wake-up call (current it security scenario of nepal-2014)
DESCRIPTION
With Rise if of IT related business, there is always rise of IT Security Risk. A presentation by Bijay Limbu senihang regarding current IT security scenario of Nepal.TRANSCRIPT
![Page 1: Wake-Up Call (Current IT Security Scenario of Nepal-2014)](https://reader036.vdocuments.net/reader036/viewer/2022062419/558c03b7d8b42a6b788b45bd/html5/thumbnails/1.jpg)
Wake-Up CallCurrent IT Security Scenario of Nepal
Bijay Limbu Senihang @bhutabe
![Page 2: Wake-Up Call (Current IT Security Scenario of Nepal-2014)](https://reader036.vdocuments.net/reader036/viewer/2022062419/558c03b7d8b42a6b788b45bd/html5/thumbnails/2.jpg)
Who am I?
• Information Security Consultant
(Entrust Solutions Nepal)
• Co-Founder of Nep Security
• Lecturer/Trainer
• Loyal Husband ;)
![Page 3: Wake-Up Call (Current IT Security Scenario of Nepal-2014)](https://reader036.vdocuments.net/reader036/viewer/2022062419/558c03b7d8b42a6b788b45bd/html5/thumbnails/3.jpg)
Growth of IT in Nepal
Source: http://annapurnapost.com
![Page 4: Wake-Up Call (Current IT Security Scenario of Nepal-2014)](https://reader036.vdocuments.net/reader036/viewer/2022062419/558c03b7d8b42a6b788b45bd/html5/thumbnails/4.jpg)
Security Risk
• Identity Theft
• Phishing Attack
• Card Fraud
• Malware Threats
• Intellectual Property Theft
• Cyber Bully
![Page 5: Wake-Up Call (Current IT Security Scenario of Nepal-2014)](https://reader036.vdocuments.net/reader036/viewer/2022062419/558c03b7d8b42a6b788b45bd/html5/thumbnails/5.jpg)
Security Myth
![Page 6: Wake-Up Call (Current IT Security Scenario of Nepal-2014)](https://reader036.vdocuments.net/reader036/viewer/2022062419/558c03b7d8b42a6b788b45bd/html5/thumbnails/6.jpg)
Current IT Security Scenario
![Page 7: Wake-Up Call (Current IT Security Scenario of Nepal-2014)](https://reader036.vdocuments.net/reader036/viewer/2022062419/558c03b7d8b42a6b788b45bd/html5/thumbnails/7.jpg)
Current IT Security Scenario (contd..)
![Page 8: Wake-Up Call (Current IT Security Scenario of Nepal-2014)](https://reader036.vdocuments.net/reader036/viewer/2022062419/558c03b7d8b42a6b788b45bd/html5/thumbnails/8.jpg)
Current IT Security Scenario (contd..)
source:http://threatpost.com
![Page 9: Wake-Up Call (Current IT Security Scenario of Nepal-2014)](https://reader036.vdocuments.net/reader036/viewer/2022062419/558c03b7d8b42a6b788b45bd/html5/thumbnails/9.jpg)
Current Cyber Security Scenario (contd..)
Source: http://www.thehimalayantimes.com Source: http://www.fbi.gov/
![Page 10: Wake-Up Call (Current IT Security Scenario of Nepal-2014)](https://reader036.vdocuments.net/reader036/viewer/2022062419/558c03b7d8b42a6b788b45bd/html5/thumbnails/10.jpg)
![Page 11: Wake-Up Call (Current IT Security Scenario of Nepal-2014)](https://reader036.vdocuments.net/reader036/viewer/2022062419/558c03b7d8b42a6b788b45bd/html5/thumbnails/11.jpg)
Solutions● Nepal IT Security Guidelines● Review of NRB IT Guidelines● Review of Electronic Transaction Act● CERT (Computer Emergency Response Team)● Regular IT/IS Audit● Regular Vulnerability Assessment/ Penetration
Testing● Regular Security Awareness Programme
![Page 12: Wake-Up Call (Current IT Security Scenario of Nepal-2014)](https://reader036.vdocuments.net/reader036/viewer/2022062419/558c03b7d8b42a6b788b45bd/html5/thumbnails/12.jpg)
![Page 13: Wake-Up Call (Current IT Security Scenario of Nepal-2014)](https://reader036.vdocuments.net/reader036/viewer/2022062419/558c03b7d8b42a6b788b45bd/html5/thumbnails/13.jpg)
![Page 14: Wake-Up Call (Current IT Security Scenario of Nepal-2014)](https://reader036.vdocuments.net/reader036/viewer/2022062419/558c03b7d8b42a6b788b45bd/html5/thumbnails/14.jpg)
Questions are Mandatory!!