SlideShare a Scribd company logo
1 of 14
Download to read offline
Cybercrime, Cybersecurity &
Cyberspace: LE Perspective
Dc¯’vcbvq- Bwjqvm †nv‡mb
cywjk cwi`k©K(wbt)
‡¯úkvj G¨vKkb MÖæc
KvD›Uvi †U‡ivwiRg G¨vÛ UªvÝb¨vkbvj µvBg
wWGgwc, XvKv|
cÖv³b, wWwRUvj d‡ibwmK G·cvU©, wmAvBwW, XvKv|
+8801919933221
saymeonline@gmail.com
Education:
B. Ed (Hon's), M. Ed, PGDICT, M.Sc (Cyber Security), MHRL
Training Course completed:
1. Enhancement of Cyber crime investigation capability of Bangladesh Police, Soonchung
Hung University, South Korea, June 2014.2. Cyber Security Course, Gujarat 2. Forensic
Science University, India 2016.
3. Exploit Hackers Tools & Technique, Singapore, October 2018.
4. Boot Camp on Access Data FTK, UAE Dubai, December 2018.
5. Windows Forensic, Singapore, March 2019.
Experience:
Serving as a Digital forensic Expert & Cyber Crime Investigator in Digital Forensics
Forensic Lab from February 2012 to July 2021.
Experience as a Facilitator:
From 2013 to till today I have conducted training in different venues like Police Academy,
Forensic Training Institute, Detective Training School, Cyber Crime Investigation Training
Center.
UN Mission Experience:
Served as Police Advisor in the United Nations Mission in South Sudan from
February 2017 to February 2018.
mvBevi µvBg/wWwRUvj Acivat
evsjv‡`‡k cÖbxZ Z_¨ I †hvMv‡hvM cÖhyw³ AvBb 2006 (ms‡kvabx/2013),
c‡b©vMÖvdx wbqš¿b AvBb 2012 Ges wWwRUvj wbivcËv AvBb 2018 G ewb©Z
kvw¯Í‡hvM¨ mKj AcivaB wWwRUvj Aciva/mvBevi µvBg|
wWwRUvj Aciv‡ai aiYt
Avgv‡`i †`‡k cÖPwjZ wWwRUvj Aciva¸‡jv n‡”Q-
1| Akøxj Qwe/wfwWI aviY, msiÿY, wecbb, cÖ`k©Y Kiv|
2| †mvm¨vj wgwWqvq gvbnvwbKi †jLv cÖPvi/Qwe-wfwWI Avc‡jvW Kiv|
3| ‡mvm¨vj wgwWqvi AvBwW /I‡qe mvBU n¨vwKs (`Lj) Kiv|
4| f‚qv I‡qemvBU ‰Zix K‡i cÖZvibv Kiv/ Mªvn‡Ki cÖK…Z Z_¨vw` wb‡q
cÖK…Z I‡qe mvB‡U cÖ‡ek K‡i Z_¨ Pzwi/Avw_©K ÿwZmn wewfbœ ai‡Yi
Aciva Kiv|
5| f~qv †gBj K‡i cÖZviYv Kiv/‡gBj †_ªW Kiv|
6| Kw¤úDUvi ev mvf©vi Gi WvUv web÷ Kiv ev †cÖvMÖvg †PÄ Kiv|
7| †gvevB‡ji †mvm© †KvW /AvBGgBAvB cwieZ©Y Kiv
8| †mvm¨vj wgwWqv‡K wewfbœ Aciv‡ai nvwZqvi wn‡m‡e e¨envi Kiv
(cixÿvi cÖkœcÎ dvum/ ‡MvcY msev` Av`vb-cÖ`vb Kiv)|
9| AbjvB‡b cY¨ µq Ki‡Z wM‡q cÖZviYvi dv‡` civ|
10|AbjvB‡b cY¨ weµq Ki‡Z wM‡q cÖZviYvi dv‡` civ|
11| AbjvB‡b †Mwgs/M¨v¤^wjs msµvšÍ Aciva|
12| fvP©yqvj Kv‡iÝx/wµ‡ÞvKv‡iwÝ msµvšÍ Aciva|
13| GwUGg KvW© RvwjqvwZ msµvšÍ Aciva|
14| †gvevBj e¨vswKs cÖZviYv msµvšÍ Aciva|
15| †gvevBj †_‡K †g‡mR cvwV‡q ûgwK ev wei³ Kiv |
16| AbjvBb †_‡K g¨v‡mR cvwV‡q ûgwK ev wei³ Kiv|
17| KwcivBU AvBb j½b msµvšÍ Aciva|
18| VIOP Calling msµvšÍ Aciva|
wWwRUvj Aciva wbqš¿‡b cÖbxZ AvBb mg~n
1| Z_¨ I †hvMv‡hvM cÖhyw³ AvBb 2006 (ms‡kvabx/2013)
2| c‡b©vMÖvdx wbqš¿b AvBb, 2012
3| wWwRUvj wbivcËv AvBb, 2018
2006 mv‡j AvBb cÖYxZ n‡jI Avgv‡`i mvBevi µvBg msµvšÍ Z`šÍ ïiæ
nq 2007 mv‡ji †kl w`‡K| GB `xN© mg‡q Avgv‡`i Z`‡šÍi gvb Kvw•LZ
ch©v‡q ‡cŠQvqwb|
Avgv‡`i eZ©gvb Ae¯’v-
mvBevi Aciv‡ai kvw¯Íi nvi gvÎ 3%
mgqKvj PvR©kxU
cÖ`vb
PvR©
cÖgvb
PvR© cÖgvb nq
bvB
kvw¯Íi nvi
2013-2018 495 15 480 3%
Source: Dhaka Tribune- Published at 12:33 am April 20th, 2019
https://archive.dhakatribune.com/cybersecurity/2019/04/20/3-conviction-rate-of-
cybercrime-in-bangladesh
Some Comments regarding this failure
Barrister Jyotirmoy Barua, with experience in a good
number of cybercrime cases, said: “The investigation
Officers submit weak investigation reports due to poor
knowledge. This is why it becomes difficult for the
prosecution to prove charges.”
The legal expert also said most cases filed under the ICT
Act are being filed just for harassment and the conviction
rate is poor.
Advocate Nazrul Islam Shamim, a special public
prosecutor for the Cyber Tribunal, said the conviction
rate was very poor due to out of court settlements, and
faulty police probe reports due to lack of skills in
handling digital crimes.
He also said the police often submits charge sheets in
Cybercrime cases without IT and forensic reports.
e¨v_©Zvi Kvib-
1. evsjv‡`k miKv‡ii †Kvb †mvm¨vj wgwWqvi mv‡_ (Facebook,
Whatsapp, Google) MALT (Mutual legal assistance treaty)
A_ev LR (Letter rogatory) Pzw³ GLb ch©šÍ bvB, Z‡e †Póv Pj‡Q|
2. 2018 mv‡j wmAvBwW, cÖavb Kvh©vjq XvKv‡Z mvBevi cywjk
Bb‡fw÷‡Mkb †m›Uvi bv‡g GKwU BDwbU MVb Kiv nq, hv‡`i KvR n‡”Q
mgMÖ evsjv‡`‡k msMwVZ mvBevi Aciv‡ai Z`šÍ Kiv| wWGgwc, XvKv mn
†`‡ki Ab¨vb¨ ‡g‡UªvcwjUb BDwb‡U Ges wmwUwUwm, XvKvÕq mvBevi BDwbU
i‡q‡Q| GQvovI cywjk †nW‡KvqvUvm©, XvKvq bvix‡`i mnvqZvi D‡Ï¨‡k¨
GKwU †ní‡W¯‹ i‡q‡Q| mgm¨v n‡jv gvgjvi GRvnvi `v‡qiKvwjb D‡jøwLZ
ms¯’vi †Kvb `vwqZ¡ †bB| fzj ev mwVK †hfv‡eB gvgjvi GRvnvi `v‡qi Kiv
‡nvK bv †Kb Zviv gvgjv cieZ©x mg‡q wKQz wKQz gvgjvi Z`‡šÍi `vwqZ¡fvi
Zviv Mªnb K‡i| _vbv ¸‡jv‡Z cÖwkwÿZ ev cÖwkÿbwenxb hv‡K cvIqv hvq
Zv‡K w`‡qB ev`xi c‡ÿ gvgjvi GRvnvi `v‡qi Kiv mn cÖv_wgK Kvh©µg
m¤úbœ Kiv‡bv nq| †h Kvi‡b wb‡¤œv³ f‚j¸‡jv n‡q _v‡K|
(K) GRvnvi mwVKfv‡e †bIqv nqbv|
(L) Awfhy³ †cvó (Avc‡jvWK…Z Qwe/ wfwWI/ †jLvi w¯ŒbkU) mwVKfv‡e
†bIqv nqbv|
(M) gvgjv mswkøó AvjvgZ Rã Kiv nqbv ev mwVKfv‡e Kiv nqbv|
(N) Awfhy³ AvBwW cwiPvjbvKvix †MªdZvi cieZ©x mg‡q Zvi ‡mvm¨vj
wgwWqvi AvBwWi K‡›Uªvj mwVKfv‡e †bIqv nq bv|
(O) d‡ibwmK gZvgZ mwVKfv‡e PvIqv nqbv ev d‡ibwmK gZvgZ QvovB
PvR©kxU †`Iqv nq|
3| Z`šÍKvix Kg©KZ©viv mvBevi UªvBeybv‡j ¯^vÿ¨ cÖ`vbKvwjb wecÿ
†KŠïjxi †Rivi h_vh_ cÖwZDËi cÖ`vb Ki‡Z cv‡ib bv|
4| AwaKvsk mvÿx weÁ Av`vj‡Z mvÿ¨ cÖ`vb Kvwjb h_vh_fv‡e wRÁvwmZ
cÖ‡kœi Reve w`‡Z cv‡ib bv|
Avgv‡`i hv Ki‡Z n‡e-
1| cÖ‡qvRbxq mKj Z_¨vw` D‡jøL c~e©K GRvnvi wb‡Z n‡e|
2| Awfhy³ †cv‡ói wjsK mn w¯ŒbkU wb‡q mvÿx‡`i mvg‡b Rã Ki‡Z n‡e|
3| gvgjv mswkøó AvjvgZ RãKvwjb cÖwZwU Avjvg‡Zi h_vh_ eY©bv Rã
ZvwjKvq D‡jøL Ki‡Z n‡e|
4| Avmvgx †MªdZvi Ki‡Z cvi‡j Avmvgxi mnvqZvq Awfhy³ mswkøó
†mvm¨vj wgwWqvi AvBwW‡Z mZ©KZvi mv‡_ cÖ‡ek K‡i jM Bb AvBwW †R‡b
cvmIqvW© cwieZ©b Ki‡Z n‡e Ges mswkøó †gvevBj b¤^wUi wbqš¿b †KvU©
Av‡`‡ki gva¨‡g wb‡Z n‡e|
5| †mvm¨vj wgwWqvq Acivaxi AvBwW mwVKfv‡e wPwýZ Ki‡Z n‡e Ges
AvBwWi mv‡_ Acivaxi (‡gvevBj b¤^i/‡gBj AvBwW/wWfvBm) †hvMm~Î
LuyR‡Z n‡e|
6| Awf‡hv‡Mi welq e¯‘y h_vh_fv‡e wPwýZKiYc~e©K gvgjvi AvjvgZ
wn‡m‡e Rã Ki‡Z n‡e|
7| A‡bK AvjvgZ we‡kl K‡i †gvevBj wWfvBm RãKvwjb Avgiv jÿ¨ Kwi
bv †h, wWfvBmwU jK Kiv| RãKvwjb wWfvBm jK _vK‡j Avmvgxi
mnvqZvq AvbjK K‡i Rã Ki‡Z n‡e|
8| RãK…Z Avjvg‡Zi d‡ibwmK cixÿvi gva¨‡g Avjvg‡Zi mv‡_
Awf‡hv‡Mi m¤ú„³Zv Av‡Q wKbv/AvjvgZ e¨envi K‡i Aciva Kiv n‡q‡Q
wKbv †mB m¤ú‡K© we‡klÁ gZvgZ mywbw`©ó KZ©„c‡ÿi gva¨‡g wb‡Z n‡e|
9| GB mKj gvgjvq mvÿx wn‡m‡e Aÿi Ávb m¤úbœ Ggb KvD‡K wbe©vwPZ
Ki‡Z n‡e †h wKbv weÁ †Kškjxi ‡Rivi cÖkœ ey‡S mwVKfv‡e DËi w`‡Z
mÿg|
10| d‡ibwmK gZvgZ Ges Ab¨vb¨ mv‡ÿ¨i Dci wfwË K‡i cywjk wi‡cvU©
`vwLj Ki‡Z n‡e|
gvgjv cvIqvi c‡i mgmvgwqK Mªnb‡hvM¨ c×wZ‡Z Z`šÍ Kvh©µg GwM‡q
wb‡Z n‡e| ‡Kvb fv‡eB Z`šÍKvwjb Z`‡šÍi avivevwnKZv †_‡K weP¨yr nIqv
hv‡ebv| Z`‡šÍi gva¨‡g Acivax‡K wPwýZ K‡i mvÿ¨-cÖgvb msMÖn K‡i
cywjk wi‡cvU© `vwL‡ji gva¨‡g kvw¯Í wbwðZ Ki‡Z n‡e| me †ÿ‡Î mdj
n‡eb bv Z‡e Z`šÍ Kvh©µg Mªnb †hvM¨ n‡Z n‡e|
Cybersecurity?
Cybersecurity is the practice of protecting systems, networks, and
programs from digital attacks. These Cyber attacks are usually
aimed at accessing, changing, or destroying sensitive information;
extorting money from users; or interrupting normal business
processes.
mvBevi wbivcËv/mvBevi wmwKDwiwUt
mvBevi wmwKDwiwU/ mvBevi wbivcËv n‡jv Avgiv †h, wm‡÷g ev wWfvB‡mi
gva¨‡g B›Uvi‡b‡U mshy³ n‡q KvR Kwi †mB wWfvB‡m e¨eüZ B›Uvi‡bU
Ges †cÖvMÖvg‡K wWwRUvj Avµgb †_‡K iÿv Kivi Rb¨ cÖ‡qvRbxq
wbivcËvgyjK mZK©Zv Aej¤^b K‡i Kvh©µg Pjgvb ivLv|
Elements of Cyber Security
What are the 3 elements of Cyber security?
Elements of Cyber Security
The CIA triad refers to an information security model made up of the
three main components: confidentiality, integrity and availability.
What are the four elements of security?
An effective security system comprises of four elements:
