- Dr. Ramhari Subedi held the 1st general meeting of the Cyber Security Initiative in Nepal to discuss plans for a cyber security awareness campaign. He provided an overview of the situation of cyber security in Nepal and globally.
- At the 2nd general meeting, presentations were given on topics like ethical hacking, social media awareness, computer basics, and developing a cyber security framework for Nepal.
- The 3rd general meeting included presentations on web security, prospects and challenges of information security, and a discussion with an actor who agreed to help spread awareness. SSP Khanal from Nepal Police also discussed collaborating with the awareness campaign.
The internet is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s own disadvantages is cyber crime- illegal activity committed on the internet.
Cyber crime involves illegal activities using computers and the internet. It can include hacking, fraud, stalking, and identity theft. The first recorded cyber crimes occurred in the 1820s, but cyber crime grew with the rise of email in 1976 and computer viruses in 1982. There are many types of cyber crimes, and they are committed by insiders, hackers, virus writers, foreign intelligence, and terrorists. Cyber security works to prevent cyber crimes by keeping software updated, using strong passwords, firewalls, and antivirus software. The cyber laws of India address both traditional crimes that use computers as well as new crimes defined in the Information Technology Act of 2000. Cyber crime will likely continue to evolve, so cyber security remains important.
This document is a report on cyber crime submitted by a student. It begins with an acknowledgement and abstract. The report categorizes cyber crimes as those against individuals, property, or government. It describes various types of cyber crimes like hacking, theft, cyber stalking, and cyber terrorism. It discusses some notable cyber attacks in history like the "I love you" worm in 2000 and Conficker worm in 2007 that caused billions in damages. The report aims to provide an overview of the broad topic of cyber crime.
Internet and computers have changed working, communication, meeting and business requirements and conditions all over globe. Due to this high profile technology, everyone can share any activity that was unexpected and unimaginable few decades back. It was the imagination of people that they will live their lives in this manner and do their business quickly and imagination and dream has come true with the introduction of internet only. Modern society is now associated with internet and related technologies, over a quarter of the world's population is wired into the net and this number is growing every day
Cyber crime is a growing problem in India. Some common cyber crimes reported in India include phishing, hacking of government websites, and identity theft. India ranks 11th globally for reported cyber crimes, which are increasing due to factors like rapid growth of internet users. Common cyber crimes involve unauthorized access to systems, data theft and alteration, and using computers to enable other illicit activities. While laws like the IT Act 2000 have been enacted to tackle cyber crimes, enforcement remains a challenge as only a small percentage of crimes are reported. Techniques like antivirus software, firewalls, and educating users can help address the problem.
Cyber security is important to protect computers, networks, and data from theft, damage, or unauthorized access. It covers various types of security like data security, application security, mobile security, network security, endpoint security, cloud security, database security, and disaster recovery plans. Cyber threats can take the form of cybercrime, cyber-attacks, or cyber-terrorism, and may use methods like phishing, malware, SQL injection, backdoors, denial-of-service attacks, and spoofing. It is important for individuals and organizations to implement strong passwords, updates, backups, employee training, authentication, and security technologies to protect against cyber threats.
Cybercrime encompasses criminal acts using computers and networks, known as hacking, as well as traditional crimes conducted online like fraud and identity theft. Hacking is the unauthorized access of computer systems and networks, while hackers seek and exploit weaknesses. Common types of hacking include website, network, email, and password hacking. Identity theft involves personal information being stolen and used without permission, causing financial and reputational harm. Malicious software, or malware, is software designed to harm computers and users, and includes viruses, worms, adware, trojans, spyware and rootkits. Cyberstalking and harassment laws prohibit monitoring, threats, and gathering private information to threaten or harass individuals online. Theft involves taking property
The internet is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s own disadvantages is cyber crime- illegal activity committed on the internet.
Cyber crime involves illegal activities using computers and the internet. It can include hacking, fraud, stalking, and identity theft. The first recorded cyber crimes occurred in the 1820s, but cyber crime grew with the rise of email in 1976 and computer viruses in 1982. There are many types of cyber crimes, and they are committed by insiders, hackers, virus writers, foreign intelligence, and terrorists. Cyber security works to prevent cyber crimes by keeping software updated, using strong passwords, firewalls, and antivirus software. The cyber laws of India address both traditional crimes that use computers as well as new crimes defined in the Information Technology Act of 2000. Cyber crime will likely continue to evolve, so cyber security remains important.
This document is a report on cyber crime submitted by a student. It begins with an acknowledgement and abstract. The report categorizes cyber crimes as those against individuals, property, or government. It describes various types of cyber crimes like hacking, theft, cyber stalking, and cyber terrorism. It discusses some notable cyber attacks in history like the "I love you" worm in 2000 and Conficker worm in 2007 that caused billions in damages. The report aims to provide an overview of the broad topic of cyber crime.
Internet and computers have changed working, communication, meeting and business requirements and conditions all over globe. Due to this high profile technology, everyone can share any activity that was unexpected and unimaginable few decades back. It was the imagination of people that they will live their lives in this manner and do their business quickly and imagination and dream has come true with the introduction of internet only. Modern society is now associated with internet and related technologies, over a quarter of the world's population is wired into the net and this number is growing every day
Cyber crime is a growing problem in India. Some common cyber crimes reported in India include phishing, hacking of government websites, and identity theft. India ranks 11th globally for reported cyber crimes, which are increasing due to factors like rapid growth of internet users. Common cyber crimes involve unauthorized access to systems, data theft and alteration, and using computers to enable other illicit activities. While laws like the IT Act 2000 have been enacted to tackle cyber crimes, enforcement remains a challenge as only a small percentage of crimes are reported. Techniques like antivirus software, firewalls, and educating users can help address the problem.
Cyber security is important to protect computers, networks, and data from theft, damage, or unauthorized access. It covers various types of security like data security, application security, mobile security, network security, endpoint security, cloud security, database security, and disaster recovery plans. Cyber threats can take the form of cybercrime, cyber-attacks, or cyber-terrorism, and may use methods like phishing, malware, SQL injection, backdoors, denial-of-service attacks, and spoofing. It is important for individuals and organizations to implement strong passwords, updates, backups, employee training, authentication, and security technologies to protect against cyber threats.
Cybercrime encompasses criminal acts using computers and networks, known as hacking, as well as traditional crimes conducted online like fraud and identity theft. Hacking is the unauthorized access of computer systems and networks, while hackers seek and exploit weaknesses. Common types of hacking include website, network, email, and password hacking. Identity theft involves personal information being stolen and used without permission, causing financial and reputational harm. Malicious software, or malware, is software designed to harm computers and users, and includes viruses, worms, adware, trojans, spyware and rootkits. Cyberstalking and harassment laws prohibit monitoring, threats, and gathering private information to threaten or harass individuals online. Theft involves taking property
Cybercrime involves using computers or the internet to steal identities or import illegal programs. The first recorded cybercrime took place in 1820, while the first spam email and computer virus occurred in 1976 and 1982, respectively. Cybercriminals may target computers directly through hacking or use computers as weapons to enable real-world crimes like credit card fraud. Common cybercrimes include hacking, denial-of-service attacks, virus distribution, computer vandalism, cyber terrorism, and software piracy. Cyber security aims to protect personal and business information through prevention, detection, and response to online attacks by maintaining updated software, using strong passwords, and being wary of unsolicited requests for private information. As cybercrime evolves
presentation on cyber crime and securityAlisha Korpal
This document discusses various types of cybercrimes and cybersecurity issues. It defines cybercrimes as crimes committed using computers and the internet, such as identity theft. It then provides statistics on common types of cyber attacks like financial fraud, sabotage of networks, and viruses. The document also discusses specific cybercrimes like hacking, child pornography, denial of service attacks, and software piracy. It concludes by offering tips for improving cybersecurity, such as using antivirus software and firewalls, and maintaining safe internet practices.
This document discusses cybercrime, including definitions, types, causes, and effects. It defines cybercrime as any crime involving a computer or network, with the computer used to commit or be targeted by the crime. Common types of cybercrimes mentioned include hacking, theft of copyrighted material, cyberstalking, identity theft, and child exploitation. Causes cited include economic incentives, ideology, structural factors online, and personal vendettas. Effects can include lost revenue, wasted time, damaged reputations, and reduced productivity. The document also provides an overview of cybercrimes in Nepal, existing laws, and tips for staying safe online such as using strong passwords and updated security software.
