SlideShare a Scribd company logo
INTERNET
SYSTEM AND
ITS PROCESS
By Shreedeep Rayamajhi
Presentation for Awareness and Capacity building
13 November 2018
WHAT IS INTERNET ?
Networks of Networks
The Internet is the global system of interconnected computer networks that use
the Internet protocol suite (TCP/IP) to link devices worldwide.
What is the Internet Penetration
of Nepal ?
WHAT IS INTERNET
ECOSYSTEM? The “Internet Ecosystem” is a term used to describe the organizations and
communities that help the Internet work and evolve.
 Identity theft
 Stalking
 Cyber bulling
 Revenge porn
 Trolling and memes
 Click bait
 Hate speech
Identity theft
Banking frauds
Hacking
Phishing
Distributed denial-of-service(DDoS )
attack
Various forms of Online Violence
against Women
Cyber bulling
Online threats & intimidation
Revenge Porn
Copyrights issues
Social Media Crisis
Denial of Service attack
Child Online Protection
Lack of Standardization
and proper policy
Awareness and capacity
building
ICANN Next generation Program
-Between the ages of 18-30 years
-Currently living and studying in the region of the respective ICANN meeting.
-Interested in Internet Governance, the future of the Internet, and other topics
covered at ICANN meetings.
Asia Pacific Internet Governance Academy (APIGA)
https://community.icann.org/display/GSEAPAC/Asia+Pacific+Internet+Governance+A
cademy+%28APIGA%29+2018
1. Youth IGF program
- Age limitation 18-25 years
-Collaborative Leadership Exchange
-Spend a minimum of 8 hours each week during each of the phases
-Be ready take part in the meetings or webinars (this is the single most
important requirement and should be evaluated seriously by any potential
applicant).
Internet system and its process

More Related Content

What's hot

Child protection system in ict of thailand
Child protection system in ict of thailandChild protection system in ict of thailand
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-security
Glenn McKnight
 
Internet Governance: Overview
Internet Governance: Overview Internet Governance: Overview
Internet Governance: Overview
Glenn McKnight
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle East
Mohamed N. El-Guindy
 
C3 and digital citizenship
C3 and digital citizenshipC3 and digital citizenship
C3 and digital citizenship
JuliaHoesingVanderMolen
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Oxford Martin Centre, OII, and Computer Science at the University of Oxford
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
Directorate of Information Security | Ditjen Aptika
 
India and its wall of data security
India and its wall of data securityIndia and its wall of data security
India and its wall of data security
Ashish Jhalani
 
Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Module 5 ig presentation iran 2
Module 5 ig presentation iran 2
Habib Noroozi
 
Ethics piracy
Ethics piracyEthics piracy
Ethics piracy
Hamail A Ahmed
 
I4ADA 2019 Presentation Stepheni baraki
I4ADA 2019 Presentation  Stepheni barakiI4ADA 2019 Presentation  Stepheni baraki
I4ADA 2019 Presentation Stepheni baraki
Paul van Heel
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
Benjamin Ang
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
NEW LAW COLLEGE PUNE
 
Case study 13
Case study 13Case study 13
Case study 13
khaled alsaeh
 
Cyber Crime
Cyber CrimeCyber Crime
I4ADA 2019 - Presentation Cedric Wachholz
I4ADA 2019 - Presentation Cedric WachholzI4ADA 2019 - Presentation Cedric Wachholz
I4ADA 2019 - Presentation Cedric Wachholz
Paul van Heel
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
nehal patel
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Abzetdin Adamov
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
Southeast university, Bangladesh
 
Steven Greschner - About Me
Steven Greschner  - About MeSteven Greschner  - About Me
Steven Greschner - About Me
NextNet Partners
 

What's hot (20)

Child protection system in ict of thailand
Child protection system in ict of thailandChild protection system in ict of thailand
Child protection system in ict of thailand
 
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-security
 
Internet Governance: Overview
Internet Governance: Overview Internet Governance: Overview
Internet Governance: Overview
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle East
 
C3 and digital citizenship
C3 and digital citizenshipC3 and digital citizenship
C3 and digital citizenship
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
India and its wall of data security
India and its wall of data securityIndia and its wall of data security
India and its wall of data security
 
Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Module 5 ig presentation iran 2
Module 5 ig presentation iran 2
 