Protection, Detection, Verification & Reaction.
What are the five elements of security?
It relies on five major elements: confidentiality, integrity, availability,
authenticity, and non-repudiation.
Elements of Cyber Security
1. Application Security
2. Information Security
3. Network Security
4. Disaster Recovery Planning
5. Operational Security.
6. End-user Security
7. Leadership commitment
Application security
Applications play an essential role in business ventures; that is why
every firm needs to focus on web application security. Having a secure
web application is required to protect customers, their interests and
their assets. Web application weakness or vulnerabilities is a common
point of interference for a Cyber thief.
Information security
Information includes business records, personal data, customer’s data,
and intellectual property. For an organization, it is vital to have strong
Cybersecurity for information as it is the heart of every organization.
Network Security
Network security consists of protecting the usability and reliability of
network and data. A network penetration test is conducted to assess the
vulnerabilities in a system and other security issues which occur in
servers, hosts, devices and network services.
Business continuity planning
Business continuity planning (BCP) is all about being prepared for
interference or Cyber threat by identifying threats to the organization
on time and analyzing how operations may be affected and how to
overcome that.
Operational security
Operations security (OPSEC) is used to protect organization functions.
It tracks critical information and assets to identify vulnerabilities that
exist in the functional method.
End-user education
One of the standard errors that lead to data breaches is human error.
Organization Cybersecurity is kept as strong as the weakest link. It is
vital for an organization to train their employees about Cybersecurity.
Every employee should be aware of the phishing attacks through
emails and links and should have the potential to deal with Cyber
threats they may face. The employee should share their device
password with their co-workers and should not use an insecure
network.
Leadership commitment
To have a successful Cybersecurity project, it is vital to have leadership
commitment. Without having the leadership in the team it is
complicated to develop, implement and maintain the processes.
The top leaders or management team an organization should invest in
the Cybersecurity measures to make it useful and successful. With the
support of leadership for Cybersecurity, an organization can improve
investment in technology, resources, and skills.
Cyber Space
What exactly is cyberspace?
Cyberspace is a concept describing a widespread interconnected digital
technology. The term cyberspace has become a conventional means to
describe anything associated with the Internet and the diverse Internet
culture.
mvBevi †¯úmt mvBevi †¯úm ej‡Z eySvq B›Uvi‡bU mshy³ GKvwaK wWwRUvj
wWfvB‡mi we¯Í…wZ cwimi‡K|
bvix msµvšÍ Awf‡hv‡Mi Rb¨
Police Cyber Support for Women – PCSW
https://www.facebook.com/PCSW.PHQ
cybersupport.women@police.gov.bd
Contact Number: 01320-000888
ïay XvKv kn‡ii bvMwiK‡`i Rb¨
Cyber Crime Investigation Division, CTTC, DMP
cyberhelp@dmp.gov.bd
https://www.facebook.com/cyberctdmp
mviv‡`‡ki †h‡Kvb RvqMvi bvMwiK‡`i Rb¨
Cyber Police Centre, CID, Bangladesh Police
Contact Number: 01320-010148,01730
cyber@police.gov.bd
https://www.facebook.com/cpccidbdpolice
mvBevi Aciva m¤ú‡K© Rvb‡Z/eyS‡Z eªvDR Ki‡Z cv‡ib-
Bangladesh
https://dsa.gov.bd/
http://doict.portal.gov.bd/
https://ictd.gov.bd/
https://ccabd.org/
https://www.cirt.gov.bd/
https://www.bdcert.org/
International
https://www.unodc.org/unodc/en/cybercrime/index.html
https://portswigger.net/daily-swig
https://www.fbi.gov/investigate/cyber
-সবাইকে অনেক অনেক ধন্যবাদ
আমাদের সাথে থাকার জন্য -