Cyber crime refers to criminal activities conducted through computers and the internet. The document categorizes cyber crimes as those committed against individuals, property, organizations, and society. Examples include email spoofing, spamming, hacking, phishing, and cyber terrorism. The top countries for cyber crimes are the United States, China, and Germany. The document provides tips for cyber security and preventing cyber crimes such as using antivirus software, firewalls, and strong, unique passwords.
This document discusses cyber crime and provides an overview presented by Dr. Soreingam Ragui. It defines cyber crime as any illegal activity committed using computers or networks. India ranks 11th globally for cyber crime, constituting 3% of total cyber crime. Reasons for India's high rates include a rapidly growing internet user base. Common cyber crimes include hacking, phishing, and intellectual property theft. The document also discusses Indian cyber law and acts like the Information Technology Act of 2000.
Cybercrime involves any criminal activity using computers, networks or networked devices. It can be carried out by individuals or organizations, and some cybercriminals are highly skilled while others are novices. Common types of cybercrime include cyberextortion, cryptojacking, software piracy, credit card fraud, cyberespionage, and identity theft. The true costs of cybercrime are difficult to assess but can include financial losses, damage to investor perception and company value, loss of customers and reputation, fines and legal costs, and direct costs of responding to attacks. A case study example showed credit card fraud occurring when someone made an unauthorized online purchase using a stolen credit card number, negatively impacting the victimized customer and online
This document discusses various types of cyber crimes and provides case studies of cyber crimes in India. It summarizes a case study of cyber crimes related to 2008 bomb blasts in Ahmedabad where terrorists misused unsecured WiFi routers to send threatening emails. It also summarizes a case study where the website of BSNL was hacked by Anonymous India to protest the arrest of individuals under Section 66A of India's IT Act for social media posts. The document concludes that cyber crimes continue to increase in India despite the stringent IT Act.
This document discusses cyber crime and its evolution. It defines cyber crime as illegal activity committed using computers and the internet, such as hacking, denial of service attacks, virus dissemination, computer vandalism, cyber terrorism, and software piracy. The types of cyber crimes are then explained in more detail. The document also provides statistics on common types of cyber attacks.
The document discusses cybercrime, including defining it as illegal acts using computers and providing examples. It also gives tips on how to protect yourself from cybercrime such as using antivirus software, detecting secure websites, and being wary of suspicious emails. The legal aspects of cybercrime in India are also outlined.
The document discusses cybersecurity issues including:
- The original open design of the internet lacked security concerns
- Cybersecurity issues can be classified by the type of action, perpetrator, and targets
- National and international initiatives have been established to address cybersecurity including organizations like DHS, ITU, UN, and policies on standards, legal measures, and capacity building
- Future e-commerce requires high cybersecurity but additional measures may impact privacy, such as regulations on encryption software.
This document discusses ethical hacking and provides an overview of its key aspects in 6 paragraphs. It begins by distinguishing between hacking and ethical hacking, noting that ethical hacking involves evaluating a system's security with the owner's permission. It then describes different types of hackers and various types of attacks, such as worms, denial of service attacks, and viruses. The document outlines the methodology of hacking through stages like reconnaissance and scanning. It discusses advantages like providing security for organizations, and disadvantages such as costs and trust issues. It concludes by emphasizing the importance of security in software and businesses.
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
This presentation is designed to give an insight into cyber risk.
The importance of protecting your data has never been more significant. Every week the media features stories of companies suffering data breeches leading to financial difficulties and unhappy customers.
The document discusses various ways that people access and use the internet including through laptops, tablets, phones, for entertainment, keeping in touch with others, accessing information, and using search engines. It also mentions risks involved with uploading personal information and surfing online, and suggests educating students on cyber bullying and internet safety through class discussions, guest speakers, and ensuring school policies address online security.
Information technology art INTEGRATION project on cyber crime , Smruti Rekha ...7A34PratyushKumarBar
This document is a student project on cyber crime. It includes an introduction, acknowledgements, types of cyber crimes like hacking, denial of service attacks, virus dissemination, and software piracy. It also discusses prevention methods and concludes that cyber crime will likely continue to evolve and develop new techniques.
This document discusses cyber security and the need for it. It begins by defining cyber security as the security offered through online services to protect information. It then discusses how security threats are increasing as more people go online. The document covers the meaning of the term "cyber," major security problems like viruses and hackers, and ways to implement and maintain cyber security, such as using strong passwords and firewalls. It concludes by emphasizing that cyber security is everyone's responsibility.
This document discusses cybercrime and how to prevent becoming a victim. It begins by explaining why we should be aware of cybercrime given our increasing online activities. The objectives are then outlined as providing awareness of cybercrime, recognizing methods, understanding cyber laws, and learning to avoid victimization. Various types of cybercrime are defined including those against persons, property, and government. Examples like phishing, hacking, and cyber terrorism are described. The history of cybercrime in India involves many website hacks and defacements. Laws are still lacking to fully address cybercrime. Awareness, security software, and caution are recommended for protection.
Cyber crime is evolving from traditional organized crime to include online criminal activities. The document defines cyber crime and categories it into crimes against persons, property, government and society. It discusses the weapons used in cyber crimes such as hacking, viruses, and phishing. India is experiencing increased cyber crime due to its growing internet user base, and the document provides statistics on common cyber crimes in India as well as safety tips and cyber security measures.
Introduction to Cyber Crime is very necessary and useful for Forensic Science students serving in the cybercrime field and also useful for the general public. Types and Examples of Cyber Crime, How to prevent and report cybercrime, investigating cybercrime.
This document discusses elder abuse and efforts to raise awareness of the issue. It provides definitions of elder abuse and outlines the types of abuse. It also notes that the aging population is increasing, and with it, cases of elder abuse. Statistics about elder abuse in Nepal are presented, showing the number of older people who died or were injured due to physical abuse by year and sex. The document concludes by showing the district-wise distribution of physical abuse incidents in Nepal between 2012 and 2014.
Facebook crime has increased substantially over the past five years according to police reports. Crimes linked to Facebook have risen over 500% in the UK, with over 100,000 cases reported in the last five years. Police are using Facebook to help solve crimes by posting photos of suspects to gather public tips. However, the large number of Facebook users has also enabled more opportunities for criminal activity like cyberbullying, stalking, and fraud. Authorities warn people to be cautious about sharing private information online.
Cybercrime involves using computers or the internet to steal identities or import illegal programs. The first recorded cybercrime took place in 1820, while the first spam email and computer virus occurred in 1976 and 1982, respectively. Cybercriminals may target computers directly through hacking or use computers as weapons to enable real-world crimes like credit card fraud. Common cybercrimes include hacking, denial-of-service attacks, virus distribution, computer vandalism, cyber terrorism, and software piracy. Cyber security aims to protect personal and business information through prevention, detection, and response to online attacks by maintaining updated software, using strong passwords, and being wary of unsolicited requests for private information. As cybercrime evolves
presentation on cyber crime and securityAlisha Korpal
This document discusses various types of cybercrimes and cybersecurity issues. It defines cybercrimes as crimes committed using computers and the internet, such as identity theft. It then provides statistics on common types of cyber attacks like financial fraud, sabotage of networks, and viruses. The document also discusses specific cybercrimes like hacking, child pornography, denial of service attacks, and software piracy. It concludes by offering tips for improving cybersecurity, such as using antivirus software and firewalls, and maintaining safe internet practices.
This document discusses cybercrime, including definitions, types, causes, and effects. It defines cybercrime as any crime involving a computer or network, with the computer used to commit or be targeted by the crime. Common types of cybercrimes mentioned include hacking, theft of copyrighted material, cyberstalking, identity theft, and child exploitation. Causes cited include economic incentives, ideology, structural factors online, and personal vendettas. Effects can include lost revenue, wasted time, damaged reputations, and reduced productivity. The document also provides an overview of cybercrimes in Nepal, existing laws, and tips for staying safe online such as using strong passwords and updated security software.
