Cyberwar: How Prepared Is Nepal?

The main reason Nepal became a target of cyber attackers was because of the chaos and dilemma caused by the earthquake.

The proliferation of Internet usage in the recent years has changed the way we interact daily.

Right from the usage of e-Commerce, online banking, social networking sites up to connecting every single device like the Internet of things, IOT i.e. toasters, refrigerators, televisions, temperature controls, home automation systems, nuclear power station to the Internet and controlling them from any end point of the globe have been developed.

After land, sea, air and space, warfare has entered the fifth domain: cyberspace.

Back in the old days, war was fought either from land, sea, air, and space with guns, ammunition, fighter jets, missiles, but now an individual or even a group of individuals can wage a war with just a use of computers and working Internet connection, right from their bed while taking a sip of tea and in pajamas.

So, cyber warfare is the art and science of fighting without fighting; defeating an opponent without spilling their blood. In other words, cyber war refers to the action by a nation-state, to penetrate other nations’ computers and networks for the purpose of causing damage or disruption.

These days almost all the nations are fully dependent on the Internet for storage and transference of information and information in this era has become a critical part of daily operations.

What we say, what we do, what we share, what we plan are very critical information we hold as an individual or as a nation overall, and this information could be used against us.

The Internet was not originally designed with security in mind, but as an open system to allow scientists and researchers to send data to one another quickly. Without strong investments in cyber security and cyber defenses, data systems remain open and susceptible to rudimentary and dangerous forms of exploitation and attack.

Back in the old days (the late 80’s and early 90’s), hackers used to break into systems for fun and with motive of learning new things. Robert Tappan Morris, a Cornell University graduate student who released the most notable internet worm also known as ‘Morris worm’ on November of 1988, was where the people started noticing the ability and potential of the Internet.

Vulnerability of Nepal

Nepal is also extremely vulnerable to cyber-attacks and is encountering a high number of malware attacks on a daily basis. The Asia Pacific region is especially vulnerable with emerging markets most at risk of malware threats.

Nepal has also become a target and being exploited by cyber-criminals and state sponsored hackers. Previously, Naikon also known as APT-30 (Advanced Persistent Threat) group, has targeted military, government and civil organizations and exploited them.

Carbanak, an APT style attack, also resulted in financial loss for Nepal and almost thirty other countries. These types of attacks are growing rapidly although Nepal has not developed much in terms of technology.

Although Nepal has Information Technology Security Emergency Response Team (ITSERT-NP) it does not actively participate in research and development nor do they participate in active intelligence gathering and learning about new threats and spreading awareness.

Technical personnel capable of defending the national level infrastructure are extremely limited and are always outnumbered by start-up hackers. Lack of training, resource, materials and especially security awareness seem to be the problem in Nepal.

The first phase should be divided into learning defensive tactics and then gradually developing offensive techniques and eventually building up an elite cyber task force for national defense of information and security of Nepal.

During 2014-2015 Nepal was highly vulnerable to cyber-attacks since the national infrastructure almost collapsed because of the massive earthquake, and as a result, thousands of websites and servers, including servers from government, military and private servers, were victims of huge cyber-attacks and cyber vandalism.

Most of the websites are built by people who have little or no knowledge about security and on top of that the websites are built for small amounts ranging from a minimum of five thousand to fifty thousand rupees.

Until and unless the gap between developers and security people are bridged, cyber-attacks will continue and will be a big curse for Nepalese economy and national infrastructure.

There is no such thing as hack-proof security but still adding an extra layer of security and using the concept of defense in depth will make attackers put in more effort, time and resource.

No matter how deep the defense is or how hard you are trained to defend, an attacker will always find a way inside and eventually break into the systems, but that does not mean to do nothing. We can never predict a cyber-war until we start one.

Previous attacks could be of great help to predict future attacks and patterns of attacks. We can expect satellites, naval forces, aircraft, missiles and rockets being hacked and exploited to cause severe damage to the global economy and infrastructure.

If we do not prepare now for cyber warfare, develop threat intelligence and prepare defensively then it could raise massive threats.

Ein News:      Cyber Warfare: Regional Is Becoming Global:

 

« How Much Cyber Insurance Is Enough?
Iranian Malware Delivered Via Fake Oxford University Sites »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Wizard Computing

Wizard Computing

Wizard Computer Services is a full service IT solutions provider that offers managed services, consultation, installation, and support to small and large businesses in New England.

Wireless Logic

Wireless Logic

Wireless Logic delivers a range of secure and resilient value-added M2M/IoT managed services that empower remote devices to communicate cost-effectively, two ways.

Threat Intelligence

Threat Intelligence

Threat Intelligence is a specialist security company providing penetration testing, threat intelligence, incident response and training services.

SCIS Security

SCIS Security

SCIS Security provides affordable cyber security services and solutions to small to medium sized businesses and homes.

Kryptus

Kryptus

Kryptus provides a wide array of solutions for hardware, firmware and software ranging from semiconductors to complex digital certificate management systems.

Information Technology Industry Development Agency (ITIDA)

Information Technology Industry Development Agency (ITIDA)

ITIDA has two broad goals: building the capacities of Egypt’s local information and communications technology (ICT) industry and attracting foreign direct investments to boost the ICT sector.

APT Search

APT Search

APT Search is a recruitment company specialising within the Legal Technology, Cybersecurity and Privacy sectors.

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity make Cars & Infrastructures Cybersecure.

HOBI International

HOBI International

HOBI International is a leading mobile, IT and data center asset management provider with solutions for device management, reverse logistics, data erasure, refurbishment and recycling.

Enterprise Ethereum Alliance (EEA)

Enterprise Ethereum Alliance (EEA)

EEA is a member-led industry organization whose objective is to drive the use of Ethereum blockchain technology as an open-standard to empower ALL enterprises.

Axxum Technologies

Axxum Technologies

Axxum Technologies is a premier provider of Network Communications and Information Technology Security Solutions.

Kindus

Kindus

Kindus is an IT security, assurance and cyber security risk management consultancy.

Zigrin Security

Zigrin Security

Zigrin Security offer comprehensive, hands-on security testing of internal networks, applications, cloud-based solutions, e-commerce applications and mobile devices.

e-Xpert Solutions

e-Xpert Solutions

e-Xpert Solutions is a company specialized in the Information Security field since 2001. Our skills are strong technical expertise and the development of tailor-made solutions.

TriCIS

TriCIS

TriCIS design and engineer highly secure integrated solutions that meet the highest government and military security standards, providing information assurance to organisations across the globe.

ExactTrak

ExactTrak

ExactTrak provide embedded cyber security solutions for your digital devices – whenever and wherever you need them.