More Related Content

Similar to Cyber Crime Cyber Security Cyber Space - LE Perspective.pdf

At ad-2013 online
At ad-2013 onlineAt ad-2013 online
At ad-2013 online
azad12915
 
Blood bank 2010
Blood bank 2010Blood bank 2010
Blood bank 2010
azad12915
 
Instructions
InstructionsInstructions
Instructions
azad12915
 
H.s.c examination 2013 november
H.s.c examination 2013 novemberH.s.c examination 2013 november
H.s.c examination 2013 november
seabd org
 

Similar to Cyber Crime Cyber Security Cyber Space - LE Perspective.pdf (20)

আক্বীদাহ ইসলামিয়া Aqeedah islamiahbydr.muhammadasadullahal ghalib.-
আক্বীদাহ ইসলামিয়া Aqeedah islamiahbydr.muhammadasadullahal ghalib.-আক্বীদাহ ইসলামিয়া Aqeedah islamiahbydr.muhammadasadullahal ghalib.-
আক্বীদাহ ইসলামিয়া Aqeedah islamiahbydr.muhammadasadullahal ghalib.-
 
Programming Language (chapter 5 for class 11 and 12)
Programming Language (chapter 5 for class 11 and 12)Programming Language (chapter 5 for class 11 and 12)
Programming Language (chapter 5 for class 11 and 12)
 
Lecturer 3 wireless communication
Lecturer 3 wireless communicationLecturer 3 wireless communication
Lecturer 3 wireless communication
 
Professionalism practice in the workplace
Professionalism practice in the workplaceProfessionalism practice in the workplace
Professionalism practice in the workplace
 