Cyber crime refers to criminal activities conducted through computers and the internet. The document categorizes cyber crimes as those committed against individuals, property, organizations, and society. Examples include email spoofing, spamming, hacking, phishing, and cyber terrorism. The top countries for cyber crimes are the United States, China, and Germany. The document provides tips for cyber security and preventing cyber crimes such as using antivirus software, firewalls, and strong, unique passwords.
This document discusses cyber crime and provides an overview presented by Dr. Soreingam Ragui. It defines cyber crime as any illegal activity committed using computers or networks. India ranks 11th globally for cyber crime, constituting 3% of total cyber crime. Reasons for India's high rates include a rapidly growing internet user base. Common cyber crimes include hacking, phishing, and intellectual property theft. The document also discusses Indian cyber law and acts like the Information Technology Act of 2000.
Cybercrime involves any criminal activity using computers, networks or networked devices. It can be carried out by individuals or organizations, and some cybercriminals are highly skilled while others are novices. Common types of cybercrime include cyberextortion, cryptojacking, software piracy, credit card fraud, cyberespionage, and identity theft. The true costs of cybercrime are difficult to assess but can include financial losses, damage to investor perception and company value, loss of customers and reputation, fines and legal costs, and direct costs of responding to attacks. A case study example showed credit card fraud occurring when someone made an unauthorized online purchase using a stolen credit card number, negatively impacting the victimized customer and online
This document discusses various types of cyber crimes and provides case studies of cyber crimes in India. It summarizes a case study of cyber crimes related to 2008 bomb blasts in Ahmedabad where terrorists misused unsecured WiFi routers to send threatening emails. It also summarizes a case study where the website of BSNL was hacked by Anonymous India to protest the arrest of individuals under Section 66A of India's IT Act for social media posts. The document concludes that cyber crimes continue to increase in India despite the stringent IT Act.
This document discusses cyber crime and its evolution. It defines cyber crime as illegal activity committed using computers and the internet, such as hacking, denial of service attacks, virus dissemination, computer vandalism, cyber terrorism, and software piracy. The types of cyber crimes are then explained in more detail. The document also provides statistics on common types of cyber attacks.
The document discusses cybercrime, including defining it as illegal acts using computers and providing examples. It also gives tips on how to protect yourself from cybercrime such as using antivirus software, detecting secure websites, and being wary of suspicious emails. The legal aspects of cybercrime in India are also outlined.
The document discusses cybersecurity issues including:
- The original open design of the internet lacked security concerns
- Cybersecurity issues can be classified by the type of action, perpetrator, and targets
- National and international initiatives have been established to address cybersecurity including organizations like DHS, ITU, UN, and policies on standards, legal measures, and capacity building
- Future e-commerce requires high cybersecurity but additional measures may impact privacy, such as regulations on encryption software.
This document discusses ethical hacking and provides an overview of its key aspects in 6 paragraphs. It begins by distinguishing between hacking and ethical hacking, noting that ethical hacking involves evaluating a system's security with the owner's permission. It then describes different types of hackers and various types of attacks, such as worms, denial of service attacks, and viruses. The document outlines the methodology of hacking through stages like reconnaissance and scanning. It discusses advantages like providing security for organizations, and disadvantages such as costs and trust issues. It concludes by emphasizing the importance of security in software and businesses.
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
This presentation is designed to give an insight into cyber risk.
The importance of protecting your data has never been more significant. Every week the media features stories of companies suffering data breeches leading to financial difficulties and unhappy customers.
The document discusses various ways that people access and use the internet including through laptops, tablets, phones, for entertainment, keeping in touch with others, accessing information, and using search engines. It also mentions risks involved with uploading personal information and surfing online, and suggests educating students on cyber bullying and internet safety through class discussions, guest speakers, and ensuring school policies address online security.
Information technology art INTEGRATION project on cyber crime , Smruti Rekha ...7A34PratyushKumarBar
This document is a student project on cyber crime. It includes an introduction, acknowledgements, types of cyber crimes like hacking, denial of service attacks, virus dissemination, and software piracy. It also discusses prevention methods and concludes that cyber crime will likely continue to evolve and develop new techniques.
This document discusses cyber security and the need for it. It begins by defining cyber security as the security offered through online services to protect information. It then discusses how security threats are increasing as more people go online. The document covers the meaning of the term "cyber," major security problems like viruses and hackers, and ways to implement and maintain cyber security, such as using strong passwords and firewalls. It concludes by emphasizing that cyber security is everyone's responsibility.
This document discusses cybercrime and how to prevent becoming a victim. It begins by explaining why we should be aware of cybercrime given our increasing online activities. The objectives are then outlined as providing awareness of cybercrime, recognizing methods, understanding cyber laws, and learning to avoid victimization. Various types of cybercrime are defined including those against persons, property, and government. Examples like phishing, hacking, and cyber terrorism are described. The history of cybercrime in India involves many website hacks and defacements. Laws are still lacking to fully address cybercrime. Awareness, security software, and caution are recommended for protection.
Cyber crime is evolving from traditional organized crime to include online criminal activities. The document defines cyber crime and categories it into crimes against persons, property, government and society. It discusses the weapons used in cyber crimes such as hacking, viruses, and phishing. India is experiencing increased cyber crime due to its growing internet user base, and the document provides statistics on common cyber crimes in India as well as safety tips and cyber security measures.
Introduction to Cyber Crime is very necessary and useful for Forensic Science students serving in the cybercrime field and also useful for the general public. Types and Examples of Cyber Crime, How to prevent and report cybercrime, investigating cybercrime.
This document discusses elder abuse and efforts to raise awareness of the issue. It provides definitions of elder abuse and outlines the types of abuse. It also notes that the aging population is increasing, and with it, cases of elder abuse. Statistics about elder abuse in Nepal are presented, showing the number of older people who died or were injured due to physical abuse by year and sex. The document concludes by showing the district-wise distribution of physical abuse incidents in Nepal between 2012 and 2014.
Facebook crime has increased substantially over the past five years according to police reports. Crimes linked to Facebook have risen over 500% in the UK, with over 100,000 cases reported in the last five years. Police are using Facebook to help solve crimes by posting photos of suspects to gather public tips. However, the large number of Facebook users has also enabled more opportunities for criminal activity like cyberbullying, stalking, and fraud. Authorities warn people to be cautious about sharing private information online.
Wake-Up Call (Current IT Security Scenario of Nepal-2014)Bijay Senihang
With Rise if of IT related business, there is always rise of IT Security Risk. A presentation by Bijay Limbu senihang regarding current IT security scenario of Nepal.
This document summarizes a presentation on aging in Nepal from a socio-demographic perspective. It defines different types of aging including biological, chronological, psychological, and social aging. It discusses gerontology as the study of aging and geriatrics as the branch of medicine dealing with health of the elderly. It outlines trends in aging for Nepal including increasing life expectancy, percentage of elderly population, and their growing size. It notes that most elderly in Nepal live with children and care is primarily provided by family. Some key research issues on aging for Nepal are also highlighted.
02 Types of Computer Forensics Technology - NotesKranthi
The document discusses various types of computer forensics technology used by law enforcement, military, and businesses. It describes the Computer Forensics Experiment 2000 (CFX-2000) which tested an integrated forensic analysis framework to determine motives and identity of cyber criminals. It also discusses specific computer forensics software tools like SafeBack for creating evidence backups and Text Search Plus for quickly searching storage media for keywords. The document provides details on different types of computer forensics technology used for remote monitoring, creating trackable documents, and theft recovery.
Appropriate Technology Entrepreneurship in NepalKushal Gurung
This document discusses entrepreneurship and appropriate technology in Nepal. It provides an overview of entrepreneurship concepts like minimum viable products and pivoting. It also analyzes Nepal's economy, imports, exports, and opportunities for appropriate technology interventions in sectors like agriculture, handicrafts, and tourism. Some challenges of serving base of the pyramid customers in Nepal are discussed, such as sourcing materials, social acceptance, and technology know-how. The document concludes by considering business models for appropriate technology products and services in Nepal, such as direct sales, distributors, pay-as-you-go models, and finding end-users who are not direct clients.
Singapore is facing an aging population as the post-war baby boom generation reaches age 65 by 2030, birth rates have declined, and lifespans have increased. This will strain social services and the workforce as fewer young people support more elderly. A multi-pronged approach is needed, including individual responsibility through health and financial planning, family support, community help, and government support like healthcare subsidies and the Central Provident Fund retirement scheme.
This document provides an overview of technical proposals, including their definition, purposes, importance, types, and key elements. A technical proposal is a written offer to undertake a new project or modify an existing system. Proposals solve problems, find answers, and offer services. They are important business records and can help win contracts. Proposals come in various forms depending on their intended audience and whether they were solicited or unsolicited. Effective proposals follow standard structures, provide qualifications, justify costs, and use persuasive writing to convince the reader.
Rural infrastructure development in nepal a prospect and opportunity- a pape...Bhim Upadhyaya
This document summarizes a presentation about rural infrastructure development opportunities in Nepal for engineering consultancy businesses. It provides context on Nepal's geography, socioeconomic status, and current infrastructure gaps. Major areas of infrastructure development outlined in national policies and plans include roads, irrigation, water and sanitation, electricity, housing, and rural telecommunications. Several large ongoing and proposed infrastructure projects are described that will require significant engineering expertise, such as expanding the road, rail, electricity and irrigation networks. The conclusion states that with Nepal's commitment to rapid development, there will be enormous opportunities for engineering consultants and need for more trained Nepali engineers to work on projects.
Introduction to rural infrastructure development in nepal 2012.01.14Bhim Upadhyaya
The document provides an overview of rural infrastructure development in Nepal. It discusses [1] the current state of infrastructure such as roads, irrigation, electricity, and telecommunications, noting many areas still lack adequate access. It then [2] outlines the key stakeholders involved in rural infrastructure projects, including government agencies, donors, contractors, and users. Finally, it [3] highlights several programs focused on improving rural infrastructure, such as roads, bridges, irrigation, and water supply/sanitation across the country.
Cyber security involves protecting computers, networks, programs and data from unauthorized access and cyber attacks. It includes communication security, network security and information security to safeguard organizational assets. Cyber crimes are illegal activities that use digital technologies and networks, and include hacking, data and system interference, fraud, and illegal device usage. Some early forms of cyber crime date back to the 1970s. Maintaining antivirus software, firewalls, backups and strong passwords can help protect against cyber threats while being mindful of privacy and security settings online. The document provides an overview of cyber security, cyber crimes, their history and basic safety recommendations.
Cybercrime involves using computers or the internet to steal identities or import illegal programs. The first recorded cybercrime took place in 1820. There are different types of cybercrimes such as hacking, denial of service attacks, computer viruses, and software piracy. Cybercrimes also include using computers to attack other systems, commit real-world crimes, or steal proprietary information. Common cyber attacks include financial fraud, sabotage of networks, theft of data, and unauthorized access. Internet security aims to establish rules to protect against such attacks by using antivirus software, firewalls, and updating security settings regularly.
The document outlines guidelines for formatting a final year project proposal. It includes sections for the project title, student names and roll numbers, main text formatting, headings formatting, figures and tables, and references. Guidelines are provided for font type, size, indentation, spacing, capitalization, and other formatting rules to maintain a consistent structure and appearance.
Cyber crime involves unlawful activities using computers and the internet. The document categorizes cyber crimes as those using computers to attack other computers or as tools to enable real-world crimes. It provides examples of various cyber crimes like hacking, child pornography, viruses, and cyber terrorism. It stresses the importance of cyber security to defend against attacks through prevention, detection and response. The document advises safety tips like using antivirus software, firewalls, and strong passwords. India's cyber laws address both traditional crimes committed online and new crimes defined in the Information Technology Act.
This document provides an overview of cyber crime and security. It defines cyber crime as illegal activity committed on the internet, such as stealing data or importing malware. The document then covers the history and evolution of cyber threats. It categorizes cyber crimes as those using the computer as a target or weapon. Specific types of cyber crimes discussed include hacking, denial of service attacks, virus dissemination, computer vandalism, cyber terrorism, and software piracy. The document concludes by emphasizing the importance of cyber security.
This document discusses cyber crime and provides examples of different types of cyber crimes including credit card fraud, identity theft, viruses, computer intrusions, malware, and distributed denial of service (DDoS) attacks. It describes common cyber crimes like theft of services and provides details on specific crimes like the Melissa virus. It also discusses the challenges of detecting new malware variants and protecting against DDoS attacks.
Various government bodies, organizations, associations and agencies have been involved in IG discussion at different names and forms.
Right before APrIGF 2016, some of major stakeholders (DoIT, ISOC Nepal, FDE, ISPAN and IOE) had a meeting at Department of Information Technology on conducting a full stakeholder’s meeting for wider consultation. An informal meeting with IGF MAG Chair Lynn St. Amour, and NRI’s focal Anja Genjo was held during ICANN 57 [5th November 2016] in Hyderabad, India.
For more details: https://2018.igf.org.np/nepal-internet-governance-forum-nepal-igf/
Information Security Response Team Nepal Partnership with One Cover Pvt. Ltd, ICT FRAME Magazine, Centre For Cyber Security Research and Innovation has hosted the first ever Cyber Security Meetup in Kathmandu, Nepal on April 4, 2019 (Chaitra 21, 2075) at Nepal Telecom’s Building, Babarmahal, Kathmandu, Nepal. The event is Supported By Laba Pvt Ltd, Broadway Infosys Nepal, and Nepal Telecom Training Center Babarmahal, Kathmandu.
Thanks to Founder President at npCert (Information Security Response Team Nepal) Mr. Chiranjibi Adhikari
npcert.org
csrinepal.org
onecovernepal.com
npCert Initiatives in Nepal (Nepal Computer Emergency Response Team)OneCoverNepal
Information Security Response Team Nepal (NPCERT)
Cyber Security in Nepal
Promote security awareness across industry, academia & public sector
Research and analysis of cyber security incidents
Gather and disseminate technical information on cyber security.
Information Security Response Team Nepal, fondly known as npCert, is a team of Information Security experts unite together to address the urgent need for the protection of national information and growing cyber security threat in Nepal.
Established in 2016, npCert has been playing active role as the Nation’s flagship cyber defense, incident response, and operational integration center.
Objectives:
The main objectives of npCert are:
To provide cybersecurity incident responses.
To promote cyber security situational awareness across industry, academia, and the public sector.
To support critical national infrastructure companies to handle cyber security incidents.
To provide research and analysis of cyber security incidents.
To gather and disseminate technical information on cyber security incidents, vulnerabilities, security fixes and other security information as well as issue alerts and warnings.
To coordinate with other domestic and international Information Security Response Teams and related organizations.
https://npcert.org/about-us/
The Alliance for Integrity is a multi-stakeholder initiative that promotes transparency and integrity in business. It fosters collaboration between private sector, government, civil society and academia. The Alliance operates hubs in several regions and countries that conduct peer learning, public-private dialogue, and capacity building programs. In Indonesia, the Alliance's advisory group includes companies and organizations that lead working groups on awareness raising and training. The Alliance has trained over 100 trainers and 675 small- and medium-sized enterprises on anti-corruption practices through its "From Business to Business" program.
This document discusses four citizen data initiatives in Nepal: Nepal Monitor, Hamro Police App, Open Mic, and Quake Helpdesk. Nepal Monitor collects reports of human rights incidents and maps them on its website to help connect victims to support organizations. Hamro Police App allows citizens to report issues to the police and track response times. Open Mic gives citizens a platform to share their views on political issues. Quake Helpdesk collected data on earthquake damage and relief needs to help coordinate the response effort. The initiatives aim to empower citizens, improve government services, and support disaster response through transparent sharing of citizen-generated information.
Nutshell - GCNI Tri Annual Newsletter April - July 2016 GlobalCompact
Global Compact Network India (GCNI) held several events focused on advancing sustainable development goals between April and July 2016. This included a 4th National CSR Summit on education for persons with special needs, a meeting on developing an industrial water index, and an event on elder abuse awareness. GCNI also collaborated with various organizations on workshops covering healthcare, livelihoods, and creating age-friendly communities. The newsletter provides details on these events and discusses GCNI's activities and plans to engage businesses, NGOs, governments and academics on sustainability issues going forward.
