Open Access   Article Go Back

High Risk of Cybercrime, Threat, Attack and Future Challenges in Nepal

Shailendra Giri1 , Subarna Shakya2

Section:Research Paper, Product Type: Journal Paper
Volume-8 , Issue-2 , Page no. 46-51, Feb-2020

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v8i2.4651

Online published on Feb 28, 2020

Copyright © Shailendra Giri, Subarna Shakya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shailendra Giri, Subarna Shakya, “High Risk of Cybercrime, Threat, Attack and Future Challenges in Nepal,” International Journal of Computer Sciences and Engineering, Vol.8, Issue.2, pp.46-51, 2020.

MLA Style Citation: Shailendra Giri, Subarna Shakya "High Risk of Cybercrime, Threat, Attack and Future Challenges in Nepal." International Journal of Computer Sciences and Engineering 8.2 (2020): 46-51.

APA Style Citation: Shailendra Giri, Subarna Shakya, (2020). High Risk of Cybercrime, Threat, Attack and Future Challenges in Nepal. International Journal of Computer Sciences and Engineering, 8(2), 46-51.

BibTex Style Citation:
@article{Giri_2020,
author = {Shailendra Giri, Subarna Shakya},
title = {High Risk of Cybercrime, Threat, Attack and Future Challenges in Nepal},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2020},
volume = {8},
Issue = {2},
month = {2},
year = {2020},
issn = {2347-2693},
pages = {46-51},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5030},
doi = {https://doi.org/10.26438/ijcse/v8i2.4651}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v8i2.4651}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5030
TI - High Risk of Cybercrime, Threat, Attack and Future Challenges in Nepal
T2 - International Journal of Computer Sciences and Engineering
AU - Shailendra Giri, Subarna Shakya
PY - 2020
DA - 2020/02/28
PB - IJCSE, Indore, INDIA
SP - 46-51
IS - 2
VL - 8
SN - 2347-2693
ER -

VIEWS PDF XML
631 439 downloads 181 downloads
  
  
           

Abstract

Government organizations, citizens, businesses are being victimized by cyber-attacks, crimes, and threats. Globally people have been using cyber safety in every sector of daily life but huge numbers of criminal activities are increasing day by day using ICT tools and applications. The purpose of this paper is to explorer the high risk of cyberattacks, crime, threat and future challenges in Nepal. The study was carried out using content analysis, analysis of various survey reports and in-depth interviews with subject experts. The study claims that high risk of a cyberattack, crime, and threat have been increasing unexpectedly in various sector of Nepalese society. It is essential to make a common strategy to reduce the increasing technical risk related to cyber. The risk of cyberattack, crime, and threat is very high. So, IT audit must be made compulsory in each and every organization and original operating system as well as application software used. Strong cybersecurity precautions and technologies ought to be adopted during the installation of ICT automation. The paper claims that not only the banking sector but also the Government of Nepal should appoint cybersecurity personnel in their services so that the expert team will be able to fight against the cyber attack. As time is demanding ‘Cyber Army’ in Nepal, the Government should not delay forming a new force ‘Cyber Army’.

Key-Words / Index Term

Cyber crime, Challenges, Cyber threat, Cyber attack, IT audit, e-governance

References

[1]
  Shailendra Giri. Cyber Crime, Cyber
threat, Cyber Security Strategies and Cyber Law in Nepal.
Pramana Research
Journal. Vol. 9, Issue 3, PP. 662-67, 2019.  



[2]   Shailendra Giri and Subarna Shakya. Cybercrime,
Cyber Ethics, Cyber Law and Cyber Security.
Proceeding of International
Youth Conference on Science, Technology and Innovation (IYCSTI-2019). Kathmandu,
Nepal, October 21-23,   pp-594-597,
2019.



[3]
  S. Shriram. Cyber Security and
Related Crimes in Indian Senario.
International Journal of Current
Research, Vol. 6, Issue, 03.
pp.5403-5412, 2014



 [4]  Shailendra
Giri and Subarna Shakya. Cloud Computing and Data Security Challenges: A
Nepal Case.
International Journal of Computer Trends and Technology. Vol. 67, Issue 3. PP 146-150, 2019.



 [5] P.
SITBON. A Cyber Security Approach for Smart Meters at ERDF. Modeling Cyber
Security: Approaches, Methodology, Strategies U. Gori (Ed.).
(2009). IOS
Press, Netherland. doi:10.3233/978-1-60750074-2-93.



[6]
  Maurizio Martellini. Cyber Security.
Springer Cham Heidelberg New York Dordrecht, 
London, 2013. DOI 10.1007/978-3-319-02279-6



[7]
  Shaheen Ayyub,  and Devshree Roy. Cloud Computing
Characteristics and Security Issues.
International Journal of Computer
Sciences and Engineering. Vol. 1, Issue 4,
pp. 18-22, December 2013



 [8] U.S. Army Training and Doctrine command. Cyber
Operations and Cyber Terrorism,
Handbook No. 1.02 P.II-1 and II-3, USA., 15
August 2005



[9]  L. Serena.
A Fuzzy Approach to Security Codes: Cryptography between Technological
Evolution and Human Perception Modeling Cyber Security: Approaches,
Methodology, Strategies U. Gori (Ed.) IOS Press, Netherland, 2009. 
doi:10.3233/978-1-60750-074-2-43.



[10]
        A.VIDALI. Striking the Balance:
Security vs. Utility.
IOS Press, Netherlands, 2009.



 [11]        Global
Cybersecurity Index-2018. International 
Telecommunication Union.
ITU Publications. Published in Switzerland
Geneva, 2019.



 [12]        Chuda
Bahadur Roka, Cybercrime and Security in Nepal: The Need For Two-Factor
Authentication In Social Media.
Crossing the Border: International Journal
of Interdisciplinary Studies, Vol. 5,
Issue 2
, pp. 16-31. 15 July 2017.
DOI: https://doi.org/10.3126/ctbijis.v5i2.18436



[13]
D. Kumar and N. Panchanatham. A case study on Cyber Security in
E-Governance.
International Research Journal of Engineering and Technology (IRJET).
Vol 2, Issue 8, pp 272-275, 2015.



[14]
Elias G. Carayannis and David F.J. Campbell. Cyber-Development,  Cyber- Democracy  and Cyber-Defense. Springer
Science+Business Media, New York, 2014. DOI: 10.1007/978-1-4939-1028-1



[15]
Shailendra Giri. E-government Use in Nepal: Issues of Database Management
and Data Security.
Journal of Institute of Engineering, Tribhuvan
University, Nepal. Vol. 15,  Issue 2. pp. 226-232 , 2019. 



[16]
        Obama, B. International
stragegy for cyberspace: Prosperity, security and openness in a network world.

The White House. USA, 2011.



[17]
        Keiko Hashizume, Davidd G Rosado,
Eduardo Fernandez Mendina and Eduardo Fernadez. An analysis of Security
Issues for Cloud Computing.
Journal of Internet Services and
Applications.  A Springer Open Journal
4:5 , pp. 1-13, 2013



[18]
        Aboul Ella Hassanien and Mohamed
Elhoseny. Cybersecurity and Secure Information Systems. Advanced
Sciences and Technologies for Security Applications. Springer Nature.
Switzerland, 2019. DOI:10.1007/978-3-030-16837-7