Hsc routine -2018
Hsc routine -2018Hsc routine -2018
Hsc routine -2018
 
At ad-2013 online
At ad-2013 onlineAt ad-2013 online
At ad-2013 online
 
BFIU circular 19 Master circular
BFIU circular 19 Master circularBFIU circular 19 Master circular
BFIU circular 19 Master circular
 
Teachers diary-শিক্ষকের ডায়েরি
Teachers diary-শিক্ষকের ডায়েরিTeachers diary-শিক্ষকের ডায়েরি
Teachers diary-শিক্ষকের ডায়েরি
 
BSCI- Worker.pptx
BSCI- Worker.pptxBSCI- Worker.pptx
BSCI- Worker.pptx
 
Whizz Travels Cover
Whizz Travels CoverWhizz Travels Cover
Whizz Travels Cover
 
Hsc chemistry 2nd part (group v & vi elements)
Hsc chemistry 2nd part (group v & vi elements)Hsc chemistry 2nd part (group v & vi elements)
Hsc chemistry 2nd part (group v & vi elements)
 
Blood bank 2010
Blood bank 2010Blood bank 2010
Blood bank 2010
 
Higher secondary level Statistics book
Higher secondary level Statistics bookHigher secondary level Statistics book
Higher secondary level Statistics book
 
Four bv religion islam
Four bv religion islamFour bv religion islam
Four bv religion islam
 
Instructions
InstructionsInstructions
Instructions
 
bill.DOCX
bill.DOCXbill.DOCX
bill.DOCX
 
Lines
LinesLines
Lines
 
H.s.c examination 2013 november
H.s.c examination 2013 novemberH.s.c examination 2013 november
H.s.c examination 2013 november
 
Cambrian Education Group
Cambrian Education GroupCambrian Education Group
Cambrian Education Group
 
Chapter 1(sequential)
Chapter 1(sequential)Chapter 1(sequential)
Chapter 1(sequential)
 

Recently uploaded

一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
e9733fc35af6
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
bd2c5966a56d
 
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
e9733fc35af6
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
CssSpamx
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
Airst S
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
bd2c5966a56d
 
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
Fir La
 

Recently uploaded (20)

Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
Reason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaReason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in India
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
 