Ethics piracy
Ethics piracyEthics piracy
Ethics piracy
 
I4ADA 2019 Presentation Stepheni baraki
I4ADA 2019 Presentation  Stepheni barakiI4ADA 2019 Presentation  Stepheni baraki
I4ADA 2019 Presentation Stepheni baraki
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Case study 13
Case study 13Case study 13
Case study 13
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
I4ADA 2019 - Presentation Cedric Wachholz
I4ADA 2019 - Presentation Cedric WachholzI4ADA 2019 - Presentation Cedric Wachholz
I4ADA 2019 - Presentation Cedric Wachholz
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
Steven Greschner - About Me
Steven Greschner  - About MeSteven Greschner  - About Me
Steven Greschner - About Me
 

Similar to Internet system and its process

Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
xosap
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
IRJET Journal
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Charles Mok
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
praveen1792
 
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
guest446b00
 
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Benjamin Ang
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data Breaches
Bijay Senihang
 
At The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianAt The Brink of Digital Authoritarian
At The Brink of Digital Authoritarian
Damar Juniarto
 
A Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks TodayA Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks Today
Deja Lewis
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
WAIHIGA K.MUTURI
 
Internet ecosystem and the internet
Internet ecosystem and the internetInternet ecosystem and the internet
Internet ecosystem and the internet
Shreedeep Rayamajhi
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
Ganesh DNP
 
Required topic cyberlaw documentpresentation document .docx
Required topic  cyberlaw documentpresentation document .docxRequired topic  cyberlaw documentpresentation document .docx
Required topic cyberlaw documentpresentation document .docx
heunice
 
Should government control_internet
Should government control_internetShould government control_internet
Should government control_internet
Sumeet Kagwade
 
Indonesia National Cyber Security Strategy
Indonesia National Cyber Security StrategyIndonesia National Cyber Security Strategy
Indonesia National Cyber Security Strategy
Directorate of Information Security | Ditjen Aptika
 
Indonesia National Cyber Security Strategy
Indonesia National Cyber Security StrategyIndonesia National Cyber Security Strategy
Indonesia National Cyber Security Strategy
ICT Watch
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Debayon Saha
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
V01 i010413
V01 i010413V01 i010413
V01 i010413
IJARBEST JOURNAL
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
Business Finland
 

Similar to Internet system and its process (20)

Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
 
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data Breaches
 
At The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianAt The Brink of Digital Authoritarian
At The Brink of Digital Authoritarian
 
A Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks TodayA Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks Today
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 
Internet ecosystem and the internet
Internet ecosystem and the internetInternet ecosystem and the internet
Internet ecosystem and the internet
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 
Required topic cyberlaw documentpresentation document .docx
Required topic  cyberlaw documentpresentation document .docxRequired topic  cyberlaw documentpresentation document .docx
Required topic cyberlaw documentpresentation document .docx
 
Should government control_internet
Should government control_internetShould government control_internet
Should government control_internet
 
Indonesia National Cyber Security Strategy
Indonesia National Cyber Security StrategyIndonesia National Cyber Security Strategy
Indonesia National Cyber Security Strategy
 
Indonesia National Cyber Security Strategy
Indonesia National Cyber Security StrategyIndonesia National Cyber Security Strategy
Indonesia National Cyber Security Strategy
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
V01 i010413
V01 i010413V01 i010413
V01 i010413
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 

More from Shreedeep Rayamajhi

ICANN80 Mentoring Call 1 By Shreedeep Rayamajhi.pdf
ICANN80 Mentoring Call 1 By Shreedeep Rayamajhi.pdfICANN80 Mentoring Call 1 By Shreedeep Rayamajhi.pdf
ICANN80 Mentoring Call 1 By Shreedeep Rayamajhi.pdf
Shreedeep Rayamajhi
 
Social Media Startegy for APrIGF 2024 by Shreedeep Rayamajhi.pdf
Social Media Startegy for APrIGF 2024 by Shreedeep Rayamajhi.pdfSocial Media Startegy for APrIGF 2024 by Shreedeep Rayamajhi.pdf
Social Media Startegy for APrIGF 2024 by Shreedeep Rayamajhi.pdf
Shreedeep Rayamajhi
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Shreedeep Rayamajhi
 
Report ICANN79 At-Large Mentor of Shreedeep Rayamajhi.pdf
Report ICANN79 At-Large Mentor  of Shreedeep Rayamajhi.pdfReport ICANN79 At-Large Mentor  of Shreedeep Rayamajhi.pdf
Report ICANN79 At-Large Mentor of Shreedeep Rayamajhi.pdf
Shreedeep Rayamajhi
 
.np present and future, a civil society perspective at APTLD 85
.np present and future, a civil society perspective at APTLD 85.np present and future, a civil society perspective at APTLD 85
.np present and future, a civil society perspective at APTLD 85
Shreedeep Rayamajhi
 
