SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Downloaden Sie, um offline zu lesen
Presenter: Suman Thapaliya, PhD Scholar
Department of Information Technology
Supervisor 1: Prof, Dr. Sateesh Kumar Ohja
Supervisor 2: Prof, Dr. Subarna Shakya
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
NPCERT to Host First Cyber Security Meetup in Nepal
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
WE SHOW YOUR PROBLEM
YOU SOLVE IT 4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
AGENDAS
 INTRODUCTION
 PURPOSE
 MOTIVATION
 STATEMENT OF PROBLEM
 PROCESS
 FRAMEWORK
 RESEARCH METHODOLOGIES
 CASE STUDY
 RESULT & DISCUSSION
 CONCLUSION
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
Peter Drucker
“There are:
Companies,
That make thing happen ……
Companies,
That watch things happen ….
Companies,
That wonder what happened ….. “
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
INTRODUCTION
Confidentiality: Is a set of rules that limits access to information.
Integrity: Is the assurance that the information is trustworthy and accurate.
Availability: Is a guarantee of reliable access to the information by authorized people.
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
INTRODUCTION
 When most people hear the word “audit,” their first reflex is
to cringe. Usually, it means having some outside team come
in to review everything and tell them what they’re doing
wrong in technical term.
 An IT audit is the:
1. Examination and evaluation of an organization’s
information technology infrastructure.
2. Policies and operations.
Information technology audits determine:
1. Whether IT controls protect corporate assets
2. Ensure data integrity and are aligned with the business’s
overall goals.
IT auditors examine not only physical security controls, but also
overall business and financial controls that involve information
technology systems.
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
WHY TO AUDIT
 Company knows only after attack
 Are client/ customer safe to invest ?
- Invest Data
- Invest Information
- Invest Money
- Invest Career and so on.
 Are promoter and shareholder safe ?
 What will be the loss value ?
 When will you recover ?
 What sort of Disaster you may face ?
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
CYBER ATTACK
 Story Time 
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
PAST ATTACK NATURE
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
PURPOSE
 The purposes of an IT audit are to evaluate the
system's internal control design and effectiveness.
 This includes, but is not limited to, efficiency and
security protocols, development processes, and IT
governance or oversight.
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
STATEMENT OF PROBLEM
 Many organizations are spending large amounts of
money on IT because they recognize the tremendous
benefits that IT can bring to their operations and
services. However, they need to ensure that their IT
systems are reliable, secure and not vulnerable to
computer attacks.
 Introduction of New Threads and Attack are you
updated ?
 Assurance of IT system adequately protected
 Less knowledge on IT
 Not providing importance to data
 Continuous loss of data and hacked
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
PROBLEM STATEMENT – Practical Gap
Less Investment , High Risk
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
SOLUTION
 To give assurance that IT systems are adequately
protected.
 Provide reliable information to user and properly
managed to achieve their intended benefits.
 Reduce Risk of data tampering
 Reduce Data loss or leakage
 Reduce Service disruption
 Provide Proper management of IT System
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
MOTIVATION
Different kinds of cyber attacks that are mostly transpired in
Nepal. List of those cyber attacks are as mentioned:
 Attacks on social media
 Piracy
 Identity Threat
 Unauthorized access
 Website hacking
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
CASE STUDY 1
1.Pune Citibank MphasiS Call Center Fraud
some ex employees of BPO arm of MPhasis Ltd
MsourcE, defrauded US Customers of Citi Bank to the
tune of RS 1.5 crores has raised concerns of many kinds
including the role of "Data Protection".
The crime was obviously committed using
"Unauthorized Access" to the "Electronic Account
Space" of the customers. It is therefore firmly within the
domain of "Cyber Crimes".
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
CASE STUDY 2
WannaCry
 The most infamous ransomware attack of 2017 was a strain
of ransomware called WannaCry that spread all over the
globe.
 The ransomware targeted numerous public utilities and
large corporations, most notably National Health Service
hospitals and facilities in the United Kingdom, hobbling
emergency rooms, delaying vital medical procedures, and
creating chaos for many British patients.
 Though the origin of WannaCry is not yet known, the US
government has blamed the Kim Jong-un-led North
Korean government for initiating the attack
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
CASE STUDY 3
3. The Bank NSP Case
The Bank NSP case is the one where a management
trainee of the bank was engaged to be married. The
couple exchanged many emails using the company
computers. After some time the two broke up and the
girl created fraudulent email ids such as
"indianbarassociations" and sent emails to the boy's
foreign clients. She used the banks computer to do this.
The boy's company lost a large number of clients and
took the bank to court. The bank was held liable for the
emails sent using the bank's system.
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
CASE 4: Attacks in 2017
 Petya/NotPetya: Affected Across the globe in 2017, spread
in computers, pharmaceutical company merck, damish
shipping company, Russian oil giant rosneft, power
companies in Ukrainian, airports, public transit and
country’s central bank.
 Zomato hack: zomato, largest restaurant aggregators in
India was hacked and some of it’s user accounts were being
sold on the dark web.
 The HBO Hack: Revealed script for Episode 4 of season 7
of Game of Thrones, which was scheduled to be released
the following week, was put up online for the whole world
to see.
 Equifax: In July, a group of hacker penetrated Equifax, one
of the largest credit bureaus in the worlds and stole
personal data of 145 million people.
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
Top Attack
1. Adobe was going through hell: 2.9 million accounts was
stolen.
2. Panic to sony: Personal data of 77 million users which was
leaked to public.
3. The south Korean Nightmare: Data from 100 million credit
cards had been stolen.
4. Target Targeted: Data from 110 million customers was
