Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Investigation and prosecution certificate course for pbi officer
1. Investigation and Prosecution
Certificate Course for PBI
Officer
TAWHIDUR RAHMAN
TEAM LEAD, BANGLADESH NATIONAL CIRT,
C|CISO, CCNP, C|EH,CHFI,CNDA, E|CSA, L|PT, E|NSA,GSEC, ITIL,
COBIT,CFIP
CERTIFIED CYBER CRIMINAL ANALYST, ISS, USA
CERTIFIED CYBER COUNTER TERRORIST ANALYST, USA
MEMBER OF IACIS, HIGH TECH CRIME, NATIONAL WHITE COLLAR
CRIME, USA
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
54.
55.
56.
57.
58.
59.
60.
61.
62.
63.
64.
65.
66.
67.
68.
69.
70.
71.
72.
73.
74.
75.
76.
77.
78.
79.
80.
81.
82.
83.
84. What is GOBISM?
Protection of government information and
systems is a core accountability of each
governmental agency. The role of Information
Security Manual is to promote a consistent
approach to information assurance and
information security across entire Government
of Bangladesh.
The Government of Bangladesh Information
Security Manual (GOBISM) details processes
and controls that are important for the
protection of Bangladesh Government
unclassified information and systems.
85. Control Categories
Mandatory controls: the use, or-non-use thereof
is essential in order to effectively manage
identified risk, unless the control is demonstrably
not relevant to the respective system.
Recommended controls: the use, or non-use
thereof is considered good and recommended
practice, but valid reasons for not
implementing a control could exist.
86. Information Security
Governance – Roles and
Responsibilities The Agency Head: The agency head must provide
support for the development, implementation and
ongoing maintenance of information security
processes within their agency
The Chief Information Security Officer: CISO should be
responsible for ensuring agency compliance with the
GOBISM through facilitating a continuous program of
certification and accreditation based on security risk
management . CISO should be responsible for the
implementation of information security measurement
metrics and key performance indicators within the
agency
87. Information Security
Governance – Roles and
Responsibilities Information Technology Security Managers: ITSMs must be
responsible for ensuring the development, maintenance,
updating and implementation of Security Risk
Management Plans (SRMPs), Systems Security Plans
(SecPlan) and any Standard Operating Procedures (SOPs)
for all agency systems
System Owners: The system owner is responsible for the
overall operation of the system and they may delegate
the day-to-day management and operation of the system
to a system manager or managers.
System Users: All system users must comply with the
relevant security policies and procedures for the systems
they use
88. What is in GOBISM?
Information Security within Government
Information Security Governance – Roles and
Responsibilities
System Certification and Accreditation
Information Security Documentation
Information Security Monitoring
Information Security Incidents
Physical Security
Personnel Security
89. What is in GOBISM?
Infrastructure (Cable Management)
Communication Systems and Devices
(Fax/Printer/Scanner etc.)
Product Security
Decommissioning and Disposal
Software Security
Email Security
Access Control
Cryptography
90. What is in GOBISM?
Network Security
Working Off-Site (BYOD)
Enterprise System Security
91.
92. What is Social Networks ?
Why Existing Social Networks are
Important ?!
It provides Information/Intelligence
Provides Evidence
Sometimes Show way of Investigation
Help us to take preventive measure
93. Identifying Popular Social Networks
using in Bangladesh
Facebook
Twitter
Skype
Viber
Tango
Imo
WhatsApps
Istagram
Facebook Massenger
Email
Search Engines ( Google, Yahoo, Opera etc)
94. Facebook Investigation
During Investigation we get two types
of ID
Real ID (Given information is right)
Fake ID (Given all information is fake)
For initiating Investigation--
We have to collect same information
from this two types of ID.
95. Facebook Investigation
1. User Name
2. User ID/Profile ID
3. Numeric Personal ID
4. Objectionable posted content with full
link/url.
96. Facebook Investigation
Why it is important to collect this information-
To findout the specific ID/ Uniquely identify the
accused ID world-wide.
If you say – open a facebook id by the name of
Abdur Rahaman, posted a objectionable picture of
someone.
When you search Facebook ID by the name
Rahaman- you will get so many Rahaman's
facebook ID.
98. Facebook Investigation
So you have to collect Facebook User
Name/Fcaebook User ID/Facebook
Numeric Personal ID/ Objectionable
posted content with full link/url regarding
facebook investigation for world-wide
uniquely identify the accused ID.
99. Facebook Investigation
How to collect this information-
Asked the complainant to open his
facebook id.
Doubble click on the accused Name.
You get the Accused User Name in
Friend search option & User ID in the
url.
101. Facebook Investigation
By the user ID/Profile ID, you can find-out numeric
personal ID.
Go to the Browser and past the user ID/profile ID in
the blank space of the bellow website & click find
numeric id.
www.findmyfbid.com
www.lookup-id.com
105. Facebook Investigation
How to take the posted objectionable
content with link?
1. Double click on the post if is any .jpg
/.png file.
2. You see the link in top url & picture
is expand.