Introduction with malware and cyber criminals like

Introduction General introduction The topic digital security often brings the image in the mind where security of computers, mobile devices and other systems are riddled with malware and cyber criminals like crackers are ready to steal the data and crash the systems. This is a serious problem. Criminal activities like accessing the data servers without permission, breaking into the sensitive government sites and issues in the sites like LinkedIn are some of the example of the area that requires the digital security. (Shipley, 2014)Current scenarioIn the emerging era of the global network, securing the information is one of the challenging and most important issue. (farnendez, 2017). Today this is the emerging topic in the world.  The professor from The New State University had developed the software that can recognize the person from their typing styles. (Schafer, 1996). This proves that the importance and emergence of the digital security is increasing day by days.BackgroundMost of the people using internet thinks that they are safe in the internet world. But in many cases they are being threatened by the internet sources. Since, the activities done in the digital media are rarely tracked by the others most of the people are vulnerable towards many dangerous sites. Maintaining the digital security in one’s life is very difficult these days. They are exploited to many kinds of digital bulling and crimes knowingly or unknowingly. The role of digital security is much more in today’s context so, that it is emerging and many new techniques are being built for its purpose. (digiteen.wikispaces.com, 2008)History The history of digital security dates back to 1970s.t6his was the first time when the hackers are tracked in the case of doing free calls known as “phreaking”. On 1980s the first computer malware was spotted known as “brain”. From which the need of digital security is felt by the developers. The year 1990s bought the tremendous attacks on the computer system. Attacks like distributed denial of services and Bots attacks are created. Beyond malwares there was also the rapid phishing attacks as the digital security was loose and many of the system users are not aware about the facts. This leads to Privacy watchdogs called out as tracking cookies, allowing ad networks to monitor the user and their surfing behaviors. Later, the first decades of the century saw the malicious attacks in the system. Adware and spyware entered the systems. Besides the malware and spyware big name threats like Code Red, Nimda, welchia, and slammer all begin to take the advantage of the week security. Phishing attacks also became the popular and slowly movers towards the social networking sites. ( Symantec, 2009)Working mechanism of Digital Security Here is the simple working mechanism of Digital Security System shown as the model representation. We can use the system as a watch Dog by installing the sensing loops around the building. The loop wires are stretch two feet above the ground to get notified that there is illegal entry of the someone.Digital Security Circuit (model reference)Here, wire loops 1, 2, 3 are interconnected to the points A,B and C, and inputs of seven segment decoder 4511 respectively. But the D input of the IC1 is grounded. These loops are then connected to double 3-input NOR gate and then to the inverter named CD4000 5to make the ringing of the alarm. Figure 1: Model view of Digital Security CircuitHere, figure1 shows the view of the digital security circuit whereas figure 2 shows the wiring view of loop.  Figure 2: Preview wiring diagram of the loopThe circuit works in 9V power supply.to regulate the uninterrupted security the continuous power supply is recommended. The 7 segmented display is used to know whether the loops are intact or not. Circuit Operation:If the loop 1 is broken then the display show ‘1’.If more than one loops are broken then the screen will show the sum of the broken loops. For example if loop 3 and 1 are broken then the display will show 4(3+1). When all the loops are enacted then the display remain to 0. All the three inputs of gate N1 remain low to give the high output. Then the output is given to gate N2 and as a result the output remains low. This will keep the transistor T1 to the cut=off position and the alarm is not ringed.When there is breakage of any kinds of the loops then the output of the NOR gate N becomes low, and the output of the gate N2 goes high which leads the transistor T1 to co9nduct and the buzzer rings and alert you. The alarm can be muted by switching the power off to the circuit through the switch S1. (Islam, 2017)Current Scenario in NepalIn today’s context of Nepal the breaking of the digital security of any of the organization is broadcasted by many news media and sources. Poor digital access, intuitional instability are the major reasons for the low digital security. However the cyber security policies of Nepal cannot address the modern cyber treats. According to the survey conducted by the IT specialist RamHari Subedi the incident of digital security breaking is conducted because of the week policy of the system and this kinds of though was presented by the 67% of the survey conducted people. There is no proper law to punish the criminal who breaks the digital security. Due to the low security the emails and others computer transaction are not considered as the trustworthy by the government.t5ill the date Nepal police is working with the outdated cyber law Act of 2006/2007.After the passed of this Act from the legislative there is no any reforms made in the act. The five years and/or fine of USD 1000 i9s the punishment declared by the government to those who harms the digital security.Most of the problem arises due to the cost efficient option. Using the genuine software is more expensive then the user prefers the cheap one which is pirated and can be used for breaking the security. The police department has claimed that awareness programs are conducted from time to time for Digital Security. The banking sectors claims that their security is now fully protected through many of the strategies likes, use of genuine VPN, firewalls ,backup system etc. (Subedi, 2015)But the recent activities of the hacking of the Nepal Rastra bank sites proves that it is only in the papers. The site was hacked by the same group who hacked Nepal’s official .np domain registration system. Figure 3  Nepal Rastra Bank’s website hacked                                                      Figure 4: Nepal’s Official .np ccTLD Domain registration website hacked.Implementation in NepalNepal is one of the developing country. Here are not so many advanced technology that rest of the world have. Although, there is rapid progress in the technology field that about more than 90% of Nepal’s total population use digital media for any of the purpose. There are many incident that proves that the security of the digital media is too low. Flashing of the customer database of largest telecom Nepal telecom, to hacking the site of the famous mercantile company proves that the security level. In this kinds of situation the digital security can be one of the best solutions for the problem. First of all the digital security should be maintained to one’s home network system. Without knowing the future consequences of the weak security the network shouldn’t be started. Many peoples are not aware of the frauds in the online so they share password and credit card pins so that they are compelled to lose their money. Every of the educational institution should provide the knowledge of the security measures to the students there should be made strong firewalls in the school’s and colleges system so that the students can be safe from the attacks like phishing of password to  redirecting them to dark web links.The banks should upgrade their system to latest Introduction

