FEWA LAKESIDE PHOTOS 2077 Baisakh || Non-Copyright Images Nepal

Non-Copyright Photos. You can use these photos in your project, youtube videos and more other platforms for free. Free forever, even no need to credit the original author. But if you like to credit then you can mention : [Photo by “Bijay Acharya“, Distributed by “www.bhudki.com“]. FEWA LAKESIDE PHOTOS 2077 Baisakh || Non-Copyright Images Nepal […]

Continue Reading

BEGNAS PHOTOS 2077 Baisakh || Non-Copyright Images Nepal

Non-Copyright Photos. You can use these photos in your project, youtube videos and more other platforms for free. Free forever, even no need to credit the original author. But if you like to credit then you can mention : [Photo by “Bijay Acharya“, Distributed by “www.bhudki.com“]. BEGNAS PHOTOS 2077 Baisakh || Non-Copyright Images Pokhara, Nepal […]

Continue Reading

[Course] Police To Cyber Expert – Part 6 : Security Incident Response

Incident Response : Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident, or security incident. The goal is to handle the situation in a way that limits damage and reduces recovery time and costs. Responding to an incident […]

Continue Reading

[Course] Police To Cyber Expert – Part 5 : Nepal & Social Media Issues

I’ve already shown you in part 2 of this series that how a simple survey form is getting lots of Cyber Crime Reports. And remember, 90% of reports are all related with Social Media Accounts, more focused on Facebook right now. Some reports are about “Fake Profiles”, some about “Fake profile + Blackmailing”, some about […]

Continue Reading

[Course] Police To Cyber Expert – Part 4 : Nepal Government Responsibility

To achieve more achievements, Government must involve in Cyber Security Section. Government must prepare, execute and implement some of the key tasks to build more secure digital Nepal. There can be lots of wide variety of fields on cyber security that Government needs to involve in, but some of them are highlighted below. Government must […]

Continue Reading

[Course] Police To Cyber Expert – Part 3 : CIA Model & Cyber Security

Ok, warm welcome to those who are following this course from initial part. In this part, I will highlight the most important model/triad of Cyber Security, i.e. CIA.  Before any explanation, first see image below. And try to remember each words of CIA.   img src : https://www.kevinmagee.com/wp-content/uploads/2017/04/ciatriad.jpg Confidentiality, Integrity and Availability, (CIA triad), is a […]

Continue Reading

[Course] Police to Cyber Expert – Part 1 : Nepal Police Requirements

“Do not be afraid of failure, always try to achieve more, Never give up, Learn – Share & Grow” “This course is not for Child and not for Cyber Security Experts. Course flows in between, think before saying bad words, feedback is best, attitude wala experts are not welcome” “You are expert in cyber security […]

Continue Reading