research cyber security

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

Abstract:

This report presents the detailed information about the state of cyber security and its
state in Nepal along with the various kinds of real-life interactions, breaches,
vulnerabilities, and various ways on how they are handling the security on both
defensive and offensive part.

Introduction / Background:
Cyber security is a very shallow term for a domain that spans over the world ever
since the Internet was rendered to be a public service from a gimmicky part time
entertainment. Ever since the Internet got monetized, when the big guys settled in
and massive number of global users flooded into the use of internet for day to day
basic to heavy tasks, jobs, employments etc. Hence, thus arrived the need for the
iteration of a new term: Cyber Security. Although much criticized and overlooked in
the first few years of its existence, later on Cyber Security became a very big issue
for the people, government organs, multi-billion corporates to leading tech firms.It
became so vital that everyone couldn't overlook the use and need of cyber security
as it posed a threat to integrity and confidentiality which brings us into the next topic:
Data and the information overdrive. Data, everyone has data, there is no one in the
whole world who does not possess data that represents himself/herself/themselves
or the companies, family members, location, or the country that they are associated
with. So, began the race for the harvesting of data from the users and then
circulating it through the massive companies that target you with Ads which is the
major portion of the funding that internet receives monotonously. Over the surface its
very simple and basic: a user uses a service; company takes the data from the user
and the sells it or uses it for their own use which sometimes maybe beneficial for the
user too as it helps to improve the UX (User Experience). But not every time it’s like
this, underneath there's so many stuffs going on: server endpoints, port forwarding,
database connections and so many more complicated software engineering fiddles
that somewhere a small leakage could cause a major breakthrough. Cyber Security
comes into the rescue in such case and thus help provide suitable conditions.

“Cyber Security isn't about preventing the threats, it’s the process of minimizing
the damage in case you get attacked”

So cyber security is not about preventing everything but making the things ready
so that you don't suffer from irreparable damage and prevent further attacks
repeatedly.
Nepal and Cyber Security:
Then came the Cyber Security and its declaration of “The Electronic Transaction
and Digital Signature Act-Ordinance” popularly known as “Cyber Law” on 30th
Bhadra 2061 BS (15 September 2004) along with the formation of Cyber Bureau
by the Nepal Police on 30th Bhadra 2075, (June 10, 2018). With time many
Cyber Security companies also emerged as well as the by law enforced by the
Nepal government to meet the security standards whenever a new company
joins the cyberspace as well as the old companies who already exist in the
domain.

Objectives:
1. To know about the history of cyber security of Nepal.
2. To know about the governmental approaches for early cyber security.
3. To understand the major cyber breaches that occurred in Nepal.
4. To analyze the threat and consequences of such cyber-attacks.
5. To compare the law enforcement and the actual implementation by the
companies.
6. To know about the manpower working in cyberspace from their point of view.
7. To understand the future of cyber security and the advancements it may
possess.

Significance of study:
In Nepal, since the ISPs publicized dirt cheap internet and mind wobbling speeds
which was very good for the time and kind of ahead of the technology, the user
base of the internet grew exponentially, and it expanded like a virus. Companies
emerged here and there, from the startups brainstormed by the brilliant students
from the universities to the already existing reputable big and small companies, it
was time for the cyber security to be implemented as it would bring order and a
system to the cyber space of Nepal and to prevent any kind of chaos, breach or
threat quite possibly to the national integrity. The crimes that have occurred
overtime are increasing, and some irreparable damages have been done to
major cyber security companies in Nepal. The researchers believe that the
general public should have the idea on the current state of cyber security in
Nepal and the major events that have occurred and how it may affect their one’s
lives, companies’ profits or the national law and order along with the way it
presents us in the global security ranking index to get the idea about how much
safe are we exactly in terms of our digital footprint.
Scope of Study:
This research paper has focused on the cyber security in Nepal that has been on
the pen and paper of every journalistic piece out there along with the laws and
governmental follow ups including the major cyber law. It also expands to the
other laws of other nations and reports but only a scratch on the surface. It also
covers up the quotations from significant personalities who have been working on
the field or have interacted with along with citations from famous pen testers
about their experience.

Methodology:
The paper is based on research from both quantitative and qualitative data. The
primary data are from the sources of analytics from the various web portals and
statistical analysts and the secondary data sources are collected from the
websites and journal articles from other researchers and authors. (Citations at
the end of the document).

Organization of study:
Chapter one: Introduction to cyber security
Chapter two: History and timeline of major events
Chapter three: Company breaches and their consequences
Chapter four: Governmental verdict
Chapter five: Management and deployment of pen testers and security
Analysts
Chapter six: Future and scope for new generation
Literature Review:
Case Study:
Conclusion:
Acknowledgements:
References:

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy