SlideShare a Scribd company logo
Cyber Security
The Service Providers Perspective
By: Samit Jana , ISPAN
30th Jan 2019
.
Cyber Security Practices and Future Plan:
Real Scenario in ISPs
ISPAN: An Introduction
• Internet Service Provider Associations of
Nepal, Established in 1998
• Mission to Develop and Provide Affordable
Internet for everyone in Nepal
• Promote and Protect interest of ISP and ICT
industry as whole
• Works closely with NTA, MOIC, NEA, NDCL,
CAN, NPIX and various other agencies in ICT
for the development of Internet in Nepal
• 15 officially Members Organization , 100+
unofficially
Telecom Sector
Statistics:
122 registered
ISPs ~30 active
6 Licensed Mobile
Operators
3 active
6 Commercial
Datacenters in
operations
38 Millions Mobile
Subscribers
1Million Fixed
Broadband
Connections
700,000 FTTH
connections
210,000 ADSL
connections
55,000 Fixed
Wireless
connections
50,000 Cable
DOCSIS
2.5 Million Digital
TV
300,000 IPTV
Fastest Fixed
Broadband and
Growth in the
Region
One of the
Cheapest Fixed
Broadband in the
World
Google &
Facebook makes
70% of the
Internet Traffic
Our Internet Connectivity to the
outside World:
Kathmandu
Tanakpur Bhairawa Birgunj Dhalkebar Duhabi
Rasuwagadi Tatopani
How we are connected to the
Internet?
Other
ISP/Telecom
Internet out side Nepal
BNG
Router
Mobile
Gateway
Packet Core
Routers
Application
Servers
OLT/DSLAM
Cell Site
Router
Mobile/Wireless
Base Station
Teleport/Headend
Network
Service Provider
End Users
Primary Focus of
Service Providers:
• Build Infrastructure for enabling
connectivity
• Focus more on accessibility and
affordablity
• Increase Service Relialbility
Why are we concerned about Cyber Security
today?
• We are Late
• Internet Protocal was not designed for open
nature network
• TCP/IP developed by ARPANET for Military
Communciation in Secured environment
• Basic design criteria: stablity not security
• Took almost 20yrs to become Public and Open
• Unimaginable growth
• Speed, Reach, Affordablity Triumped
Security..!
What does Service Providers do?
• Own Infrastructure:
• Implements Best Common Security Practices (BCP)
• Analyze Traffic and Flows to detect and mitigate DDOS
• Manages Firewall/UTM
• For Government:
• Stores Subscribers Internet Lots: AAA, CGNAT, DNS &
Web for digital forensic
• Few Enable v6 – Helpful for forensic but v6 security still
remains a concern
• Block Domain Name and IP address upon request
• For End Users:
• Some provides per DNS based security services in the
Internet and Email Security
• Provides Router, Firewall, IDS, IPS to Enterprise as
managed service
• Awareness programs
Service Providers Dilemma:
• Build Infrastructure focusing on enabling
connectivity or security ?
• Focus more on network accessibility and service
affordablity or security ?
• How to Store and Analyze the massive amount logs
and graphs data with minimal invesment?
• Are we responsible to sniff and analyze user’s
traffic ?
• Can we do content filtering?
• Traffic Survelliance and Security may degrade
network performance?
• Most of the ISPs are already struggling due to high
infrastructure capex/opex but low ARPU and stiff
competition , can I afford to spend more on security
now?
What can Service
Providers do ?
• Collaborate and Facilitate :
• Government on Cyber Security Act and
Policy formulation
• Cyber Security Awareness Programs
• Implement and recommend security
BCP for end users and organizations
• Sharing operational knowledge and
Threat Analysis
• In Digital Forensic helping law
enforcement agencies , CERT or SoC
• Becoming major stakeholders to
strengthen National Cyber Security
situation
• To find the right balance between:
• Security vs Ease of Use
• Security Cost vs Network/Application
Performance
Cyber Security is Best Effort.
It is everyone’s responsibility !
-From Internet

More Related Content

What's hot

ARM 7: ROA session
ARM 7: ROA sessionARM 7: ROA session
ARM 7: ROA session
APNIC
 
Cybersecurity response in the Pacific
Cybersecurity response in the PacificCybersecurity response in the Pacific
Cybersecurity response in the Pacific
APNIC
 
Strenthening Critical Internet Infrastructure
Strenthening Critical Internet InfrastructureStrenthening Critical Internet Infrastructure
Strenthening Critical Internet Infrastructure
Francis Amaning
 
Connecting the next billions
Connecting the next billionsConnecting the next billions
Connecting the next billions
APNIC
 
APNIC Update - MMNOG 2017
APNIC Update - MMNOG 2017APNIC Update - MMNOG 2017
APNIC Update - MMNOG 2017
APNIC
 
Internet infrastructure in South Asia
Internet infrastructure in South AsiaInternet infrastructure in South Asia
Internet infrastructure in South Asia
APNIC
 
What is APNIC: Infotel 2014
What is APNIC: Infotel 2014What is APNIC: Infotel 2014
What is APNIC: Infotel 2014
APNIC
 
APNIC Update for ARIN 35
APNIC Update for ARIN 35APNIC Update for ARIN 35
APNIC Update for ARIN 35
APNIC
 
MMNOG: Internet infrastructure comparisons in the Asia Pacific
MMNOG: Internet infrastructure comparisons in the Asia Pacific MMNOG: Internet infrastructure comparisons in the Asia Pacific
MMNOG: Internet infrastructure comparisons in the Asia Pacific
APNIC
 
AFRINIC 24 - APNIC Update
AFRINIC 24 - APNIC UpdateAFRINIC 24 - APNIC Update
AFRINIC 24 - APNIC Update
Robbie Mitchell
 
APNIC Update, APEC TEL 54
APNIC Update, APEC TEL 54APNIC Update, APEC TEL 54
APNIC Update, APEC TEL 54
APNIC
 
Stockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
Stockholm Internet Forum 2017: Development of CERTs in the Asia PacificStockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
Stockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
APNIC
 
ION Sri Lanka - IPv6 Deployment Update
ION Sri Lanka - IPv6 Deployment UpdateION Sri Lanka - IPv6 Deployment Update
ION Sri Lanka - IPv6 Deployment Update
Deploy360 Programme (Internet Society)
 
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategiesJisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
Jisc
 
Preparing healthcare networks for mobility, digitalization and IoT
Preparing healthcare networks for mobility, digitalization and IoTPreparing healthcare networks for mobility, digitalization and IoT
Preparing healthcare networks for mobility, digitalization and IoT
Alcatel-Lucent Enterprise
 
Apnic update-btnog1-sc
Apnic update-btnog1-scApnic update-btnog1-sc
Apnic update-btnog1-sc
APNIC
 
PCTA 2019: How to obtain Internet resources to join the IXP
PCTA 2019: How to obtain Internet resources to join the IXPPCTA 2019: How to obtain Internet resources to join the IXP
PCTA 2019: How to obtain Internet resources to join the IXP
APNIC
 
IPv6 Adoption by ASEAN Government Agencies
IPv6 Adoption by ASEAN Government AgenciesIPv6 Adoption by ASEAN Government Agencies
IPv6 Adoption by ASEAN Government Agencies
APNIC
 
CommuniCast 2014: APNIC Services Update
CommuniCast 2014: APNIC Services Update CommuniCast 2014: APNIC Services Update
CommuniCast 2014: APNIC Services Update
APNIC
 
Hfd media network fastershire june 2013
Hfd media network fastershire   june 2013Hfd media network fastershire   june 2013
Hfd media network fastershire june 2013Natalie Sadler
 

What's hot (20)

ARM 7: ROA session
ARM 7: ROA sessionARM 7: ROA session
ARM 7: ROA session
 
Cybersecurity response in the Pacific
Cybersecurity response in the PacificCybersecurity response in the Pacific
Cybersecurity response in the Pacific
 
Strenthening Critical Internet Infrastructure
Strenthening Critical Internet InfrastructureStrenthening Critical Internet Infrastructure
Strenthening Critical Internet Infrastructure
 
Connecting the next billions
Connecting the next billionsConnecting the next billions
Connecting the next billions
 
APNIC Update - MMNOG 2017
APNIC Update - MMNOG 2017APNIC Update - MMNOG 2017
APNIC Update - MMNOG 2017
 
Internet infrastructure in South Asia
Internet infrastructure in South AsiaInternet infrastructure in South Asia
Internet infrastructure in South Asia
 
What is APNIC: Infotel 2014
What is APNIC: Infotel 2014What is APNIC: Infotel 2014
What is APNIC: Infotel 2014
 
APNIC Update for ARIN 35
APNIC Update for ARIN 35APNIC Update for ARIN 35
APNIC Update for ARIN 35
 
MMNOG: Internet infrastructure comparisons in the Asia Pacific
MMNOG: Internet infrastructure comparisons in the Asia Pacific MMNOG: Internet infrastructure comparisons in the Asia Pacific
MMNOG: Internet infrastructure comparisons in the Asia Pacific
 
AFRINIC 24 - APNIC Update
AFRINIC 24 - APNIC UpdateAFRINIC 24 - APNIC Update
AFRINIC 24 - APNIC Update
 
APNIC Update, APEC TEL 54
APNIC Update, APEC TEL 54APNIC Update, APEC TEL 54
APNIC Update, APEC TEL 54
 
Stockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
Stockholm Internet Forum 2017: Development of CERTs in the Asia PacificStockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
Stockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
 
ION Sri Lanka - IPv6 Deployment Update
ION Sri Lanka - IPv6 Deployment UpdateION Sri Lanka - IPv6 Deployment Update
ION Sri Lanka - IPv6 Deployment Update
 
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategiesJisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
 
Preparing healthcare networks for mobility, digitalization and IoT
Preparing healthcare networks for mobility, digitalization and IoTPreparing healthcare networks for mobility, digitalization and IoT
Preparing healthcare networks for mobility, digitalization and IoT
 
Apnic update-btnog1-sc
Apnic update-btnog1-scApnic update-btnog1-sc
Apnic update-btnog1-sc
 
PCTA 2019: How to obtain Internet resources to join the IXP
PCTA 2019: How to obtain Internet resources to join the IXPPCTA 2019: How to obtain Internet resources to join the IXP
PCTA 2019: How to obtain Internet resources to join the IXP
 
IPv6 Adoption by ASEAN Government Agencies
IPv6 Adoption by ASEAN Government AgenciesIPv6 Adoption by ASEAN Government Agencies
IPv6 Adoption by ASEAN Government Agencies
 
CommuniCast 2014: APNIC Services Update
CommuniCast 2014: APNIC Services Update CommuniCast 2014: APNIC Services Update
CommuniCast 2014: APNIC Services Update
 
Hfd media network fastershire june 2013
Hfd media network fastershire   june 2013Hfd media network fastershire   june 2013
Hfd media network fastershire june 2013
 

Similar to Cyber Security Practices and Future Plan: Real Scenario in ISPs In Nepal

23. NECS 2016 _ Digital Connectivity_ Mr. Anupam Agarwal
23. NECS 2016 _ Digital Connectivity_ Mr. Anupam Agarwal23. NECS 2016 _ Digital Connectivity_ Mr. Anupam Agarwal
23. NECS 2016 _ Digital Connectivity_ Mr. Anupam Agarwal
FICCINorthEast
 
Internet infrastruture development in the asia pacific
Internet infrastruture development in the asia pacificInternet infrastruture development in the asia pacific
Internet infrastruture development in the asia pacific
APNIC
 
2015 i cdn_cloud_vypa_services
2015 i cdn_cloud_vypa_services2015 i cdn_cloud_vypa_services
2015 i cdn_cloud_vypa_services
netstairs
 
Lao ICT Expo 2019: Your IP, Your Network
Lao ICT Expo 2019: Your IP, Your NetworkLao ICT Expo 2019: Your IP, Your Network
Lao ICT Expo 2019: Your IP, Your Network
APNIC
 
NetIX Moving Traffic to the Expressway 2016
NetIX Moving Traffic to the Expressway 2016NetIX Moving Traffic to the Expressway 2016
NetIX Moving Traffic to the Expressway 2016
Yana Filipova
 
Venturefest Launch Event - PM Session
Venturefest Launch Event - PM SessionVenturefest Launch Event - PM Session
Venturefest Launch Event - PM Session
Venturefest Bristol and Bath
 
Internet Economics: Urban and Rural perspectives
Internet Economics: Urban and Rural perspectivesInternet Economics: Urban and Rural perspectives
Internet Economics: Urban and Rural perspectives
Sayeef Rahman
 
BICS empowers predictive analytics and customer centricity with a Hadoop base...
BICS empowers predictive analytics and customer centricity with a Hadoop base...BICS empowers predictive analytics and customer centricity with a Hadoop base...
BICS empowers predictive analytics and customer centricity with a Hadoop base...
DataWorks Summit
 
BCN (Nigeria) strategies to promote broadband & digitization
BCN (Nigeria) strategies to promote broadband & digitization BCN (Nigeria) strategies to promote broadband & digitization
BCN (Nigeria) strategies to promote broadband & digitization
Myles Freedman
 
ISP business plan
ISP business plan ISP business plan
ISP business plan
ontor omi
 
inspiration day_linkedin.pdf
inspiration day_linkedin.pdfinspiration day_linkedin.pdf
inspiration day_linkedin.pdf
Stijn Vander Plaetse
 
IOT, It's the Internet...only bigger
IOT, It's the Internet...only biggerIOT, It's the Internet...only bigger
IOT, It's the Internet...only bigger
APNIC
 
Driving Networks Forward to the Hyper-Connected World
Driving Networks Forward to the Hyper-Connected WorldDriving Networks Forward to the Hyper-Connected World
Driving Networks Forward to the Hyper-Connected World
QuEST Forum
 
Ihan tech check 2020
Ihan tech check 2020Ihan tech check 2020
Ihan tech check 2020
Sitra / Hyvinvointi
 
Presentation on adoption of cloud and outsourced services
Presentation on adoption of cloud and outsourced servicesPresentation on adoption of cloud and outsourced services
Presentation on adoption of cloud and outsourced services
Justin Thomas
 
Napoleon - C Squared.pdf
Napoleon - C Squared.pdfNapoleon - C Squared.pdf
Napoleon - C Squared.pdf
Adrian Hall
 
Lao ICT Expo 2018: Introduction to the Internet and APNIC
Lao ICT Expo 2018: Introduction to the Internet and APNICLao ICT Expo 2018: Introduction to the Internet and APNIC
Lao ICT Expo 2018: Introduction to the Internet and APNIC
APNIC
 
Tstat conext
Tstat conextTstat conext
Tstat conext
Danilo Giordano
 
LKNOG3 QoE
LKNOG3 QoELKNOG3 QoE
LKNOG3 QoE
LKNOG
 
The Data Center of the Future: The New IP - Phil O'Reilly
The Data Center of the Future: The New IP - Phil O'ReillyThe Data Center of the Future: The New IP - Phil O'Reilly
The Data Center of the Future: The New IP - Phil O'Reilly
scoopnewsgroup
 

Similar to Cyber Security Practices and Future Plan: Real Scenario in ISPs In Nepal (20)

23. NECS 2016 _ Digital Connectivity_ Mr. Anupam Agarwal
23. NECS 2016 _ Digital Connectivity_ Mr. Anupam Agarwal23. NECS 2016 _ Digital Connectivity_ Mr. Anupam Agarwal
23. NECS 2016 _ Digital Connectivity_ Mr. Anupam Agarwal
 
Internet infrastruture development in the asia pacific
Internet infrastruture development in the asia pacificInternet infrastruture development in the asia pacific
Internet infrastruture development in the asia pacific
 
2015 i cdn_cloud_vypa_services
2015 i cdn_cloud_vypa_services2015 i cdn_cloud_vypa_services
2015 i cdn_cloud_vypa_services
 
Lao ICT Expo 2019: Your IP, Your Network
Lao ICT Expo 2019: Your IP, Your NetworkLao ICT Expo 2019: Your IP, Your Network
Lao ICT Expo 2019: Your IP, Your Network
 
NetIX Moving Traffic to the Expressway 2016
NetIX Moving Traffic to the Expressway 2016NetIX Moving Traffic to the Expressway 2016
NetIX Moving Traffic to the Expressway 2016
 
Venturefest Launch Event - PM Session
Venturefest Launch Event - PM SessionVenturefest Launch Event - PM Session
Venturefest Launch Event - PM Session
 
Internet Economics: Urban and Rural perspectives
Internet Economics: Urban and Rural perspectivesInternet Economics: Urban and Rural perspectives
Internet Economics: Urban and Rural perspectives
 
BICS empowers predictive analytics and customer centricity with a Hadoop base...
BICS empowers predictive analytics and customer centricity with a Hadoop base...BICS empowers predictive analytics and customer centricity with a Hadoop base...
BICS empowers predictive analytics and customer centricity with a Hadoop base...
 