This document provides guidelines for creating awareness materials about online safety for children, parents, educators, and the general public. It acknowledges the growing concerns around child online safety and the need to inform stakeholders about potential risks and how to reduce them. The document outlines principles, checklists, and standard content that awareness materials should contain, including opportunities and threats of the internet, how to be safe online, how to report issues and seek help, and audience-specific information for children, parents, teachers, and others. It emphasizes the need for effective reporting mechanisms and support services to help translate increased awareness into improved online safety for children.
Training Manual for Youth Social Media Advocates YouthHubAfrica
YouthHubAfrica (YHA) to expand its reach to young Nigerians who are existing social media influencers and empower them with requisite skills and resources that will help them share information with other young persons within their communities and their social networks both online and offline.
The Youth Social Media Advocates (YSMA) program will build a community of young advocates who will use social media as an effective tool and strategy to raise awareness, share impact stories, and connect with relevant stakeholders to drive social change solely within the UNFPA Nigeria areas of works.
Isaean 2012 cbo training module on networking and advocacyclac.cab
This document provides an introduction and overview of a training module on networking and advocacy for local community-based organizations (CBOs) developed by ISEAN (Insular Southeast Asia Network) and its partner Hivos Foundation. The module was created to build the capacity of CBOs in Indonesia, Malaysia, Philippines, and Timor-Leste to conduct effective advocacy and networking activities. It acknowledges existing advocacy resources but was tailored specifically for CBO contexts in Southeast Asia. The training module covers topics such as defining advocacy, the purpose and benefits of advocacy, developing advocacy strategies and action plans, and building and sustaining networks. It aims to empower local communities and improve policies, services, and environments affecting those living with and impacted
NutShell – GCNI Tri-annual Newsletter Aug 2014 – Nov 2014GlobalCompact
The document summarizes a newsletter published by the Global Compact Network India (GCNI). It discusses the launch of GCNI's new initiative called the "Cross-Over Series" in Bengaluru, India. The series is aimed at promoting networking, knowledge exchange, and policy advocacy around the UN Global Compact principles. It also discusses subsequent events in the series held in other Indian cities on topics like the role of corporate social responsibility in education. The newsletter provides details on the objectives, participants, and key discussions at these events. It also summarizes GCNI's other activities in the period like engaging with academic institutions and launching an Asia-Pacific resource center on responsible business practices.
Track 2 progress report 2015-2016 Pulse Lab KampalaUN Global Pulse
Pulse Lab Kampala is a data innovation lab run by UN Global Pulse, and was established as an inter-agency initiative under the management of the United Nations Resident Coordinator in Uganda. The Lab contributes to the United Nations ‘Delivering as One’ approach while also serving as Global Pulse’s regional innovation hub for Africa.
Roundtable with the Communication 4 Development NetworkResearch to Action
The C4D Network joined Research to Action on the 27 July to discuss the findings of their mapping of the C4D landscape conducted in 2016. The mapping covered over 50 countries across the world.
Internews/IDA Media Survey Findings_Nepal pdf Madhu Acharya
Internews and IDA conducted National Opinion Polls Wave III in September 2014. This presentation covers the media survey findings. An updated version of the survey finding will be shares first week of January 2015.
Lessons learned from Capacity Building on International Cyber Norms in Southe...Benjamin Ang
Capacity building is recognized as a key to promote the adoption and implementation of international norms of responsible state behaviour in cyberspace. States at varying levels of cyber maturity benefit from these efforts, to develop a shared understanding of how international cyber norms support the stability of cyberspace, and to grow their own capacity and capabilities to implement these norms. This presentation draws on the experiences of the academics and practitioners who have been conducting cyber capacity building activities in southeast Asia and beyond, to derive lessons of what has (or has not) worked, some potential best practices, and to provide suggestions on how cyber capacity building can provide more value to the further growth of international cyber norms in the world.
UNGGE 2015 Cyber Norms
UN Open Ended Working Group (UN OEWG)
UN Singapore Cyber Programme (UNSCP)
Norms Implementation Checklist
RAP Matrix
ASEAN Ministers Cyber Conference (AMCC)
Capacity building
Confidence Building Measures (CBMs)
Effective planning an online advertising campaignParikshit Hore
In this thesis I will concentrate on analyzing an online campaign of BJP for promoting Naredra Modi as an PM from mission 272 .This campaign name is “Namo”. The campaign is launched in the Gadhi Nager region as a part of a larger advertising campaign and is visible in all India during Gujarat election in 2013.The focus for this thesis is to identify key stages in planning and executing by analyzing this particular online campaign. My intention is to establish how the research and Statistic conducted for the campaign impacted the planning and execution process that in the end lead to the online campaign. With the help of the marketing and advertisement theory and my qualitative studies, I hope to identify if there is an established process for online campaign planning and execution on a high level. At the same time this study will serve as a presentation of the online campaign assets and as a handbook for planning and executing a substantial online campaign.
The Ministry of Communication and Information of Indonesia launched the #BijakLiterasiDigital campaign along with ICT Watch and WhatsApp to educate the public on digital literacy, privacy, security, and identifying misinformation like COVID-19 hoaxes. The campaign includes online seminars and workshops, classes, an anti-hoax youth movement, and video/podcast series to help people safely benefit from the internet. It aims to reach 12.5 million Indonesians across 514 districts/cities to create a productive, healthy and safe digital environment through improving digital skills at basic, intermediate and advanced levels.
Digital Security Resources for Media Trainers!Robert Kodingo
This document provides acknowledgements and thanks to the individuals and organizations involved in creating training materials on digital security for media professionals. It recognizes Manisha Aryal and Dylan Jones for writing and organizing the curriculum. It also thanks those who provided feedback and testing, including experts from Google, Clemson University, and digital rights organizations. The document notes that the training materials were field tested in Kenya in 2013 and thanks the organizations and individuals involved in planning and supporting that workshop. It acknowledges funding support from the US Department of State, MacArthur Foundation, and Google to create the toolkit.
The draft Inclusive Mobility Action Plan was presented as the result of consultative workshops with stakeholders. It aims to make Metro Manila's transport system more inclusive and serve all residents, especially the poor and vulnerable. The plan envisions safe, accessible transport through public-private-community partnerships across mobility, safety, productivity and civility. Key initiatives identified for the next year include finalizing the action plan, improving the network's online presence, developing educational materials, and expanding membership.
Similar to Cyber Security of Nepal - Press Release (20)
3. 1st General Meeting - Press Release
• Cyber Security 1st Initiative Meeting in Nepal - Dr. Ram Hari Subedi in cyber security welcomed all the participants. The
meeting commenced with introduction of each personnel involved. Dr. Subedi provided an overview about the “Cyber
Security Awareness Campaign”. He informed the participants about the modality in which the campaign is to be
conducted. During this briefing session he outlined the situation of cyber-security in Nepal as well as on the global
scale.
• He focused on making the campaign as effective as possible. With mobilization of every stakeholder like government
bodies, education institution and also with the support Non-Resident Nepali (NRN) the campaign can be held on a wide
scale covering maximum audience. He also pointed out the need of a compact team of IT experts and professionals,
who can smoothly convey the true knowledge of the campaign to the audience.
• Dr. Subedi, deliver a brief presentation on Cyber Security in the context of the world providing true facts and figures,
findings and real example. He gave a short description on today’s E-Generation and the impacts the Internet has made
on the daily lifestyle of the people. As being a former employee of National Aeronautics and Space Administration
(NASA), he shared his valuable experience about the way cyber security proceedings are carried out in the USA.
• Mr. Shankar Pd. Sharma, Head CSIT in Texas International College gave a presentation on the modality of running the
campaign. In USA, the month of October is celebrated as National Cyber Security Awareness month. Mr. Sharma
proposed a similar initiative to be started in Nepal as well. He proposed to operate the campaign by dividing it into
three specific parts: Friends of the Campaign, Cyber Awareness Coalition and Cyber Citizen Forum.
• He urged the need to involve every individual or institution associated with cyber security in the campaign. Nepal
Police, government agencies, education institutions etc. are some of them. Similarly, he highlighted the need to form a
coalition of a strong team to tackle the threats in the cyberspace in the context of Nepal. Mr. Sharma also outlined the
need of a comprehensive research on cyber security in Nepal, which can prove helpful to any party desiring to study on
the topic or start any new initiative.