Report ICANN78 At-Large Mentor of Shreedeep Rayamajhi.pdf
Report ICANN78 At-Large Mentor  of Shreedeep Rayamajhi.pdfReport ICANN78 At-Large Mentor  of Shreedeep Rayamajhi.pdf
Report ICANN78 At-Large Mentor of Shreedeep Rayamajhi.pdf
Shreedeep Rayamajhi
 
Introduction and AI and Future Challenges for Sri Lanka Internet Users by Sh...
Introduction and  AI and Future Challenges for Sri Lanka Internet Users by Sh...Introduction and  AI and Future Challenges for Sri Lanka Internet Users by Sh...
Introduction and AI and Future Challenges for Sri Lanka Internet Users by Sh...
Shreedeep Rayamajhi
 
ICANN Fellowship Interaction and Meet Up Program.pdf
ICANN Fellowship Interaction and Meet Up Program.pdfICANN Fellowship Interaction and Meet Up Program.pdf
ICANN Fellowship Interaction and Meet Up Program.pdf
Shreedeep Rayamajhi
 
Comments and suggestion on Zero-Draft-Public-Consultations-FOC-Donor-Principl...
Comments and suggestion on Zero-Draft-Public-Consultations-FOC-Donor-Principl...Comments and suggestion on Zero-Draft-Public-Consultations-FOC-Donor-Principl...
Comments and suggestion on Zero-Draft-Public-Consultations-FOC-Donor-Principl...
Shreedeep Rayamajhi
 
Challenges of APRALO policy Forum.pdf
Challenges of APRALO policy Forum.pdfChallenges of APRALO policy Forum.pdf
Challenges of APRALO policy Forum.pdf
Shreedeep Rayamajhi
 
Internet Ecosystem and challenges of IPV6 in Nepal by Shreedeep Rayamajhi.pdf
Internet Ecosystem and challenges of IPV6 in Nepal  by Shreedeep Rayamajhi.pdfInternet Ecosystem and challenges of IPV6 in Nepal  by Shreedeep Rayamajhi.pdf
Internet Ecosystem and challenges of IPV6 in Nepal by Shreedeep Rayamajhi.pdf
Shreedeep Rayamajhi
 
Art of Assertive Commnunication, how to be visible in social media by Shreed...
Art of Assertive Commnunication,  how to be visible in social media by Shreed...Art of Assertive Commnunication,  how to be visible in social media by Shreed...
Art of Assertive Commnunication, how to be visible in social media by Shreed...
Shreedeep Rayamajhi
 
Internet Ecosystem and its problems, challenges and opportunities Texas Coll...
Internet Ecosystem and its problems, challenges and opportunities  Texas Coll...Internet Ecosystem and its problems, challenges and opportunities  Texas Coll...
Internet Ecosystem and its problems, challenges and opportunities Texas Coll...
Shreedeep Rayamajhi
 
Report on Commercial Law Development Program (CLDP)2022 UN Internet Governanc...
Report on Commercial Law Development Program (CLDP)2022 UN Internet Governanc...Report on Commercial Law Development Program (CLDP)2022 UN Internet Governanc...
Report on Commercial Law Development Program (CLDP)2022 UN Internet Governanc...
Shreedeep Rayamajhi
 
Recommendation and Suggestion for Global Stakeholder Engagement Team.pdf
Recommendation and Suggestion for Global Stakeholder Engagement Team.pdfRecommendation and Suggestion for Global Stakeholder Engagement Team.pdf
Recommendation and Suggestion for Global Stakeholder Engagement Team.pdf
Shreedeep Rayamajhi
 
Shreedeep Rayamajhi Presentation on Survey Report on Disinformation and its P...
Shreedeep Rayamajhi Presentation on Survey Report on Disinformation and its P...Shreedeep Rayamajhi Presentation on Survey Report on Disinformation and its P...
Shreedeep Rayamajhi Presentation on Survey Report on Disinformation and its P...
Shreedeep Rayamajhi
 
How to enagage with ICANN Community presentation by Shreedeep Rayamajhi.pdf
How to enagage with ICANN  Community presentation by Shreedeep Rayamajhi.pdfHow to enagage with ICANN  Community presentation by Shreedeep Rayamajhi.pdf
How to enagage with ICANN Community presentation by Shreedeep Rayamajhi.pdf
Shreedeep Rayamajhi
 
How to enagage with ICANN Youth IGF 2022 presentation by Shreedeep Rayamajhi...
How to enagage with ICANN  Youth IGF 2022 presentation by Shreedeep Rayamajhi...How to enagage with ICANN  Youth IGF 2022 presentation by Shreedeep Rayamajhi...
How to enagage with ICANN Youth IGF 2022 presentation by Shreedeep Rayamajhi...
Shreedeep Rayamajhi
 
Recommendation on IGF Expert Group Meeting 2022 By Shreedeep Rayamajhi.pdf
Recommendation on IGF Expert Group Meeting 2022 By Shreedeep Rayamajhi.pdfRecommendation on IGF Expert Group Meeting 2022 By Shreedeep Rayamajhi.pdf
Recommendation on IGF Expert Group Meeting 2022 By Shreedeep Rayamajhi.pdf
Shreedeep Rayamajhi
 
Final survey on disinformation and its practice during covid 19 in developing...
Final survey on disinformation and its practice during covid 19 in developing...Final survey on disinformation and its practice during covid 19 in developing...
Final survey on disinformation and its practice during covid 19 in developing...
Shreedeep Rayamajhi
 

More from Shreedeep Rayamajhi (20)

ICANN80 Mentoring Call 1 By Shreedeep Rayamajhi.pdf
ICANN80 Mentoring Call 1 By Shreedeep Rayamajhi.pdfICANN80 Mentoring Call 1 By Shreedeep Rayamajhi.pdf
ICANN80 Mentoring Call 1 By Shreedeep Rayamajhi.pdf
 
Social Media Startegy for APrIGF 2024 by Shreedeep Rayamajhi.pdf
Social Media Startegy for APrIGF 2024 by Shreedeep Rayamajhi.pdfSocial Media Startegy for APrIGF 2024 by Shreedeep Rayamajhi.pdf
Social Media Startegy for APrIGF 2024 by Shreedeep Rayamajhi.pdf
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
 
Report ICANN79 At-Large Mentor of Shreedeep Rayamajhi.pdf
Report ICANN79 At-Large Mentor  of Shreedeep Rayamajhi.pdfReport ICANN79 At-Large Mentor  of Shreedeep Rayamajhi.pdf
Report ICANN79 At-Large Mentor of Shreedeep Rayamajhi.pdf
 
.np present and future, a civil society perspective at APTLD 85
.np present and future, a civil society perspective at APTLD 85.np present and future, a civil society perspective at APTLD 85
.np present and future, a civil society perspective at APTLD 85
 
Report ICANN78 At-Large Mentor of Shreedeep Rayamajhi.pdf
Report ICANN78 At-Large Mentor  of Shreedeep Rayamajhi.pdfReport ICANN78 At-Large Mentor  of Shreedeep Rayamajhi.pdf
Report ICANN78 At-Large Mentor of Shreedeep Rayamajhi.pdf
 
Introduction and AI and Future Challenges for Sri Lanka Internet Users by Sh...
Introduction and  AI and Future Challenges for Sri Lanka Internet Users by Sh...Introduction and  AI and Future Challenges for Sri Lanka Internet Users by Sh...
Introduction and AI and Future Challenges for Sri Lanka Internet Users by Sh...
 
ICANN Fellowship Interaction and Meet Up Program.pdf
ICANN Fellowship Interaction and Meet Up Program.pdfICANN Fellowship Interaction and Meet Up Program.pdf
ICANN Fellowship Interaction and Meet Up Program.pdf
 
Comments and suggestion on Zero-Draft-Public-Consultations-FOC-Donor-Principl...
Comments and suggestion on Zero-Draft-Public-Consultations-FOC-Donor-Principl...Comments and suggestion on Zero-Draft-Public-Consultations-FOC-Donor-Principl...
Comments and suggestion on Zero-Draft-Public-Consultations-FOC-Donor-Principl...
 
Challenges of APRALO policy Forum.pdf
Challenges of APRALO policy Forum.pdfChallenges of APRALO policy Forum.pdf
Challenges of APRALO policy Forum.pdf
 
Internet Ecosystem and challenges of IPV6 in Nepal by Shreedeep Rayamajhi.pdf
Internet Ecosystem and challenges of IPV6 in Nepal  by Shreedeep Rayamajhi.pdfInternet Ecosystem and challenges of IPV6 in Nepal  by Shreedeep Rayamajhi.pdf
Internet Ecosystem and challenges of IPV6 in Nepal by Shreedeep Rayamajhi.pdf
 
Art of Assertive Commnunication, how to be visible in social media by Shreed...
Art of Assertive Commnunication,  how to be visible in social media by Shreed...Art of Assertive Commnunication,  how to be visible in social media by Shreed...
Art of Assertive Commnunication, how to be visible in social media by Shreed...
 
Internet Ecosystem and its problems, challenges and opportunities Texas Coll...
Internet Ecosystem and its problems, challenges and opportunities  Texas Coll...Internet Ecosystem and its problems, challenges and opportunities  Texas Coll...
Internet Ecosystem and its problems, challenges and opportunities Texas Coll...
 
Report on Commercial Law Development Program (CLDP)2022 UN Internet Governanc...
Report on Commercial Law Development Program (CLDP)2022 UN Internet Governanc...Report on Commercial Law Development Program (CLDP)2022 UN Internet Governanc...
Report on Commercial Law Development Program (CLDP)2022 UN Internet Governanc...
 
Recommendation and Suggestion for Global Stakeholder Engagement Team.pdf
Recommendation and Suggestion for Global Stakeholder Engagement Team.pdfRecommendation and Suggestion for Global Stakeholder Engagement Team.pdf
Recommendation and Suggestion for Global Stakeholder Engagement Team.pdf
 
Shreedeep Rayamajhi Presentation on Survey Report on Disinformation and its P...
Shreedeep Rayamajhi Presentation on Survey Report on Disinformation and its P...Shreedeep Rayamajhi Presentation on Survey Report on Disinformation and its P...
Shreedeep Rayamajhi Presentation on Survey Report on Disinformation and its P...
 
How to enagage with ICANN Community presentation by Shreedeep Rayamajhi.pdf
How to enagage with ICANN  Community presentation by Shreedeep Rayamajhi.pdfHow to enagage with ICANN  Community presentation by Shreedeep Rayamajhi.pdf
How to enagage with ICANN Community presentation by Shreedeep Rayamajhi.pdf
 
How to enagage with ICANN Youth IGF 2022 presentation by Shreedeep Rayamajhi...
How to enagage with ICANN  Youth IGF 2022 presentation by Shreedeep Rayamajhi...How to enagage with ICANN  Youth IGF 2022 presentation by Shreedeep Rayamajhi...
How to enagage with ICANN Youth IGF 2022 presentation by Shreedeep Rayamajhi...
 
Recommendation on IGF Expert Group Meeting 2022 By Shreedeep Rayamajhi.pdf
Recommendation on IGF Expert Group Meeting 2022 By Shreedeep Rayamajhi.pdfRecommendation on IGF Expert Group Meeting 2022 By Shreedeep Rayamajhi.pdf
Recommendation on IGF Expert Group Meeting 2022 By Shreedeep Rayamajhi.pdf
 
Final survey on disinformation and its practice during covid 19 in developing...
Final survey on disinformation and its practice during covid 19 in developing...Final survey on disinformation and its practice during covid 19 in developing...
Final survey on disinformation and its practice during covid 19 in developing...
 

Recently uploaded

假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 

Recently uploaded (20)

假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 

Internet system and its process

  • 1. INTERNET SYSTEM AND ITS PROCESS By Shreedeep Rayamajhi Presentation for Awareness and Capacity building 13 November 2018
  • 2. WHAT IS INTERNET ? Networks of Networks The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide. What is the Internet Penetration of Nepal ?
  • 3. WHAT IS INTERNET ECOSYSTEM? The “Internet Ecosystem” is a term used to describe the organizations and communities that help the Internet work and evolve.
  • 4.
  • 5.  Identity theft  Stalking  Cyber bulling  Revenge porn  Trolling and memes  Click bait  Hate speech
  • 6. Identity theft Banking frauds Hacking Phishing Distributed denial-of-service(DDoS ) attack Various forms of Online Violence against Women Cyber bulling Online threats & intimidation Revenge Porn Copyrights issues Social Media Crisis Denial of Service attack Child Online Protection Lack of Standardization and proper policy Awareness and capacity building
  • 7. ICANN Next generation Program -Between the ages of 18-30 years -Currently living and studying in the region of the respective ICANN meeting. -Interested in Internet Governance, the future of the Internet, and other topics covered at ICANN meetings. Asia Pacific Internet Governance Academy (APIGA) https://community.icann.org/display/GSEAPAC/Asia+Pacific+Internet+Governance+A cademy+%28APIGA%29+2018
  • 8. 1. Youth IGF program - Age limitation 18-25 years -Collaborative Leadership Exchange -Spend a minimum of 8 hours each week during each of the phases -Be ready take part in the meetings or webinars (this is the single most important requirement and should be evaluated seriously by any potential applicant).