hijacked, including 40 million customers and personal data.
5. Adult Friend Finder exposed: Dating site was attacked, 4
million accounts was made public.
6. Marriott Hotels: Privacy of 500 million customers
compromised, including banking data.
7. Theft of more than 1 billion passwords: Russian hackers
stole 1.2 billion logins and passwords on 420000 websites.
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
Nepal Bank Got Hacked 
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
IS Risk Measure/ Level
INFORMATION SECURITY RISK RATING SCALE
EXTREME (13 – 15) Extreme risk of security controls being compromised with the possibility of
catastrophic financial losses occurring as a result. (HUGE LOSS)
HIGH (10 – 12) High risk of security controls being compromised with the potential for significant
financial losses occurring as a result. (MID LEVEL LOSS)
ELEVATED (7 – 9) Elevated risk of security controls being compromised with the potential for
material financial losses occurring as a result. (MINOR LOSS)
MODERATE (4 – 6) Moderate risk of security controls being compromised with the possibility of
limited financial losses occurring as a result. (COMPROMISE LOSS)
LOW (1 – 3) Low risk of security controls being compromised with measurable negative
impacts as Loss. (NEGATIVE IMPACT)
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
IT Audit Process
 The below provided are the basic steps in performing
the Information Technology Audit Process.
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
Audit Program Management Process Flow
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
Conceptual Framework
The five pillars are briefly explained below:
 Legal: Measured based on the existence of legal
institutions and frameworks dealing with cyber security
and cybercrime.
 Technical: Measured based on the existence of technical
institutions and frameworks dealing with cyber security.
 Organizational: Measured based on the existence of policy
coordination institutions and strategies for cyber security
development at the national level.
 Capacity Building: Measured based on the existence of
research and development, education and training
programme; certified professionals and public sector
agencies fostering capacity building.
 Cooperation: Measured based on the existence of
partnerships, cooperative frameworks and information
sharing networks.
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
Pillars and Sub Pillars
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
Final Prototype
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
Simplified Audit Process
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
Framework Components Defined
 Owner: The person or entity that has been given formal responsibility for the
security.
 Asset: Any tangible or intangible resource that has value to the owner of the
organization or entity.
 Data: A collection of all financial and nonfinancial facts, records and information.
 Containers: the place where an information asset or data “lives” or any type of
information asset (data) is stored.
 Security Objective: A Statement of intent to counter specified threads and/or satisfy
specified organizational security policies or assumptions.
 Vulnerability: A flaw or weakness of an asset or group of assets that can be exploited
by one or more threats.
 Threat: An unwanted incident that may result in harm to a system or organization.
 Sources: Either intent and method targeted at the intentional exploitation of a
vulnerability or a situation and method that may accidentally trigger a vulnerability.
 Attack: Any attempt to destroy, expose, alter, disable, steal or gain unauthorized
access to or make unauthorized use of an asset.
 Severity: The level of harm that may occur as a result or exposure to or contact with
a hazard.
 Risk: The likelihood of harm occurring, combined with the potential severity of an
event, to produce a level of risk or risk rating.
 Audit process: A step-by-step procedure to achieve the security objective of an asset.
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
METHODOLOGY
 Quantitative Research Methodology has been used in
this research. The research theory of this paper has
been to construct knowledge and meaning from
Researchers experience, that is, Constructivism, which
has direct application to education. The research
theory indicates technological Constructivism.
 Primary data were collected by means of online survey,
Questionnaire and Interview where professionals from
different areas of ICT were chosen, which helped to
study current situation in Nepal. Secondary data were
collected from several comparative studies of different
research papers/ journals, websites, newspaper which
helped to gather information on international level.
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
RESULT & DISCUSSION
 A survey was conducted to support this research and
different charts are presented for further clarifications.
There were 108 respondents to qualify in Fig.
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
RESULT & DISCUSSION Cont …
 Shows attacks from 2007 to 2014 has been growing
relatively with prominent probability of attacks in any
components of security audit mentioned in Fig.
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
 Depicts experience on the different types of attacks or
vulnerabilities experienced by user from 2007-2014 by
ICT users from different fields as in Fig.
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
 Depicts IS Audit Awareness in Nepal by 83.58% which
looks promising as IS Audit practicing would not be
very difficult job to begin.
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
CONCLUSION
Information Security is an increasingly important part of our life
today, and the degree of interconnectivity of
 Networks implies that anything and everything can be exposed,
and everything from national critical
 Infrastructure to our basic human rights can be compromised.
Governments are therefore urged to
 Consider policies that support continued growth in technology
sophistication, access and security, and as a crucial first step, to
adopt a national cyber security strategy.
 Risk assessment and security audit has to be conducted
eventually to minimize and mitigate risks. Local law, local and
international standards and policy must be followed while
preparing the ICT Security policies in an organization. Audit is
must for data security assurance. This research has proposed an
audit model for IS Audit which is highly recommended for IS
Audit in any IS Audit and Security Vulnerability minimizing.
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal
QUESTION & ANSWER
THANK YOU 
4/6/2019
NPCERT to Host First Cyber Security Meetup in
Nepal