• Mr. Chiranjibi Adhikari, Operations Manager at Nepal Certifying Company gave a brief presentation on E-Governance
pointing out its position in Nepal and highlighting its advantages and disadvantages and also showcased some of its
shortcoming in the context of Nepal.
5. 2nd General Meeting – Press Release
• The second general meeting of Cyber Security Initiative was held on 27th May, 2016 at Kantipur City College,
Putalisadak. The meet was chaired by Dr. Ramhari Subedi.
In Cyber Security with Mr. Bikram Khadka, Mr. Bikash Neupane and Mr. Chiranjibi Adhikari among the other
participants. The meet was focused on the basic presentation to be given to the audience during the Cyber
Security Seminar.
The meeting started with Mr. Khadka presenting the logo for the campaign and moved ahead with his
presentation on ethical hacking. He provided useful information about ethical hacking with convenient insights
about hacking, virus and various terminologies in ethical hacking.
Later on, Mr. Neupane presented on Social Media Awareness. He provided a short background on the scenario of
social media on the global context. He presented some interesting facts and figures about social media; mainly
focusing on Facebook.
Mr. Chiranjibi Adhikari demonstrated on the basics of computer. His presentation was more practical and
informative.
Lastly, Dr. Ramhari Subedi spoke on developing cyber security framework in Nepal. He demonstrated a conceptual
groundwork about the cyber security campaign. He proposed a common presentation for every trainer which
would have excerpts from each of their respective presentations.
Program Sponsored by
Prem Bhandari - Civil Engineer / CEO of AMA Engineering, Virginia USA
Anil Pandey - CEO of www.motherlandnepal.org,
Honorary PRR of NTB, California USA
7. 3rd General Meeting - Press Release
• SSP Serbendra Khanal, Dr. Ramahari Subedi and his team proposed a work with Nepal Police in an effort to make
awareness campaign successful in Nepal.
• The third general meeting of Cyber Security International Nepal was held on 31st May, 2016 at Texas International
College, Chabahil. Dr. RamhariSubedi in Cyber Security chaired the meeting. All the members of the CSI Nepal
were present during the meeting. Mr. Nirmal Sharma, renowned actor of Nepal also participated in the meeting.
• Mr. Laxman Bhattarai began the meet with his presentation on Web Security, Web Sense and Data Backup. The
information he provided during his presentation were very useful in making users aware about the true
importance of web security and data backup.
• Er. Kumar Pudasaini then delivered his presentation on Prospects and Challenges of Information Security in BFIs.
He presented various facts and figures about the importance of data security. He highlighted the need to make
data security a major priority, stating that ignorance in this matter can lead to serious consequences. Er. Pudasaini
said that, “Information security must be treated as process not a product, it must be taken as something that is to
be done by ourselves not something to be bought.”
• Then Mr. Nirmal Sharma, a familiar face from the film industry shared his experience of being part of the team to
raise awareness about cyber security. Mr. Sharma said, “It is a pleasure to be part of such an effort and getting to
know new aspect about cyberspace.” He expressed his willingness to contribute to the campaign any possible way
and assured to help spread the campaign to the general public.
• SSP Sarbendra Khanal from Nepal Police also joined the meeting later on. He shared his experience of dealing with
real cases of cybercrime. He said, “In Nepal cybercrime has become a huge problem and majority of those
problem has occurred due to lack of awareness among the users. So, as our resources to deal with cybercrime are
limited and the only way we can deal with this issue for the time being is through spreading awareness.”
• Dr. Ramahari Subedi proposed a collaboration with Nepal Police in an effort to make this campaign spread
nationwide to which SSP Khanal responded positively saying Nepal Police is ready to provide all kinds of assistance
possible through its resources to this campaign.
• This program was sponsored by Prem Bhandari and Anil Pandey from the USA
9. Meeting with Crime Investigation Department of Nepal Police AIG Bigyan Raj Sharma
• Location: Nepal Police Headquarter, Naxal
• Time: 12.30 PM local time, June 3rd 2016
• Agenda:
• Submitting a draft of the proposal for support from Nepal Police
• Submitting a draft of Memorandum of Understanding (MoU) to be done between CSI Nepal and Nepal Police.
• Discussion about making the cyber security awareness program a sucees and possible help from Nepal Police.
• Note:
• Cyber Security International Nepal team held a meeting with AIG Bigyan Raj Sharma of Nepal Police at Police
Headquarter Naxal.
• The primary objective of the meeting was to submit a draft of proposal for support from Nepal Police for the
awareness program and the MoU for any kind of support from Nepal Police. AIG Sharma asked certain time to
study the proposal and MoU before moving ahead with making any kind of agreement.
• AIG Sharma admired the initiative by CSI Nepal to run an awareness campaign on cyber security. He assured to
provide any possible logistical support necessary for the programs and a special session by a representative of
Nepal Police to speak from the legal and practical aspects of cybercrime.
• He also asked the CSI Nepal team to come up with an action plan about how it will be moving ahead with its
program. He mainly focused on the need for a clear roadmap for at least a year so that enough funds could be
raised from various donors to make the programs financially sustainable. AIG Sharma also suggested a systemized
groundwork on establishing a compact organization so that these programs can be run across the country.
• CSI Team was very positive towards the encouraging advises from AIG Sharma. Dr. Ramhari Subedi expressed
commitment from the entire CSI Nepal team to build a robust organization capable of organizing effective
awareness, training sessions across the country.
11. 1st Awareness Event Gyanodhya School Kalimati – Press Release
• First CyberSecurity Awareness Campaign by CSI in Kalimati Kathmandu - Dr. Ramhari Subedi impacted the listeners positively
June 2, 2016, Cyber Security International Nepal (CSI) conducted its first awareness campaign at the premises of Gyanodaya Higher Secondary School,
Purano Kalimati , Bafal. The awareness campaign was attended by the students and teachers of Gyanodaya Higher Secondary School. The awareness
campaign was sponsored by Mr. Prem Bhandari - Civil Engineer / CEO of AMA Engineering, Virginia USA and Mr. Anil Pandey - CEO of Motherland
Nepal Organization, Honorary PRR of NTB, California USA.
It was a success with numbers of interested students and teachers who eagerly wanted to know more about the cyber security and to overcome cyber
threats and challenges. Cyber Security Awareness Campaign was started with a welcome speech by Mr. Shahasram Dahal, one of the student of
Gyanodaya Higher Secondary School.
The program was inaugurated by Dr. Ramhari Subedi, CEO, Cyber Security Institute International (CSII) and DC Nepal. With a powerful presentation on
cyber security Dr. Subedi stated the evolution of information technology and their effects on our life in positive as well as negatively. With
globalization people have been facing so many problems of hacking and phishing, virus infections and cyber terrors which can disrupt the personal as
well as professional working cycle.
And he stressed the need to work more closely together as a shared mission to safeguard computer networks from cyber-attacks, which even with
development in digital world the cyber-crimes has been growing continuously and none of the sector is safe from its threats.
Nepali cyberspace is prone to attack and Nepalese people lack awareness about cyber threats, with lack of knowledge workers and infrastructure in
related field. With real-life examples, facts and figures like- yearly loss due to cyber-attacks, mental stress and even death of people because of hacker
attacks and others Dr. Subedi impacted the listeners positively.
Mr. Chiranjibi Adhikari, CEO, ICT Frame Magazine Nepal, also remarked the basic tips of using internet and consumer protection. He said, “CSI as a
team and people like you are important assets in building a more secure access to internet, depleting the threats and overcoming the challenges of
cyber-crime.”
“We are very thankful for the opportunity to attend this awareness seminar on Cyber Security; we have been using face-book, mails and other
websites without knowing the other side of it,” mentioned by one of the student who attended the seminar. Students and teachers found this
awareness campaign to be very interesting and informative, adding that Cyber Security Awareness Campaign is helping to lead the way towards the
development of safer use of internet.
The awareness campaign was successfully concluded with the speech of Mr. Kuldeep Prasad Budhathoki, Vice-Principal, Gyanodaya Higher Secondary
School with his views on cyber-crime. He said,” It’s a great opportunity to have CSI Team here at Gyanodaya H.S. School with our students which surely
has encouraged them to get aware about threats of cyberspace and move ahead to safeguard their data.”
13. 2nd Awareness Event at Sainik School – Press Release
• Sainik Awasiya Mahabidhyalaya, Sallaghari - Dr. Ramhari Subedi brought up real life #Cyber-crime cases and incidents during his explanation.
• Participation: 295 students, June 3rd 2016.
• Overview:
2nd Cyber Security Awareness Program was successfully held at Sainik Awasiya Mahabidhyalaya, Sallaghari. The program was sponsored by Mr.Prem
Bhandari - Civil Engineer / CEO of AMA Engineering, Virginia USA and Mr. Anil Pandey - CEO of www.motherlandnepal.org, Honorary PRR of NTB,
California USA.
• About the program:
The program was organized successfully in the program hall of Sainik Awasiya Mahabidhyalaya with a very significant participant turnout of 295 students.
The school’s principal Mr. Shamim Anwar Shamim delivered the opening speech for the program. He praised the efforts of Cyber Security International
Nepal to raise awareness about cyber security threats and challenges deeming an issued not to be ignored by students.
• Mr. Biplav Man Singh, Chairman of Nepal Certifying Company was invited as special guest in the program. He discussed about the way Internet has taken
its place in our lives and the extent to which it has eased up our lifestyle. He added that though Internet has proven to be advantageous in today’s world
it also comes with a flip side. Mr. Singh cited the lack of awareness about the negative aspects of the Internet as the catalyst in ever-increasing cases of
cybercrime.
• Mr. Sahadev Chaudhari shared his views on need to be cyber-literate in today’s age. With development of the cyberspace various negative factors of it
have also come up. He referred students being most vulnerable to exploitation through the Internet and highlighted the need for such awareness.
• Dr. Ramhari Subedi then delivered an effective presentation on Developing Cyber Security Framework for Nepal.
The presentation was very informative and illustrative as Dr. Subedi brought up real life cases and incidents as well during his explanation. His inclusion of
facts and figures related to cybercrime, hacking, website compromises and so on were pretty intriguing for the students as they were able to gain new
knowledge. He also explained facets of social media and the ways in which we can secure ourselves in it.
• He termed awareness as the first line of defense and urged everyone to take cyber security threats as real issue and start keeping it in a priority list. He
outlined the present reality of people being glued to their smartphones and Internet, creating and unsocial environment and called for a change in this
situation to start from the students.
• DSP Pashupati Raya from Nepal Police Crime Investigation Bureau also took a short session with the students. He came up with more practical
implications of misuse of the cyberspace citing its consequences a culprit can face. He also presented many real cases where people have got into trouble
unknowingly. He informed that social media is the sector in which almost 90% of the cybercrime incidents take place in Nepal. So, DSP Raya urged the
students to be aware about sharing information in the social media and be careful about using the cyberspace.
• Feedback:
The students were enthusiastic throughout the program, expressing their excitement of being a part of such a program. They were quite interactive in
the program showing their agreement to various ideas and knowledge shard by the experts.
• The teachers of Computer Science in the school were also present in the program, terming it as a new, successful and very effective session in informing
students about cyber security. The college administration also expressed willingness to organize a few more sessions from CSI Nepal in the near future.
15. 3rd Awareness Event at Kantipur City College – Press Release
• CSI CyberSecurity Awareness Camp at Kantipur City College - CEO of CSI Dr. Ramhari Subedi
exposed the problems people have been suffering from cyber-attacks.
• Putalisadak, Kantipur City College: June 3, 2016, Cyber Security International (CSI) Nepal,
successfully conducted their third awareness camp on cyber security. The seminar was full of
students and teachers of Kantipur City College who early waited to hear and realize about, how
critical is the cyber-attack, virus infection, hacking and phishing.
• CEO Dr. Ramhari Subedi exposed the problems people have been suffering from cyber-attacks. He
shared how one of his colleagues has been facing the problem of his hacked facebook account just
because of one-click on unnecessary virus link that we can easily see on facebook site and other
websites too.
• The awareness camp was alive with life related practical examples, videos and voice messages of
the victim who really has been facing these cyber threats daily. CSI team coordinator Mr. Chiranjibi
Adhikari, effectively gave the participants simple tips to protect themselves while using social
media.
• Involvement of participants was high where they raised questions regarding to cyber policies and
laws our country have been and will implement for these crimes.
• The IT Head of Kantipur City College, Mr. Raju Kattel wrapped up the camp saying, “We have to
exchange information and best practices related to preventing cyber-crime and online fraud.
Everyone should be protected from online predators for this we need professionals like CSI who
really can aware us on such matter.”
• The program was sponsored by Mr. Prem Bhandari - Civil Engineer / CEO of AMA Engineering,
Virginia USA and Mr. Anil Pandey - CEO ofwww.motherlandnepal.org, Honorary PRR of NTB,
California USA.
17. Meeting with communication minister Sherdhan Rai – Press Release
• Dr. Ramhari Subedi proposed for creation of Department of CyberSecurityas a separate government wing that will
be tasked with dealing with all the issues related with cybercrime
• Minister of Information and Communication to Support CSI, Nepal
• June 4, 2016, Cyber Security International (CSI) Nepal held a meeting with Minister of Information and
Communication Mr. Sher Dhan Rai at Singha Durbar.
• Dr. Ramhari Subedi, Chairman of CSI Nepal and other team members including Mr. Nirmal Sharma, a media
personality were present during the formal meet; where he gave a brief presentation showcasing the scenarios of
lack of cyber security and the weak preparedness of Nepal to deal with massive cyber-attacks in the future.
• On behalf of the CSI Nepal team Dr. Subedi proposed for creation of Department of Cyber Security as a separate
government wing that will be tasked with dealing with all the issues related with cybercrime, developing cyber
security level and coordinating with all other government bodies to create a secure cyberspace environment in
Nepal.
• He even mentioned, “A separate government body is very essential to deal with cyber security issues as, after
being a separate institution it can freely work for education and awareness in this sector as well as prepare
necessary infrastructure and formulate or modify concerned policies.”
• CEO of ICT Frame Magazine and coordinator of CSI Nepal Mr. Chiranjibi Adhikari added that, “Nepal is yet to enter
into complete digitalization, but from the day this becomes reality we would be dealing with a huge no. of
cybercrimes as important activities enter the digital world. So, we need to be prepared with the infrastructure that
will help us fight the future catastrophe of flurry of cybercrimes.”
• Minister Rai acknowledged the requests made by the CSI Nepal team and assured to act on them. He said, “Cyber
security is a very important issue currently, and government is also aware about the need of a separate wing to
deal with it. I will move ahead with this issue in coordination with other concerned ministries and departments
and deliver fruitful results soon.”
• Mr. Shankhar Pd. Sharma, Head of CSIT of Texas International College and one of the members of CSI Nepal team
and Mr. Bharat Raj Uprety both the members of CSI Nepal team were also present in the formal meeting.
19. 4th Awareness Shi-gan’s International College – Press Release
• CSI Team with Shi-gan’s International College - Dr. Ramhari Subedi unveiled the unseen matters which impacted the
viewers to know more about the real life cyber-attacks
• The program was sponsored by Mr. Prem Bhandari - Civil Engineer / CEO of AMA Engineering, Virginia USA and Mr.
Anil Pandey - CEO ofwww.motherlandnepal.org, Honorary PRR of NTB, California USA.
• After continuous three successful awareness seminar by Cyber Security International (CSI) Nepal- June 4, 2016,
Maharajgunj, Shi-gan International College was the fourth institute with presence of Shi-gan’s students and faculty
members for Cyber Security Awareness Camp.
• It was another effective seminar where students and teachers grabbed practical as well as theoretical knowledge
regarding the safety measures and information about cyber security. CEO Dr. Ramhari Subedi along with CSI Team
including Mr. Nirmal Sharma- a media personality showcased the reality of ‘Digital World’, where the use of internet
has become another basic need of today’s people.
• Mr. Nirmal Sharma has also been facing so many problems of hacking and virus infections while using social sites. He
said, “It’s good to see friend requests and chat online but there’s another world where those requests and chats can
be the curse.” He delivered his interests on CSI and how important this awareness camp is for every user who carry
cell phones and use internet.
