boot Process in Linux | Understanding Boot process and related System files