Internet
in
Bangladesh
• More
then
40
millions
internet
user
• Using
70Gbps+
of
internet
traffic
• Internet
user
growth
rate
is
very
high
• Broadband
penetraDon
is
increasing
• But
maximum
user
has
no
idea
about
Cyber
Security
System.
2
bdNOG2
Cyber
Crime
In
Bangladesh
• By
Social
Media
• By
Mobile
Phone
• By
Computer
Social
Media
In
Bangladesh
Social
media
security
vulnerabili5es:
• Social
media
site
facebook
is
no
1
browsed
web
by
country’s
internet
user
• Most
user
are
not
concern
about
security
• Maximum
social
media
user
are
teenager
• Social
media
Users
are
more
focused
on
“
More
friends,
more
popular”
• Social
media
enables
the
spread
of
unreliable
and
false
informaDon.
• Some
internet
users
are
using
internet
only
for
staying
in
social
media.
• InteracDon
with
strangers
in
social
media
is
very
high…!!!
10
bdNOG2
Social
media
security
threats:
• Profile
visitor
plug-‐in
• Dislike
buWon
• hacking
• Trojans
• Malicious
web
• Clickjacking
11
bdNOG2
Social
media
risk
mi5ga5on:
• Use
two-‐factor
authen5ca5on
whenever
possible
• Do
not
add
strangers
to
your
friends
list
• Always
check
the
URL
of
a
page
status
before
opening
it
• avoid
unnecessary
applica5ons
of
social
media
• Keep
your
browser
up
to
date
because
an
out-‐dated
browser
is
good
vic5m
• Awareness
&
training
for
new
user.
12
bdNOG2
Mobile
Phone
Security
Vulnerabili5es
• Mobile
Money
transfer
increasing
day
by
day
• Online
banking
is
Popular
• Rapid
growing
Social
media
user
via
mobile
• Smartphone
user
growing
rapidly
• But
they
are
in
dark
about
cyber
security
14
bdNOG2
Phone
Security
Threats
• Missed
call
or
call
from
unknown
number
• Sms/call
from
special
number
• Voice
phishing
or
vishing
• Common
operaDng
systems
• Apps
without
security
check
• LoWery
winner
scam
15
bdNOG2
Phone
threat
mi5ga5on
• When
choosing
a
mobile
phone
consider
its
security
features.
• Maintain
physical
control
of
the
device,
especially
in
public
or
semi-‐public
places.
• Disable
interfaces
that
are
not
currently
in
use,
such
as
Bluetooth,
infrared,
or
Wifi
.
• Do
not
follow
links
sent
in
suspicious
email
or
text
messages
or
suspicious
call.
• Limit
exposure
of
your
mobile
phone
number
• Be
choosy
when
selecDng
and
installing
new
apps.
16
bdNOG2
Computer
Security
Vulnerabili5es
• Very
High
rate
of
local
pc
infecDon
• Huge
number
of
user
are
not
aware
about
cyber
security
• large
shared
broadband
network
• Huge
Pirated
sobware
user
• Very
few
user
used
anDvirus
• Large
number
of
free
sobware
or
apps
are
used
• Large
NATed
IP
network
• Weak
password
pracDce
• Huge
peer-‐to-‐peer
network
user
22
bdNOG2
How
to
Mi5gate
• Properly
configure
and
patch
opera5ng
systems,
browsers,
and
other
soUware
.
• Use
and
regularly
update
of
firewalls,
an5-‐virus,
and
an5-‐
spyware
.
• Use
of
strong
passwords
and
never
share
passwords.
• Think
before
you
click.
• Do
not
open
email
or
related
aIachments
from
un-‐trusted
sources.
• Protect
access
creden5als
from
outsider.
• Follow
your
organiza5on's
cyber
security
policies,
and
report
viola5on
issues
when
they
occur
to
concern
authority
.
24
bdNOG2