With facts and figures, victim’s messages and voice mails, Dr. Subedi unveiled the unseen matters which impacted
the viewers to know more about the real life cyber-attacks; people actually have been facing and asking help for.
• Mr. Bharat Raj Upreeti, one of the team members of CSI expressed the importance of the seminar and why CSI as a
team is giving their full effort to aware local people; who surely in the future have to deal with cyber-attacks and
threats.
• Miss. Rima Kumari Mukhiya, Head of Microbiology Department with a speech concluded the awareness camp. Miss.
Mukhiya said, “The awareness camp like these are what Nepalese people actually need in the current scenario
because so many of us has been trapped in similar cyber related threats, We are very thankful to CSI Team for
choosing our college for the delivery of such real life problems which indeed has awaked us. We surely have to move
ahead as a team to deplete such cyber-challenges”
•
21. 5th Cyber Security Awareness Session at Texas International College – Press Release
• June 5, 2016 - Cyber Security Awareness Session at Texas International College - Dr. Ramhari Subedi
highlighted protection of sensitive information, as with development in technology
• The program was sponsored by Mr. Prem Bhandari - Civil Engineer / CEO of AMA Engineering,
Virginia USA and Mr. Anil Pandey - CEO of www.motherlandnepal.org, Honorary PRR of NTB,
California USA.
• A session about #cybersecurity awareness was held at Texas International College by Cyber Security
International (CSI) Nepal. This is another successful event organized by CSI Nepal team in its bid to
raise awareness about cyber security in Nepal.
• Dr. RamhariSubedi, Chairman of CSI Nepal delivered the main presentation on cyber security: its
situation, future scenario and preventive measures.
• Through his presentation Dr. Subedi talked about various topics related to the cyberspace such as:
phising, identity theft, online payment system and so on. He shed light on the growing hacking
trend with the growth in digitization of information across the globe.
• He said, “The main focus of cybersecurity is protection of sensitive information, as with
development in technology our lives are being more dependent on it, making us prone to more
cyber-attacks than ever. So, we need to take cyber threats as a serious and real threat and move
forward to preventing it.”
• The participants were patient and attentive during the whole session, acknowledging the issue of
cyber security and the need to move forward to help prevent it.
• Mr. Shankar Pd. Sharma, Head of CSIT at the college and a member of CSI Nepal team winded up
the meet with his view on cyber security in Nepal. he said, “ Cyber threat is a very serious and real
threat which must be dealt collectively as in the future when Nepal moves into full digital phase,
this threat may get worse than now.”
23. 6th Cyber Awareness for SLC students Chabhil, Kathmandu – Press Release
• Cyber Awareness for SLC students - program was conducted under the leadership of Dr. Ramhari
Subedi and coordination of Mr. Chiranjibi Adhikari.
• 8th June, 2016: Cyber Security International Nepal held its 6th awareness campaign at Chabahil.
The students who just gave SLC examinations were the primary target group of this program. The
number of participants in the program was very encouraging as they all were pretty enthusiastic
and participative during the whole period.
• The awareness campaign was sponsored by Mr. Prem Bhandari - Civil Engineer / CEO of AMA
Engineering, Virginia USA and Mr. Anil Pandey - CEO of Motherland Nepal Organization, Honorary
PRR of NTB, California USA.
• Mr. Chiranjibi Adhikari, CRO of ICT Frame and Operation Manager at Nepal Certifying Company
delivered an informative and valuable presentation. He provided insights about cyber security and
cyber policy and procedures in Nepal which were very useful for the students.
• Mr. Pradeep Thapa, Marketing Officer of McAfee Antivirus in Nepal was present as a guest speaker.
He explained the students about the efforts of McAfee in minimizing cyber threats and the
importance of gaining knowledge about such threats.
• Mr. Bikram Khadka, CEO of Black Hawk was another speaker in the program. He provided very
useful information about a possible career path in IT sector. Since, the importance and scope of
cyber security is every growing these days, he said that students pursuing career in this sector can
create a good career as well as contribute in building the cyber security in the country.
• On the backdrop of growing cyber threats in Nepal especially through the social media, the
speakers also gave various suggestions and tips about the proper use of social media so that they
don’t fall victim to any kind of cyber crimes.
• The program was conducted under the leadership of Dr. Ramhari Subedi and coordination of Mr.
Chiranjibi Adhikari.
24. 7th Cyber Security Awareness at NCIT College by Cyber Security International
25. 7th Cyber Security Awareness at NCIT College by CSI – Press Release
• June 10th 2016 - Cyber Security International (CSI) Nepal successfully concluded its awareness
program at NCIT College, Balkumari. This was the 7th session in a school/college by CSI Nepal which is
dedicated in raising awareness about cyber security in Nepal. Er. Kumar Pudasiani and Mr.
ChiranjibiAdhikari, both members of the CSI Nepal team delivered a joint presentation.
• The awareness campaign was sponsored by Mr. Prem Bhandari - Civil Engineer /CEO of AMA
Engineering, Virginia USA and Mr. Anil Pandey - CEO of MotherlandNepal Organization, Honorary PRR
of NTB, California USA.
• Er. Kumar Pudasaini started the program with the presentation on Cyber Security and its challenges.
Er. Pudasaini stressed on the need to be prepared and secured to deal with the new threats emerging
daily and also pointed out the capacity of novice attackers to carryout sophisticated attacks
highlighting the need to take the cyber threats more seriously. He specifically focused on the need for
large organizations to increase investments in securing the information to deal with such threats.
• Mr. ChiranjibiAdhikari then continued the presentation with valuable information and tips to stay safe
from growing malware threat across the cyber space. He said that being an IT expert does not make
one safe from these threats as they too are likely to fall victim to cybercrimes. Mr. Adhikari too
stressed on the need for top level management to be serious about these cyber threats and take
decisions to secure their organizations.
• Both the speakers urged the present IT professionals to be aware about the legal aspects of
cybercrime and know the arrangements made in the Electronic Transaction Act. There know-how
may be useful in tackling these problems and also picking out possible loopholes or the weaknesses
of the policies.
• The program was a very effective one as the participants present were IT professional pursuing their
under-graduate and graduate degrees from the college, who were the direct stakeholders of cyber
security problem. After the conclusion of the presentation they raised many crucial questions about
cyber security like the ethics of large corporate houses in IT to spread these awareness among the
customers. The program was conducted under the leadership of Dr. Ramhari Subedi and coordination
of Mr. Chiranjibi Adhikari.
27. 8th cyber security awareness at Khwopa Engineering College – Press Release
• June 11, 2016 - CSI Nepal completed its 8th awareness program at Khwopa Engineering College,
Bhaktapur which is one of the prominent engineering education institutions in Nepal. The present
participants were students of computer engineering from the college. Er. Kumar Pudasaini and Mr.
Chiranjibi Adhikari spoke on the issues, challenges and possible remedies for cyber security in
Nepal.
• Er. Kumar Pudasaini started the presentation with a small intro about IT evolution with subsequent
explanation about development in capabilities of attackers to carryout complicated attacks with
few knowledge and resources. Today the main threat of information breach is from internal
stakeholders rather from hackers or cyber terrorist so organizations must simultaneously improve
their defenses against these threats and general public increase their knowledge about possible
cyber threats.
• Continuing the presentation Mr. Chiranjibi Adhikari spoke on topics such as malware, ransomware,
network security and need for awareness programs like this. Since, social media is the major source
of cybercrimes in Nepal, he highlighted the need to be aware about what should/should not be
share in it. One must be aware about the possible consequences about ignoring these measures.
• The participants were very excited to present in the session and requested to be part of this effort
by CSI Nepal team to spread awareness across Nepal. Most of them stressed on the need to take
this type of program to school level, rural area where these problems are high in frequency.
• The awareness campaign was sponsored by Mr. Prem Bhandari - Civil Engineer /CEO of AMA
Engineering, Virginia USA and Mr. Anil Pandey - CEO of Motherland Nepal Organization, Honorary
PRR of NTB, California USA.
• The program was conducted under the leadership of Dr. Ramhari Subedi and coordination of Mr.
Chiranjibi Adhikari.
28. An Affordable Security Architecture for Many Small and Medium Size
Organizations in Nepal