High Risk of Cybercrime, Threat, Attack and Future Challenges in Nepal
DOI:
https://doi.org/10.26438/ijcse/v8i2.4651Keywords:
Cyber crime, Challenges, Cyber threat, Cyber attack, IT audit, e-governanceAbstract
Government organizations, citizens, businesses are being victimized by cyber-attacks, crimes, and threats. Globally people have been using cyber safety in every sector of daily life but huge numbers of criminal activities are increasing day by day using ICT tools and applications. The purpose of this paper is to explorer the high risk of cyberattacks, crime, threat and future challenges in Nepal. The study was carried out using content analysis, analysis of various survey reports and in-depth interviews with subject experts. The study claims that high risk of a cyberattack, crime, and threat have been increasing unexpectedly in various sector of Nepalese society. It is essential to make a common strategy to reduce the increasing technical risk related to cyber. The risk of cyberattack, crime, and threat is very high. So, IT audit must be made compulsory in each and every organization and original operating system as well as application software used. Strong cybersecurity precautions and technologies ought to be adopted during the installation of ICT automation. The paper claims that not only the banking sector but also the Government of Nepal should appoint cybersecurity personnel in their services so that the expert team will be able to fight against the cyber attack. As time is demanding ‘Cyber Army’ in Nepal, the Government should not delay forming a new force ‘Cyber Army’.
References
[1] Shailendra Giri. Cyber Crime, Cyber threat, Cyber Security Strategies and Cyber Law in Nepal. Pramana Research Journal. Vol. 9, Issue 3, PP. 662-67, 2019.
[2] Shailendra Giri and Subarna Shakya. Cybercrime, Cyber Ethics, Cyber Law and Cyber Security. Proceeding of International Youth Conference on Science, Technology and Innovation (IYCSTI2019). Kathmandu, Nepal, October 21-23, pp-594-597, 2019.
[3] S. Shriram. Cyber Security and Related Crimes in Indian Senario. International Journal of Current Research, Vol. 6, Issue, 03. pp.5403-5412, 2014
[4] Shailendra Giri and Subarna Shakya. Cloud Computing and Data Security Challenges: A Nepal Case. International Journal of Computer Trends and Technology. Vol. 67, Issue 3. PP 146-150, 2019.
[5] P. SITBON. A Cyber Security Approach for Smart Meters at ERDF. Modeling Cyber Security: Approaches, Methodology, Strategies U. Gori (Ed.). (2009). IOS Press, Netherland. doi:10.3233/978-1-60750074-2-93.
[6] Maurizio Martellini. Cyber Security. Springer Cham Heidelberg New York Dordrecht, London, 2013. DOI 10.1007/978-3-319- 02279-6
[7] Shaheen Ayyub, and Devshree Roy. Cloud Computing Characteristics and Security Issues. International Journal of Computer Sciences and Engineering. Vol. 1, Issue 4, pp. 18-22, December 2013
[8] U.S. Army Training and Doctrine command. Cyber Operations and Cyber Terrorism, Handbook No. 1.02 P.II-1 and II-3, USA., 15 August 2005
[9] L. Serena. A Fuzzy Approach to Security Codes: Cryptography between Technological Evolution and Human Perception Modeling Cyber Security: Approaches, Methodology, Strategies U. Gori (Ed.) IOS Press, Netherland, 2009. doi:10.3233/978-160750-074-2-43.
[10] A.VIDALI. Striking the Balance: Security vs. Utility. IOS Press, Netherlands, 2009.
[11] Global Cybersecurity Index-2018. International Telecommunication Union. ITU Publications. Published in Switzerland Geneva, 2019.
[12] Chuda Bahadur Roka, Cybercrime and Security in Nepal: The Need For Two-Factor Authentication In Social Media. Crossing the Border: International Journal of Interdisciplinary Studies, Vol. 5, Issue 2, pp. 16-31. 15 July 2017. DOI: https://doi.org/10.3126/ctbijis.v5i2.18436
[13] D. Kumar and N. Panchanatham. A case study on Cyber Security in E-Governance. International Research Journal of Engineering and Technology (IRJET). Vol 2, Issue 8, pp 272-275, 2015.
[14] Elias G. Carayannis and David F.J. Campbell. Cyber-Development, Cyber- Democracy and Cyber-Defense. Springer Science+Business Media, New York, 2014. DOI: 10.1007/978-1- 4939-1028-1
[15] Shailendra Giri. E-government Use in Nepal: Issues of Database Management and Data Security. Journal of Institute of Engineering, Tribhuvan University, Nepal. Vol. 15, Issue 2. pp. 226-232 , 2019.
[16] Obama, B. International stragegy for cyberspace: Prosperity, security and openness in a network world. The White House. USA, 2011.
[17] Keiko Hashizume, Davidd G Rosado, Eduardo Fernandez Mendina and Eduardo Fernadez. An analysis of Security Issues for Cloud Computing. Journal of Internet Services and Applications. A Springer Open Journal 4:5 , pp. 1-13, 2013
[18] Aboul Ella Hassanien and Mohamed Elhoseny. Cybersecurity and Secure Information Systems. Advanced Sciences and Technologies for Security Applications. Springer Nature. Switzerland, 2019. DOI:10.1007/978-3-030-16837-7
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