Cyber Crime Cyber Security Cyber Space - LE Perspective.pdf

  • 1. Cybercrime, Cybersecurity & Cyberspace: LE Perspective Dc¯’vcbvq- Bwjqvm †nv‡mb cywjk cwi`k©K(wbt) ‡¯úkvj G¨vKkb MÖæc KvD›Uvi †U‡ivwiRg G¨vÛ UªvÝb¨vkbvj µvBg wWGgwc, XvKv| cÖv³b, wWwRUvj d‡ibwmK G·cvU©, wmAvBwW, XvKv| +8801919933221 saymeonline@gmail.com
  • 2. Education: B. Ed (Hon's), M. Ed, PGDICT, M.Sc (Cyber Security), MHRL Training Course completed: 1. Enhancement of Cyber crime investigation capability of Bangladesh Police, Soonchung Hung University, South Korea, June 2014.2. Cyber Security Course, Gujarat 2. Forensic Science University, India 2016. 3. Exploit Hackers Tools & Technique, Singapore, October 2018. 4. Boot Camp on Access Data FTK, UAE Dubai, December 2018. 5. Windows Forensic, Singapore, March 2019. Experience: Serving as a Digital forensic Expert & Cyber Crime Investigator in Digital Forensics Forensic Lab from February 2012 to July 2021. Experience as a Facilitator: From 2013 to till today I have conducted training in different venues like Police Academy, Forensic Training Institute, Detective Training School, Cyber Crime Investigation Training Center. UN Mission Experience: Served as Police Advisor in the United Nations Mission in South Sudan from February 2017 to February 2018.
  • 3. mvBevi µvBg/wWwRUvj Acivat evsjv‡`‡k cÖbxZ Z_¨ I †hvMv‡hvM cÖhyw³ AvBb 2006 (ms‡kvabx/2013), c‡b©vMÖvdx wbqš¿b AvBb 2012 Ges wWwRUvj wbivcËv AvBb 2018 G ewb©Z kvw¯Í‡hvM¨ mKj AcivaB wWwRUvj Aciva/mvBevi µvBg| wWwRUvj Aciv‡ai aiYt Avgv‡`i †`‡k cÖPwjZ wWwRUvj Aciva¸‡jv n‡”Q- 1| Akøxj Qwe/wfwWI aviY, msiÿY, wecbb, cÖ`k©Y Kiv| 2| †mvm¨vj wgwWqvq gvbnvwbKi †jLv cÖPvi/Qwe-wfwWI Avc‡jvW Kiv| 3| ‡mvm¨vj wgwWqvi AvBwW /I‡qe mvBU n¨vwKs (`Lj) Kiv| 4| f‚qv I‡qemvBU ‰Zix K‡i cÖZvibv Kiv/ Mªvn‡Ki cÖK…Z Z_¨vw` wb‡q cÖK…Z I‡qe mvB‡U cÖ‡ek K‡i Z_¨ Pzwi/Avw_©K ÿwZmn wewfbœ ai‡Yi Aciva Kiv| 5| f~qv †gBj K‡i cÖZviYv Kiv/‡gBj †_ªW Kiv| 6| Kw¤úDUvi ev mvf©vi Gi WvUv web÷ Kiv ev †cÖvMÖvg †PÄ Kiv| 7| †gvevB‡ji †mvm© †KvW /AvBGgBAvB cwieZ©Y Kiv 8| †mvm¨vj wgwWqv‡K wewfbœ Aciv‡ai nvwZqvi wn‡m‡e e¨envi Kiv (cixÿvi cÖkœcÎ dvum/ ‡MvcY msev` Av`vb-cÖ`vb Kiv)| 9| AbjvB‡b cY¨ µq Ki‡Z wM‡q cÖZviYvi dv‡` civ| 10|AbjvB‡b cY¨ weµq Ki‡Z wM‡q cÖZviYvi dv‡` civ| 11| AbjvB‡b †Mwgs/M¨v¤^wjs msµvšÍ Aciva| 12| fvP©yqvj Kv‡iÝx/wµ‡ÞvKv‡iwÝ msµvšÍ Aciva| 13| GwUGg KvW© RvwjqvwZ msµvšÍ Aciva| 14| †gvevBj e¨vswKs cÖZviYv msµvšÍ Aciva| 15| †gvevBj †_‡K †g‡mR cvwV‡q ûgwK ev wei³ Kiv |
  • 4. 16| AbjvBb †_‡K g¨v‡mR cvwV‡q ûgwK ev wei³ Kiv| 17| KwcivBU AvBb j½b msµvšÍ Aciva| 18| VIOP Calling msµvšÍ Aciva| wWwRUvj Aciva wbqš¿‡b cÖbxZ AvBb mg~n 1| Z_¨ I †hvMv‡hvM cÖhyw³ AvBb 2006 (ms‡kvabx/2013) 2| c‡b©vMÖvdx wbqš¿b AvBb, 2012 3| wWwRUvj wbivcËv AvBb, 2018 2006 mv‡j AvBb cÖYxZ n‡jI Avgv‡`i mvBevi µvBg msµvšÍ Z`šÍ ïiæ nq 2007 mv‡ji †kl w`‡K| GB `xN© mg‡q Avgv‡`i Z`‡šÍi gvb Kvw•LZ ch©v‡q ‡cŠQvqwb| Avgv‡`i eZ©gvb Ae¯’v- mvBevi Aciv‡ai kvw¯Íi nvi gvÎ 3% mgqKvj PvR©kxU cÖ`vb PvR© cÖgvb PvR© cÖgvb nq bvB kvw¯Íi nvi 2013-2018 495 15 480 3% Source: Dhaka Tribune- Published at 12:33 am April 20th, 2019 https://archive.dhakatribune.com/cybersecurity/2019/04/20/3-conviction-rate-of- cybercrime-in-bangladesh
  • 5. Some Comments regarding this failure Barrister Jyotirmoy Barua, with experience in a good number of cybercrime cases, said: “The investigation Officers submit weak investigation reports due to poor knowledge. This is why it becomes difficult for the prosecution to prove charges.” The legal expert also said most cases filed under the ICT Act are being filed just for harassment and the conviction rate is poor. Advocate Nazrul Islam Shamim, a special public prosecutor for the Cyber Tribunal, said the conviction rate was very poor due to out of court settlements, and faulty police probe reports due to lack of skills in handling digital crimes. He also said the police often submits charge sheets in Cybercrime cases without IT and forensic reports. e¨v_©Zvi Kvib- 1. evsjv‡`k miKv‡ii †Kvb †mvm¨vj wgwWqvi mv‡_ (Facebook, Whatsapp, Google) MALT (Mutual legal assistance treaty) A_ev LR (Letter rogatory) Pzw³ GLb ch©šÍ bvB, Z‡e †Póv Pj‡Q|