BCN (Nigeria) strategies to promote broadband & digitization
BCN (Nigeria) strategies to promote broadband & digitization BCN (Nigeria) strategies to promote broadband & digitization
BCN (Nigeria) strategies to promote broadband & digitization
 
ISP business plan
ISP business plan ISP business plan
ISP business plan
 
inspiration day_linkedin.pdf
inspiration day_linkedin.pdfinspiration day_linkedin.pdf
inspiration day_linkedin.pdf
 
IOT, It's the Internet...only bigger
IOT, It's the Internet...only biggerIOT, It's the Internet...only bigger
IOT, It's the Internet...only bigger
 
Driving Networks Forward to the Hyper-Connected World
Driving Networks Forward to the Hyper-Connected WorldDriving Networks Forward to the Hyper-Connected World
Driving Networks Forward to the Hyper-Connected World
 
Ihan tech check 2020
Ihan tech check 2020Ihan tech check 2020
Ihan tech check 2020
 
Presentation on adoption of cloud and outsourced services
Presentation on adoption of cloud and outsourced servicesPresentation on adoption of cloud and outsourced services
Presentation on adoption of cloud and outsourced services
 
Napoleon - C Squared.pdf
Napoleon - C Squared.pdfNapoleon - C Squared.pdf
Napoleon - C Squared.pdf
 
Lao ICT Expo 2018: Introduction to the Internet and APNIC
Lao ICT Expo 2018: Introduction to the Internet and APNICLao ICT Expo 2018: Introduction to the Internet and APNIC
Lao ICT Expo 2018: Introduction to the Internet and APNIC
 
Tstat conext
Tstat conextTstat conext
Tstat conext
 
LKNOG3 QoE
LKNOG3 QoELKNOG3 QoE
LKNOG3 QoE
 
The Data Center of the Future: The New IP - Phil O'Reilly
The Data Center of the Future: The New IP - Phil O'ReillyThe Data Center of the Future: The New IP - Phil O'Reilly
The Data Center of the Future: The New IP - Phil O'Reilly
 

More from ICT Frame Magazine Pvt. Ltd.

InfoDevelopers TechTalk Series
InfoDevelopers TechTalk SeriesInfoDevelopers TechTalk Series
InfoDevelopers TechTalk Series
ICT Frame Magazine Pvt. Ltd.
 
Web application security measures
Web application security measuresWeb application security measures
Web application security measures
ICT Frame Magazine Pvt. Ltd.
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 
Analysis of card management and associated operational risk in banks of Nepal
Analysis of card management and associated operational risk in banks of NepalAnalysis of card management and associated operational risk in banks of Nepal
Analysis of card management and associated operational risk in banks of Nepal
ICT Frame Magazine Pvt. Ltd.
 
Possibilities of e-learning in Nepal
Possibilities of e-learning in NepalPossibilities of e-learning in Nepal
Possibilities of e-learning in Nepal
ICT Frame Magazine Pvt. Ltd.
 
Risk Based Approach In cyber Security In Nepal
Risk Based Approach In cyber Security In NepalRisk Based Approach In cyber Security In Nepal
Risk Based Approach In cyber Security In Nepal
ICT Frame Magazine Pvt. Ltd.
 
Cyber Security Challenges in Developing Countries with Reference to Legislat...
 Cyber Security Challenges in Developing Countries with Reference to Legislat... Cyber Security Challenges in Developing Countries with Reference to Legislat...
Cyber Security Challenges in Developing Countries with Reference to Legislat...
ICT Frame Magazine Pvt. Ltd.
 
Nepal internet governance forum 2018 report
Nepal internet governance forum 2018 reportNepal internet governance forum 2018 report
Nepal internet governance forum 2018 report
ICT Frame Magazine Pvt. Ltd.
 