Weitere ähnliche Inhalte

Was ist angesagt?

cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crimeDarshan Aswani
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictZsolt Nemeth
 
India is Cyber Vulnerable
India is Cyber VulnerableIndia is Cyber Vulnerable
India is Cyber VulnerableThe eCore Group
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threatsHarsh Kumar
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
 
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron ShrabergCODE BLUE
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trumpMAXfocus
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
 
What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?lorzinian
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiKnowledge Group
 
Cyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasionalCyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasionalEdi Suryadi
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
 
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and BeyondNUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and BeyondNUS-ISS
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)Santosh Khadsare
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securitysiswarren
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Benjamin Ang
 

Was ist angesagt? (20)

cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber Conflict
 
India is Cyber Vulnerable
India is Cyber VulnerableIndia is Cyber Vulnerable
India is Cyber Vulnerable
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
 
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
 
What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
 
Cyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasionalCyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasional
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
 
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and BeyondNUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from Patents
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
 

Ähnlich wie Cyber security meetup from Nepal

IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...IRJET Journal
 
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxCyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxACAD1ITG
 
IRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET Journal
 
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Benjamin Ang
 
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...IFG Network marcus evans
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...IRJET Journal
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecurityIRJET Journal
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268xosap
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In IndiaIRJET Journal
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalPriyanka Aash
 
ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxFahimMuntasir21
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Why understanding your attack surface matters
Why understanding your attack surface mattersWhy understanding your attack surface matters
Why understanding your attack surface mattersHarry Gunns
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
Credential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social EngineeringCredential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social Engineeringijtsrd
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxmccormicknadine86
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxsleeperharwell
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...XEventsHospitality
 

Ähnlich wie Cyber security meetup from Nepal (20)

IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
 
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxCyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
 
IRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing Security
 
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
 
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptx
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Why understanding your attack surface matters
Why understanding your attack surface mattersWhy understanding your attack surface matters
Why understanding your attack surface matters
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
Credential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social EngineeringCredential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social Engineering
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
 

Kürzlich hochgeladen

办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxBipin Adhikari
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 

Kürzlich hochgeladen (20)

办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptx
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 

Cyber security meetup from Nepal

  • 1. Presenter: Suman Thapaliya, PhD Scholar Department of Information Technology Supervisor 1: Prof, Dr. Sateesh Kumar Ohja Supervisor 2: Prof, Dr. Subarna Shakya 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 2. NPCERT to Host First Cyber Security Meetup in Nepal 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 3. WE SHOW YOUR PROBLEM YOU SOLVE IT 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 4. AGENDAS  INTRODUCTION  PURPOSE  MOTIVATION  STATEMENT OF PROBLEM  PROCESS  FRAMEWORK  RESEARCH METHODOLOGIES  CASE STUDY  RESULT & DISCUSSION  CONCLUSION 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 5. Peter Drucker “There are: Companies, That make thing happen …… Companies, That watch things happen …. Companies, That wonder what happened ….. “ 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 6. INTRODUCTION Confidentiality: Is a set of rules that limits access to information. Integrity: Is the assurance that the information is trustworthy and accurate. Availability: Is a guarantee of reliable access to the information by authorized people. 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 7. INTRODUCTION  When most people hear the word “audit,” their first reflex is to cringe. Usually, it means having some outside team come in to review everything and tell them what they’re doing wrong in technical term.  An IT audit is the: 1. Examination and evaluation of an organization’s information technology infrastructure. 2. Policies and operations. Information technology audits determine: 1. Whether IT controls protect corporate assets 2. Ensure data integrity and are aligned with the business’s overall goals. IT auditors examine not only physical security controls, but also overall business and financial controls that involve information technology systems. 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 8. WHY TO AUDIT  Company knows only after attack  Are client/ customer safe to invest ? - Invest Data - Invest Information - Invest Money - Invest Career and so on.  Are promoter and shareholder safe ?  What will be the loss value ?  When will you recover ?  What sort of Disaster you may face ? 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 9. CYBER ATTACK  Story Time  4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 10. PAST ATTACK NATURE 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 11. PURPOSE  The purposes of an IT audit are to evaluate the system's internal control design and effectiveness.  This includes, but is not limited to, efficiency and security protocols, development processes, and IT governance or oversight. 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 12. STATEMENT OF PROBLEM  Many organizations are spending large amounts of money on IT because they recognize the tremendous benefits that IT can bring to their operations and services. However, they need to ensure that their IT systems are reliable, secure and not vulnerable to computer attacks.  Introduction of New Threads and Attack are you updated ?  Assurance of IT system adequately protected  Less knowledge on IT  Not providing importance to data  Continuous loss of data and hacked 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 13. PROBLEM STATEMENT – Practical Gap Less Investment , High Risk 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 14. SOLUTION  To give assurance that IT systems are adequately protected.  Provide reliable information to user and properly managed to achieve their intended benefits.  Reduce Risk of data tampering  Reduce Data loss or leakage  Reduce Service disruption  Provide Proper management of IT System 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 15. MOTIVATION Different kinds of cyber attacks that are mostly transpired in Nepal. List of those cyber attacks are as mentioned:  Attacks on social media  Piracy  Identity Threat  Unauthorized access  Website hacking 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 16. CASE STUDY 1 1.Pune Citibank MphasiS Call Center Fraud some ex employees of BPO arm of MPhasis Ltd MsourcE, defrauded US Customers of Citi Bank to the tune of RS 1.5 crores has raised concerns of many kinds including the role of "Data Protection". The crime was obviously committed using "Unauthorized Access" to the "Electronic Account Space" of the customers. It is therefore firmly within the domain of "Cyber Crimes". 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 17. CASE STUDY 2 WannaCry  The most infamous ransomware attack of 2017 was a strain of ransomware called WannaCry that spread all over the globe.  The ransomware targeted numerous public utilities and large corporations, most notably National Health Service hospitals and facilities in the United Kingdom, hobbling emergency rooms, delaying vital medical procedures, and creating chaos for many British patients.  Though the origin of WannaCry is not yet known, the US government has blamed the Kim Jong-un-led North Korean government for initiating the attack 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 18. CASE STUDY 3 3. The Bank NSP Case The Bank NSP case is the one where a management trainee of the bank was engaged to be married. The couple exchanged many emails using the company computers. After some time the two broke up and the girl created fraudulent email ids such as "indianbarassociations" and sent emails to the boy's foreign clients. She used the banks computer to do this. The boy's company lost a large number of clients and took the bank to court. The bank was held liable for the emails sent using the bank's system. 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 19. CASE 4: Attacks in 2017  Petya/NotPetya: Affected Across the globe in 2017, spread in computers, pharmaceutical company merck, damish shipping company, Russian oil giant rosneft, power companies in Ukrainian, airports, public transit and country’s central bank.  Zomato hack: zomato, largest restaurant aggregators in India was hacked and some of it’s user accounts were being sold on the dark web.  The HBO Hack: Revealed script for Episode 4 of season 7 of Game of Thrones, which was scheduled to be released the following week, was put up online for the whole world to see.  Equifax: In July, a group of hacker penetrated Equifax, one of the largest credit bureaus in the worlds and stole personal data of 145 million people. 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 20. Top Attack 1. Adobe was going through hell: 2.9 million accounts was stolen. 2. Panic to sony: Personal data of 77 million users which was leaked to public. 3. The south Korean Nightmare: Data from 100 million credit cards had been stolen. 