General
introduction

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

The topic digital
security often brings the image in the mind where security of computers, mobile
devices and other systems are riddled with malware and cyber criminals like crackers are ready to steal the data and
crash the systems. This is a serious problem. Criminal activities like
accessing the data servers without permission, breaking into the sensitive
government sites and issues in the sites like LinkedIn are some of the example
of the area that requires the digital security. (Shipley,
2014)

Current scenario

In the emerging era of the global network, securing
the information is one of the challenging and most important issue. (farnendez, 2017).
Today this is the emerging topic in the world.  The professor from The New State University had
developed the software that can recognize the person from their typing styles. (Schafer,
1996). This proves that the importance and emergence
of the digital security is increasing day by days.

Background

Most of the people using internet thinks that they
are safe in the internet world. But in many cases they are being threatened by
the internet sources. Since, the activities done in the digital media are rarely
tracked by the others most of the people are vulnerable towards many dangerous
sites. Maintaining the digital security in one’s life is very difficult these
days. They are exploited to many kinds of digital bulling and crimes knowingly
or unknowingly. The role of digital security is much more in today’s context
so, that it is emerging and many new techniques are being built for its
purpose. (digiteen.wikispaces.com, 2008)

History

The history of digital security dates back to
1970s.t6his was the first time when the hackers are tracked in the case of
doing free calls known as “phreaking”. On 1980s the first computer malware was spotted
known as “brain”. From which the need of digital security is felt by the developers.
The year 1990s bought the tremendous attacks on the computer system. Attacks
like distributed denial of services and Bots attacks are created. Beyond
malwares there was also the rapid phishing attacks as the digital security was
loose and many of the system users are not aware about the facts. This leads to
Privacy watchdogs called out as
tracking cookies, allowing ad networks to monitor the user and their surfing behaviors.
Later, the first decades of the century saw the malicious attacks in the
system. Adware and spyware entered the systems. Besides the malware and spyware
big name threats like Code Red, Nimda, welchia, and slammer all begin to take
the advantage of the week security. Phishing attacks also became the popular
and slowly movers towards the social networking sites. ( Symantec,
2009)

 

 

Working mechanism of Digital Security

Here is the simple working mechanism of Digital
Security System shown as the model representation. We can use the system as a watch
Dog by installing the sensing loops around the building. The loop wires are stretch
two feet above the ground to get notified that there is illegal entry of the someone.