  • 6. 2. 2018 mv‡j wmAvBwW, cÖavb Kvh©vjq XvKv‡Z mvBevi cywjk Bb‡fw÷‡Mkb †m›Uvi bv‡g GKwU BDwbU MVb Kiv nq, hv‡`i KvR n‡”Q mgMÖ evsjv‡`‡k msMwVZ mvBevi Aciv‡ai Z`šÍ Kiv| wWGgwc, XvKv mn †`‡ki Ab¨vb¨ ‡g‡UªvcwjUb BDwb‡U Ges wmwUwUwm, XvKvÕq mvBevi BDwbU i‡q‡Q| GQvovI cywjk †nW‡KvqvUvm©, XvKvq bvix‡`i mnvqZvi D‡Ï¨‡k¨ GKwU †ní‡W¯‹ i‡q‡Q| mgm¨v n‡jv gvgjvi GRvnvi `v‡qiKvwjb D‡jøwLZ ms¯’vi †Kvb `vwqZ¡ †bB| fzj ev mwVK †hfv‡eB gvgjvi GRvnvi `v‡qi Kiv ‡nvK bv †Kb Zviv gvgjv cieZ©x mg‡q wKQz wKQz gvgjvi Z`‡šÍi `vwqZ¡fvi Zviv Mªnb K‡i| _vbv ¸‡jv‡Z cÖwkwÿZ ev cÖwkÿbwenxb hv‡K cvIqv hvq Zv‡K w`‡qB ev`xi c‡ÿ gvgjvi GRvnvi `v‡qi Kiv mn cÖv_wgK Kvh©µg m¤úbœ Kiv‡bv nq| †h Kvi‡b wb‡¤œv³ f‚j¸‡jv n‡q _v‡K|
  • 7. (K) GRvnvi mwVKfv‡e †bIqv nqbv| (L) Awfhy³ †cvó (Avc‡jvWK…Z Qwe/ wfwWI/ †jLvi w¯ŒbkU) mwVKfv‡e †bIqv nqbv| (M) gvgjv mswkøó AvjvgZ Rã Kiv nqbv ev mwVKfv‡e Kiv nqbv| (N) Awfhy³ AvBwW cwiPvjbvKvix †MªdZvi cieZ©x mg‡q Zvi ‡mvm¨vj wgwWqvi AvBwWi K‡›Uªvj mwVKfv‡e †bIqv nq bv| (O) d‡ibwmK gZvgZ mwVKfv‡e PvIqv nqbv ev d‡ibwmK gZvgZ QvovB PvR©kxU †`Iqv nq| 3| Z`šÍKvix Kg©KZ©viv mvBevi UªvBeybv‡j ¯^vÿ¨ cÖ`vbKvwjb wecÿ †KŠïjxi †Rivi h_vh_ cÖwZDËi cÖ`vb Ki‡Z cv‡ib bv| 4| AwaKvsk mvÿx weÁ Av`vj‡Z mvÿ¨ cÖ`vb Kvwjb h_vh_fv‡e wRÁvwmZ cÖ‡kœi Reve w`‡Z cv‡ib bv| Avgv‡`i hv Ki‡Z n‡e- 1| cÖ‡qvRbxq mKj Z_¨vw` D‡jøL c~e©K GRvnvi wb‡Z n‡e| 2| Awfhy³ †cv‡ói wjsK mn w¯ŒbkU wb‡q mvÿx‡`i mvg‡b Rã Ki‡Z n‡e| 3| gvgjv mswkøó AvjvgZ RãKvwjb cÖwZwU Avjvg‡Zi h_vh_ eY©bv Rã ZvwjKvq D‡jøL Ki‡Z n‡e| 4| Avmvgx †MªdZvi Ki‡Z cvi‡j Avmvgxi mnvqZvq Awfhy³ mswkøó †mvm¨vj wgwWqvi AvBwW‡Z mZ©KZvi mv‡_ cÖ‡ek K‡i jM Bb AvBwW †R‡b cvmIqvW© cwieZ©b Ki‡Z n‡e Ges mswkøó †gvevBj b¤^wUi wbqš¿b †KvU© Av‡`‡ki gva¨‡g wb‡Z n‡e| 5| †mvm¨vj wgwWqvq Acivaxi AvBwW mwVKfv‡e wPwýZ Ki‡Z n‡e Ges AvBwWi mv‡_ Acivaxi (‡gvevBj b¤^i/‡gBj AvBwW/wWfvBm) †hvMm~Î
  • 8. LuyR‡Z n‡e| 6| Awf‡hv‡Mi welq e¯‘y h_vh_fv‡e wPwýZKiYc~e©K gvgjvi AvjvgZ wn‡m‡e Rã Ki‡Z n‡e| 7| A‡bK AvjvgZ we‡kl K‡i †gvevBj wWfvBm RãKvwjb Avgiv jÿ¨ Kwi bv †h, wWfvBmwU jK Kiv| RãKvwjb wWfvBm jK _vK‡j Avmvgxi mnvqZvq AvbjK K‡i Rã Ki‡Z n‡e| 8| RãK…Z Avjvg‡Zi d‡ibwmK cixÿvi gva¨‡g Avjvg‡Zi mv‡_ Awf‡hv‡Mi m¤ú„³Zv Av‡Q wKbv/AvjvgZ e¨envi K‡i Aciva Kiv n‡q‡Q wKbv †mB m¤ú‡K© we‡klÁ gZvgZ mywbw`©ó KZ©„c‡ÿi gva¨‡g wb‡Z n‡e| 9| GB mKj gvgjvq mvÿx wn‡m‡e Aÿi Ávb m¤úbœ Ggb KvD‡K wbe©vwPZ Ki‡Z n‡e †h wKbv weÁ †Kškjxi ‡Rivi cÖkœ ey‡S mwVKfv‡e DËi w`‡Z mÿg| 10| d‡ibwmK gZvgZ Ges Ab¨vb¨ mv‡ÿ¨i Dci wfwË K‡i cywjk wi‡cvU© `vwLj Ki‡Z n‡e| gvgjv cvIqvi c‡i mgmvgwqK Mªnb‡hvM¨ c×wZ‡Z Z`šÍ Kvh©µg GwM‡q wb‡Z n‡e| ‡Kvb fv‡eB Z`šÍKvwjb Z`‡šÍi avivevwnKZv †_‡K weP¨yr nIqv hv‡ebv| Z`‡šÍi gva¨‡g Acivax‡K wPwýZ K‡i mvÿ¨-cÖgvb msMÖn K‡i cywjk wi‡cvU© `vwL‡ji gva¨‡g kvw¯Í wbwðZ Ki‡Z n‡e| me †ÿ‡Î mdj n‡eb bv Z‡e Z`šÍ Kvh©µg Mªnb †hvM¨ n‡Z n‡e| Cybersecurity? Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These Cyber attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
  • 9. mvBevi wbivcËv/mvBevi wmwKDwiwUt mvBevi wmwKDwiwU/ mvBevi wbivcËv n‡jv Avgiv †h, wm‡÷g ev wWfvB‡mi gva¨‡g B›Uvi‡b‡U mshy³ n‡q KvR Kwi †mB wWfvB‡m e¨eüZ B›Uvi‡bU Ges †cÖvMÖvg‡K wWwRUvj Avµgb †_‡K iÿv Kivi Rb¨ cÖ‡qvRbxq wbivcËvgyjK mZK©Zv Aej¤^b K‡i Kvh©µg Pjgvb ivLv| Elements of Cyber Security What are the 3 elements of Cyber security? Elements of Cyber Security The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability. What are the four elements of security? An effective security system comprises of four elements: Protection, Detection, Verification & Reaction. What are the five elements of security? It relies on five major elements: confidentiality, integrity, availability, authenticity, and non-repudiation. Elements of Cyber Security 1. Application Security 2. Information Security 3. Network Security 4. Disaster Recovery Planning 5. Operational Security. 6. End-user Security