4. Target Targeted: Data from 110 million customers was hijacked, including 40 million customers and personal data. 5. Adult Friend Finder exposed: Dating site was attacked, 4 million accounts was made public. 6. Marriott Hotels: Privacy of 500 million customers compromised, including banking data. 7. Theft of more than 1 billion passwords: Russian hackers stole 1.2 billion logins and passwords on 420000 websites. 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 21. Nepal Bank Got Hacked  4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 22. IS Risk Measure/ Level INFORMATION SECURITY RISK RATING SCALE EXTREME (13 – 15) Extreme risk of security controls being compromised with the possibility of catastrophic financial losses occurring as a result. (HUGE LOSS) HIGH (10 – 12) High risk of security controls being compromised with the potential for significant financial losses occurring as a result. (MID LEVEL LOSS) ELEVATED (7 – 9) Elevated risk of security controls being compromised with the potential for material financial losses occurring as a result. (MINOR LOSS) MODERATE (4 – 6) Moderate risk of security controls being compromised with the possibility of limited financial losses occurring as a result. (COMPROMISE LOSS) LOW (1 – 3) Low risk of security controls being compromised with measurable negative impacts as Loss. (NEGATIVE IMPACT) 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 23. IT Audit Process  The below provided are the basic steps in performing the Information Technology Audit Process. 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 24. Audit Program Management Process Flow 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 25. Conceptual Framework The five pillars are briefly explained below:  Legal: Measured based on the existence of legal institutions and frameworks dealing with cyber security and cybercrime.  Technical: Measured based on the existence of technical institutions and frameworks dealing with cyber security.  Organizational: Measured based on the existence of policy coordination institutions and strategies for cyber security development at the national level.  Capacity Building: Measured based on the existence of research and development, education and training programme; certified professionals and public sector agencies fostering capacity building.  Cooperation: Measured based on the existence of partnerships, cooperative frameworks and information sharing networks. 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 26. Pillars and Sub Pillars 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 27. Final Prototype 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 28. Simplified Audit Process 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 29. Framework Components Defined  Owner: The person or entity that has been given formal responsibility for the security.  Asset: Any tangible or intangible resource that has value to the owner of the organization or entity.  Data: A collection of all financial and nonfinancial facts, records and information.  Containers: the place where an information asset or data “lives” or any type of information asset (data) is stored.  Security Objective: A Statement of intent to counter specified threads and/or satisfy specified organizational security policies or assumptions.  Vulnerability: A flaw or weakness of an asset or group of assets that can be exploited by one or more threats.  Threat: An unwanted incident that may result in harm to a system or organization.  Sources: Either intent and method targeted at the intentional exploitation of a vulnerability or a situation and method that may accidentally trigger a vulnerability.  Attack: Any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset.  Severity: The level of harm that may occur as a result or exposure to or contact with a hazard.  Risk: The likelihood of harm occurring, combined with the potential severity of an event, to produce a level of risk or risk rating.  Audit process: A step-by-step procedure to achieve the security objective of an asset. 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 30. METHODOLOGY  Quantitative Research Methodology has been used in this research. The research theory of this paper has been to construct knowledge and meaning from Researchers experience, that is, Constructivism, which has direct application to education. The research theory indicates technological Constructivism.  Primary data were collected by means of online survey, Questionnaire and Interview where professionals from different areas of ICT were chosen, which helped to study current situation in Nepal. Secondary data were collected from several comparative studies of different research papers/ journals, websites, newspaper which helped to gather information on international level. 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 31. RESULT & DISCUSSION  A survey was conducted to support this research and different charts are presented for further clarifications. There were 108 respondents to qualify in Fig. 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 32. RESULT & DISCUSSION Cont …  Shows attacks from 2007 to 2014 has been growing relatively with prominent probability of attacks in any components of security audit mentioned in Fig. 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 33.  Depicts experience on the different types of attacks or vulnerabilities experienced by user from 2007-2014 by ICT users from different fields as in Fig. 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 34.  Depicts IS Audit Awareness in Nepal by 83.58% which looks promising as IS Audit practicing would not be very difficult job to begin. 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 35. CONCLUSION Information Security is an increasingly important part of our life today, and the degree of interconnectivity of  Networks implies that anything and everything can be exposed, and everything from national critical  Infrastructure to our basic human rights can be compromised. Governments are therefore urged to  Consider policies that support continued growth in technology sophistication, access and security, and as a crucial first step, to adopt a national cyber security strategy.  Risk assessment and security audit has to be conducted eventually to minimize and mitigate risks. Local law, local and international standards and policy must be followed while preparing the ICT Security policies in an organization. Audit is must for data security assurance. This research has proposed an audit model for IS Audit which is highly recommended for IS Audit in any IS Audit and Security Vulnerability minimizing. 4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal
  • 36. QUESTION & ANSWER THANK YOU  4/6/2019 NPCERT to Host First Cyber Security Meetup in Nepal