Digital Security Circuit (model reference)

Here, wire loops 1, 2, 3 are interconnected to the
points A,B and C, and inputs of seven segment decoder 4511 respectively. But
the D input of the IC1 is grounded. These loops are then connected to double
3-input NOR gate and then to the inverter named CD4000 5to make the ringing of
the alarm.

Figure
1: Model view of Digital Security
Circuit

Here, figure1 shows the view of the digital security
circuit whereas figure 2 shows the wiring view of loop.

Figure
2: Preview wiring diagram of the
loop

 

The circuit works in 9V power supply.to regulate the
uninterrupted security the continuous power supply is recommended. The 7
segmented display is used to know whether the loops are intact or not.

Circuit Operation:

If the loop 1 is broken then the display show ‘1’.If
more than one loops are broken then the screen will show the sum of the broken loops.
For example if loop 3 and 1 are broken then the display will show 4(3+1). When
all the loops are enacted then the display remain to 0. All the three inputs of
gate N1 remain low to give the high output. Then the output is given to gate N2
and as a result the output remains low. This will keep the transistor T1 to the
cut=off position and the alarm is not ringed.

When there is breakage of any kinds of the loops then
the output of the NOR gate N becomes low, and the output of the gate N2 goes
high which leads the transistor T1 to co9nduct and the buzzer rings and alert you.
The alarm can be muted by switching the power off to the circuit through the
switch S1. (Islam, 2017)

 

 

 

 

 

 

 

Current
Scenario in Nepal

In today’s context of Nepal the breaking of the
digital security of any of the organization is broadcasted by many news media
and sources. Poor digital access, intuitional instability are the major reasons
for the low digital security. However the cyber security policies of Nepal cannot
address the modern cyber treats. According to the survey conducted by the IT specialist
RamHari Subedi the incident of digital security breaking is conducted because
of the week policy of the system and this kinds of though was presented by the
67% of the survey conducted people. There is no proper law to punish the
criminal who breaks the digital security. Due to the low security the emails
and others computer transaction are not considered as the trustworthy by the
government.t5ill the date Nepal police is working with the outdated cyber law
Act of 2006/2007.After the passed of this Act from the legislative there is no any
reforms made in the act. The five years and/or fine of USD 1000 i9s the
punishment declared by the government to those who harms the digital security.

Most of the problem arises due to the cost efficient
option. Using the genuine software is more expensive then the user prefers the
cheap one which is pirated and can be used for breaking the security. The
police department has claimed that awareness programs are conducted from time
to time for Digital Security. The banking sectors claims that their security is
now fully protected through many of the strategies likes, use of genuine VPN, firewalls
,backup system etc. (Subedi, 2015)But the recent
activities of the hacking of the Nepal Rastra bank sites proves that it is only
in the papers. The site was hacked by the same group who hacked Nepal’s official
.np domain registration system.

Figure 3  Nepal Rastra
Bank’s website hacked

 

                                                  

  Figure 4: Nepal’s Official .np ccTLD Domain registration
website hacked.

 

 

 

 

 

 

 

 

 

 

 

 

Implementation in Nepal

Nepal is one of the developing country. Here are not so many
advanced technology that rest of the world have. Although, there is rapid progress
in the technology field that about more than 90% of Nepal’s total population
use digital media for any of the purpose. There are many incident that proves
that the security of the digital media is too low. Flashing of the customer database
of largest telecom Nepal telecom, to hacking the site of the famous mercantile
company proves that the security level. In this kinds of situation the digital
security can be one of the best solutions for the problem. First of all the
digital security should be maintained to one’s home network system. Without knowing
the future consequences of the weak security the network shouldn’t be started. Many
peoples are not aware of the frauds in the online so they share password and
credit card pins so that they are compelled to lose their money. Every of the
educational institution should provide the knowledge of the security measures
to the students there should be made strong firewalls in the school’s and
colleges system so that the students can be safe from the attacks like phishing
of password to  redirecting them to dark
web links.

The banks should upgrade their system to latest

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Conclusion

 

 

 Conclusion

Go Top
x

Hi!
I'm Eleanor!

Would you like to get a custom essay? How about receiving a customized one?

Check it out