Nepal Rastra Bank Information Technology Guidelines
Nepal Rastra Bank Information Technology GuidelinesNepal Rastra Bank Information Technology Guidelines
Nepal Rastra Bank Information Technology Guidelines
ICT Frame Magazine Pvt. Ltd.
 
IT Directives For Insurance Company, 2076
IT Directives For Insurance Company, 2076IT Directives For Insurance Company, 2076
IT Directives For Insurance Company, 2076
ICT Frame Magazine Pvt. Ltd.
 
IGF 2020 NRIs Virtual Meeting II
IGF 2020 NRIs Virtual Meeting IIIGF 2020 NRIs Virtual Meeting II
IGF 2020 NRIs Virtual Meeting II
ICT Frame Magazine Pvt. Ltd.
 
Cyber Crime In Nepal: Threats And Minimize The Cyber Security Issues
Cyber Crime In Nepal: Threats And Minimize The Cyber Security IssuesCyber Crime In Nepal: Threats And Minimize The Cyber Security Issues
Cyber Crime In Nepal: Threats And Minimize The Cyber Security Issues
ICT Frame Magazine Pvt. Ltd.
 
Workshop Proposal APRIGF 2020 (Advocate Baburam Aryal)
Workshop Proposal APRIGF 2020 (Advocate Baburam Aryal)Workshop Proposal APRIGF 2020 (Advocate Baburam Aryal)
Workshop Proposal APRIGF 2020 (Advocate Baburam Aryal)
ICT Frame Magazine Pvt. Ltd.
 
ICT MAGAZINE NEPAL (ICTFRAME.COM)
ICT MAGAZINE NEPAL (ICTFRAME.COM)ICT MAGAZINE NEPAL (ICTFRAME.COM)
ICT MAGAZINE NEPAL (ICTFRAME.COM)
ICT Frame Magazine Pvt. Ltd.
 

More from ICT Frame Magazine Pvt. Ltd. (14)

InfoDevelopers TechTalk Series
InfoDevelopers TechTalk SeriesInfoDevelopers TechTalk Series
InfoDevelopers TechTalk Series
 
Web application security measures
Web application security measuresWeb application security measures
Web application security measures
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Analysis of card management and associated operational risk in banks of Nepal
Analysis of card management and associated operational risk in banks of NepalAnalysis of card management and associated operational risk in banks of Nepal
Analysis of card management and associated operational risk in banks of Nepal
 
Possibilities of e-learning in Nepal
Possibilities of e-learning in NepalPossibilities of e-learning in Nepal
Possibilities of e-learning in Nepal
 
Risk Based Approach In cyber Security In Nepal
Risk Based Approach In cyber Security In NepalRisk Based Approach In cyber Security In Nepal
Risk Based Approach In cyber Security In Nepal
 
Cyber Security Challenges in Developing Countries with Reference to Legislat...
 Cyber Security Challenges in Developing Countries with Reference to Legislat... Cyber Security Challenges in Developing Countries with Reference to Legislat...
Cyber Security Challenges in Developing Countries with Reference to Legislat...
 
Nepal internet governance forum 2018 report
Nepal internet governance forum 2018 reportNepal internet governance forum 2018 report
Nepal internet governance forum 2018 report
 
Nepal Rastra Bank Information Technology Guidelines
Nepal Rastra Bank Information Technology GuidelinesNepal Rastra Bank Information Technology Guidelines
Nepal Rastra Bank Information Technology Guidelines
 
IT Directives For Insurance Company, 2076
IT Directives For Insurance Company, 2076IT Directives For Insurance Company, 2076
IT Directives For Insurance Company, 2076
 
IGF 2020 NRIs Virtual Meeting II
IGF 2020 NRIs Virtual Meeting IIIGF 2020 NRIs Virtual Meeting II
IGF 2020 NRIs Virtual Meeting II
 
Cyber Crime In Nepal: Threats And Minimize The Cyber Security Issues
Cyber Crime In Nepal: Threats And Minimize The Cyber Security IssuesCyber Crime In Nepal: Threats And Minimize The Cyber Security Issues
Cyber Crime In Nepal: Threats And Minimize The Cyber Security Issues
 
Workshop Proposal APRIGF 2020 (Advocate Baburam Aryal)
Workshop Proposal APRIGF 2020 (Advocate Baburam Aryal)Workshop Proposal APRIGF 2020 (Advocate Baburam Aryal)
Workshop Proposal APRIGF 2020 (Advocate Baburam Aryal)
 