  • 10. 7. Leadership commitment Application security Applications play an essential role in business ventures; that is why every firm needs to focus on web application security. Having a secure web application is required to protect customers, their interests and their assets. Web application weakness or vulnerabilities is a common point of interference for a Cyber thief. Information security Information includes business records, personal data, customer’s data, and intellectual property. For an organization, it is vital to have strong Cybersecurity for information as it is the heart of every organization. Network Security Network security consists of protecting the usability and reliability of network and data. A network penetration test is conducted to assess the vulnerabilities in a system and other security issues which occur in servers, hosts, devices and network services. Business continuity planning Business continuity planning (BCP) is all about being prepared for interference or Cyber threat by identifying threats to the organization on time and analyzing how operations may be affected and how to overcome that. Operational security
  • 11. Operations security (OPSEC) is used to protect organization functions. It tracks critical information and assets to identify vulnerabilities that exist in the functional method. End-user education One of the standard errors that lead to data breaches is human error. Organization Cybersecurity is kept as strong as the weakest link. It is vital for an organization to train their employees about Cybersecurity. Every employee should be aware of the phishing attacks through emails and links and should have the potential to deal with Cyber threats they may face. The employee should share their device password with their co-workers and should not use an insecure network. Leadership commitment To have a successful Cybersecurity project, it is vital to have leadership commitment. Without having the leadership in the team it is complicated to develop, implement and maintain the processes. The top leaders or management team an organization should invest in the Cybersecurity measures to make it useful and successful. With the support of leadership for Cybersecurity, an organization can improve investment in technology, resources, and skills. Cyber Space What exactly is cyberspace? Cyberspace is a concept describing a widespread interconnected digital technology. The term cyberspace has become a conventional means to
  • 12. describe anything associated with the Internet and the diverse Internet culture. mvBevi †¯úmt mvBevi †¯úm ej‡Z eySvq B›Uvi‡bU mshy³ GKvwaK wWwRUvj wWfvB‡mi we¯Í…wZ cwimi‡K| bvix msµvšÍ Awf‡hv‡Mi Rb¨ Police Cyber Support for Women – PCSW https://www.facebook.com/PCSW.PHQ cybersupport.women@police.gov.bd Contact Number: 01320-000888 ïay XvKv kn‡ii bvMwiK‡`i Rb¨ Cyber Crime Investigation Division, CTTC, DMP cyberhelp@dmp.gov.bd https://www.facebook.com/cyberctdmp
  • 13. mviv‡`‡ki †h‡Kvb RvqMvi bvMwiK‡`i Rb¨ Cyber Police Centre, CID, Bangladesh Police Contact Number: 01320-010148,01730 cyber@police.gov.bd https://www.facebook.com/cpccidbdpolice mvBevi Aciva m¤ú‡K© Rvb‡Z/eyS‡Z eªvDR Ki‡Z cv‡ib- Bangladesh https://dsa.gov.bd/ http://doict.portal.gov.bd/ https://ictd.gov.bd/ https://ccabd.org/ https://www.cirt.gov.bd/ https://www.bdcert.org/ International https://www.unodc.org/unodc/en/cybercrime/index.html https://portswigger.net/daily-swig https://www.fbi.gov/investigate/cyber
  • 14. -সবাইকে অনেক অনেক ধন্যবাদ আমাদের সাথে থাকার জন্য -