ICT MAGAZINE NEPAL (ICTFRAME.COM)
ICT MAGAZINE NEPAL (ICTFRAME.COM)ICT MAGAZINE NEPAL (ICTFRAME.COM)
ICT MAGAZINE NEPAL (ICTFRAME.COM)
 

Recently uploaded

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

Cyber Security Practices and Future Plan: Real Scenario in ISPs In Nepal

  • 1. Cyber Security The Service Providers Perspective By: Samit Jana , ISPAN 30th Jan 2019 . Cyber Security Practices and Future Plan: Real Scenario in ISPs
  • 2. ISPAN: An Introduction • Internet Service Provider Associations of Nepal, Established in 1998 • Mission to Develop and Provide Affordable Internet for everyone in Nepal • Promote and Protect interest of ISP and ICT industry as whole • Works closely with NTA, MOIC, NEA, NDCL, CAN, NPIX and various other agencies in ICT for the development of Internet in Nepal • 15 officially Members Organization , 100+ unofficially
  • 3. Telecom Sector Statistics: 122 registered ISPs ~30 active 6 Licensed Mobile Operators 3 active 6 Commercial Datacenters in operations 38 Millions Mobile Subscribers 1Million Fixed Broadband Connections 700,000 FTTH connections 210,000 ADSL connections 55,000 Fixed Wireless connections 50,000 Cable DOCSIS 2.5 Million Digital TV 300,000 IPTV Fastest Fixed Broadband and Growth in the Region One of the Cheapest Fixed Broadband in the World Google & Facebook makes 70% of the Internet Traffic
  • 4. Our Internet Connectivity to the outside World: Kathmandu Tanakpur Bhairawa Birgunj Dhalkebar Duhabi Rasuwagadi Tatopani
  • 5. How we are connected to the Internet? Other ISP/Telecom Internet out side Nepal BNG Router Mobile Gateway Packet Core Routers Application Servers OLT/DSLAM Cell Site Router Mobile/Wireless Base Station Teleport/Headend Network Service Provider End Users
  • 6. Primary Focus of Service Providers: • Build Infrastructure for enabling connectivity • Focus more on accessibility and affordablity • Increase Service Relialbility
  • 7. Why are we concerned about Cyber Security today? • We are Late • Internet Protocal was not designed for open nature network • TCP/IP developed by ARPANET for Military Communciation in Secured environment • Basic design criteria: stablity not security • Took almost 20yrs to become Public and Open • Unimaginable growth • Speed, Reach, Affordablity Triumped Security..!
  • 8. What does Service Providers do? • Own Infrastructure: • Implements Best Common Security Practices (BCP) • Analyze Traffic and Flows to detect and mitigate DDOS • Manages Firewall/UTM • For Government: • Stores Subscribers Internet Lots: AAA, CGNAT, DNS & Web for digital forensic • Few Enable v6 – Helpful for forensic but v6 security still remains a concern • Block Domain Name and IP address upon request • For End Users: • Some provides per DNS based security services in the Internet and Email Security • Provides Router, Firewall, IDS, IPS to Enterprise as managed service • Awareness programs
  • 9. Service Providers Dilemma: • Build Infrastructure focusing on enabling connectivity or security ? • Focus more on network accessibility and service affordablity or security ? • How to Store and Analyze the massive amount logs and graphs data with minimal invesment? • Are we responsible to sniff and analyze user’s traffic ? • Can we do content filtering? • Traffic Survelliance and Security may degrade network performance? • Most of the ISPs are already struggling due to high infrastructure capex/opex but low ARPU and stiff competition , can I afford to spend more on security now?
  • 10. What can Service Providers do ? • Collaborate and Facilitate : • Government on Cyber Security Act and Policy formulation • Cyber Security Awareness Programs • Implement and recommend security BCP for end users and organizations • Sharing operational knowledge and Threat Analysis • In Digital Forensic helping law enforcement agencies , CERT or SoC • Becoming major stakeholders to strengthen National Cyber Security situation • To find the right balance between: • Security vs Ease of Use • Security Cost vs Network/Application Performance
  • 11. Cyber Security is Best Effort. It is everyone’s responsibility ! -From Internet