SlideShare a Scribd company logo
1 of 109
Investigation and Prosecution
Certificate Course for PBI
Officer
TAWHIDUR RAHMAN
TEAM LEAD, BANGLADESH NATIONAL CIRT,
C|CISO, CCNP, C|EH,CHFI,CNDA, E|CSA, L|PT, E|NSA,GSEC, ITIL,
COBIT,CFIP
CERTIFIED CYBER CRIMINAL ANALYST, ISS, USA
CERTIFIED CYBER COUNTER TERRORIST ANALYST, USA
MEMBER OF IACIS, HIGH TECH CRIME, NATIONAL WHITE COLLAR
CRIME, USA
What is GOBISM?
 Protection of government information and
systems is a core accountability of each
governmental agency. The role of Information
Security Manual is to promote a consistent
approach to information assurance and
information security across entire Government
of Bangladesh.
 The Government of Bangladesh Information
Security Manual (GOBISM) details processes
and controls that are important for the
protection of Bangladesh Government
unclassified information and systems.
Control Categories
 Mandatory controls: the use, or-non-use thereof
is essential in order to effectively manage
identified risk, unless the control is demonstrably
not relevant to the respective system.
 Recommended controls: the use, or non-use
thereof is considered good and recommended
practice, but valid reasons for not
implementing a control could exist.
Information Security
Governance – Roles and
Responsibilities The Agency Head: The agency head must provide
support for the development, implementation and
ongoing maintenance of information security
processes within their agency
 The Chief Information Security Officer: CISO should be
responsible for ensuring agency compliance with the
GOBISM through facilitating a continuous program of
certification and accreditation based on security risk
management . CISO should be responsible for the
implementation of information security measurement
metrics and key performance indicators within the
agency
Information Security
Governance – Roles and
Responsibilities Information Technology Security Managers: ITSMs must be
responsible for ensuring the development, maintenance,
updating and implementation of Security Risk
Management Plans (SRMPs), Systems Security Plans
(SecPlan) and any Standard Operating Procedures (SOPs)
for all agency systems
 System Owners: The system owner is responsible for the
overall operation of the system and they may delegate
the day-to-day management and operation of the system
to a system manager or managers.
 System Users: All system users must comply with the
relevant security policies and procedures for the systems
they use
What is in GOBISM?
 Information Security within Government
 Information Security Governance – Roles and
Responsibilities
 System Certification and Accreditation
 Information Security Documentation
 Information Security Monitoring
 Information Security Incidents
 Physical Security
 Personnel Security
What is in GOBISM?
 Infrastructure (Cable Management)
 Communication Systems and Devices
(Fax/Printer/Scanner etc.)
 Product Security
 Decommissioning and Disposal
 Software Security
 Email Security
 Access Control
 Cryptography
What is in GOBISM?
 Network Security
 Working Off-Site (BYOD)
 Enterprise System Security
What is Social Networks ?
 Why Existing Social Networks are
Important ?!
 It provides Information/Intelligence
 Provides Evidence
 Sometimes Show way of Investigation
 Help us to take preventive measure
Identifying Popular Social Networks
using in Bangladesh
 Facebook
 Twitter
 Skype
 Viber
 Tango
 Imo
 WhatsApps
 Istagram
 Facebook Massenger
 Email
 Search Engines ( Google, Yahoo, Opera etc)
Facebook Investigation

During Investigation we get two types
of ID

Real ID (Given information is right)

Fake ID (Given all information is fake)

For initiating Investigation--

We have to collect same information
from this two types of ID.
Facebook Investigation
1. User Name
2. User ID/Profile ID
3. Numeric Personal ID
4. Objectionable posted content with full
link/url.
Facebook Investigation

Why it is important to collect this information-

To findout the specific ID/ Uniquely identify the
accused ID world-wide.

If you say – open a facebook id by the name of
Abdur Rahaman, posted a objectionable picture of
someone.

When you search Facebook ID by the name
Rahaman- you will get so many Rahaman's
facebook ID.
Facebook Investigation
Facebook Investigation

So you have to collect Facebook User
Name/Fcaebook User ID/Facebook
Numeric Personal ID/ Objectionable
posted content with full link/url regarding
facebook investigation for world-wide
uniquely identify the accused ID.
Facebook Investigation

How to collect this information-

Asked the complainant to open his
facebook id.

Doubble click on the accused Name.

You get the Accused User Name in
Friend search option & User ID in the
url.
Facebook Investigation
Facebook Investigation
By the user ID/Profile ID, you can find-out numeric
personal ID.
Go to the Browser and past the user ID/profile ID in
the blank space of the bellow website & click find
numeric id.
www.findmyfbid.com
www.lookup-id.com
Facebook Investigation
Facebook Investigation
Facebook Investigation
Facebook Investigation
How to take the posted objectionable
content with link?
1. Double click on the post if is any .jpg
/.png file.
2. You see the link in top url & picture
is expand.
Facebook Investigation
After expanding the post like
picture-
1. Just press PrtScr/PrtSysRQ
button one time & past it on the
word file by Ctrl+V.
Facebook Investigation
1. Collect all of the
information & past it on the
word file.
2. Print the word file & seize
before the witness.
Investigation and prosecution certificate course for pbi officer
Investigation and prosecution certificate course for pbi officer

More Related Content

Similar to Investigation and prosecution certificate course for pbi officer

Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldTEWMAGAZINE
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governanceJesse Wilkins
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditorsmdagrossa
 
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory RealmShawn Tuma
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxInfosectrain3
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practicesamiable_indian
 
Legal aspects of using employee monitoring software
Legal aspects of using employee monitoring softwareLegal aspects of using employee monitoring software
Legal aspects of using employee monitoring softwareWorktime
 
A Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxA Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxmakdul
 
The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.CAS
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxBhanuRoyal4
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follAISHA232980
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
ISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloJohn Intindolo
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkAndrew Gerber
 
20110310 ARMA Northern CO Strategies and Policies for Social Media
20110310 ARMA Northern CO Strategies and Policies for Social Media20110310 ARMA Northern CO Strategies and Policies for Social Media
20110310 ARMA Northern CO Strategies and Policies for Social MediaJesse Wilkins
 
Module 3_Lesson 7.pptx
Module 3_Lesson 7.pptxModule 3_Lesson 7.pptx
Module 3_Lesson 7.pptxcejobelle
 

Similar to Investigation and prosecution certificate course for pbi officer (20)

Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
 
Security policy.pdf
Security policy.pdfSecurity policy.pdf
Security policy.pdf
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governance
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
 
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
Legal aspects of using employee monitoring software
Legal aspects of using employee monitoring softwareLegal aspects of using employee monitoring software
Legal aspects of using employee monitoring software
 
A Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxA Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docx
 
The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the foll
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
 
ISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloISSC361_Project_John_Intindolo
ISSC361_Project_John_Intindolo
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
 
20110310 ARMA Northern CO Strategies and Policies for Social Media
20110310 ARMA Northern CO Strategies and Policies for Social Media20110310 ARMA Northern CO Strategies and Policies for Social Media
20110310 ARMA Northern CO Strategies and Policies for Social Media
 
Module 3_Lesson 7.pptx
Module 3_Lesson 7.pptxModule 3_Lesson 7.pptx
Module 3_Lesson 7.pptx
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Investigation and prosecution certificate course for pbi officer

  • 1. Investigation and Prosecution Certificate Course for PBI Officer TAWHIDUR RAHMAN TEAM LEAD, BANGLADESH NATIONAL CIRT, C|CISO, CCNP, C|EH,CHFI,CNDA, E|CSA, L|PT, E|NSA,GSEC, ITIL, COBIT,CFIP CERTIFIED CYBER CRIMINAL ANALYST, ISS, USA CERTIFIED CYBER COUNTER TERRORIST ANALYST, USA MEMBER OF IACIS, HIGH TECH CRIME, NATIONAL WHITE COLLAR CRIME, USA
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84. What is GOBISM?  Protection of government information and systems is a core accountability of each governmental agency. The role of Information Security Manual is to promote a consistent approach to information assurance and information security across entire Government of Bangladesh.  The Government of Bangladesh Information Security Manual (GOBISM) details processes and controls that are important for the protection of Bangladesh Government unclassified information and systems.
  • 85. Control Categories  Mandatory controls: the use, or-non-use thereof is essential in order to effectively manage identified risk, unless the control is demonstrably not relevant to the respective system.  Recommended controls: the use, or non-use thereof is considered good and recommended practice, but valid reasons for not implementing a control could exist.
  • 86. Information Security Governance – Roles and Responsibilities The Agency Head: The agency head must provide support for the development, implementation and ongoing maintenance of information security processes within their agency  The Chief Information Security Officer: CISO should be responsible for ensuring agency compliance with the GOBISM through facilitating a continuous program of certification and accreditation based on security risk management . CISO should be responsible for the implementation of information security measurement metrics and key performance indicators within the agency
  • 87. Information Security Governance – Roles and Responsibilities Information Technology Security Managers: ITSMs must be responsible for ensuring the development, maintenance, updating and implementation of Security Risk Management Plans (SRMPs), Systems Security Plans (SecPlan) and any Standard Operating Procedures (SOPs) for all agency systems  System Owners: The system owner is responsible for the overall operation of the system and they may delegate the day-to-day management and operation of the system to a system manager or managers.  System Users: All system users must comply with the relevant security policies and procedures for the systems they use
  • 88. What is in GOBISM?  Information Security within Government  Information Security Governance – Roles and Responsibilities  System Certification and Accreditation  Information Security Documentation  Information Security Monitoring  Information Security Incidents  Physical Security  Personnel Security
  • 89. What is in GOBISM?  Infrastructure (Cable Management)  Communication Systems and Devices (Fax/Printer/Scanner etc.)  Product Security  Decommissioning and Disposal  Software Security  Email Security  Access Control  Cryptography
  • 90. What is in GOBISM?  Network Security  Working Off-Site (BYOD)  Enterprise System Security
  • 91.
  • 92. What is Social Networks ?  Why Existing Social Networks are Important ?!  It provides Information/Intelligence  Provides Evidence  Sometimes Show way of Investigation  Help us to take preventive measure
  • 93. Identifying Popular Social Networks using in Bangladesh  Facebook  Twitter  Skype  Viber  Tango  Imo  WhatsApps  Istagram  Facebook Massenger  Email  Search Engines ( Google, Yahoo, Opera etc)
  • 94. Facebook Investigation  During Investigation we get two types of ID  Real ID (Given information is right)  Fake ID (Given all information is fake)  For initiating Investigation--  We have to collect same information from this two types of ID.
  • 95. Facebook Investigation 1. User Name 2. User ID/Profile ID 3. Numeric Personal ID 4. Objectionable posted content with full link/url.
  • 96. Facebook Investigation  Why it is important to collect this information-  To findout the specific ID/ Uniquely identify the accused ID world-wide.  If you say – open a facebook id by the name of Abdur Rahaman, posted a objectionable picture of someone.  When you search Facebook ID by the name Rahaman- you will get so many Rahaman's facebook ID.
  • 98. Facebook Investigation  So you have to collect Facebook User Name/Fcaebook User ID/Facebook Numeric Personal ID/ Objectionable posted content with full link/url regarding facebook investigation for world-wide uniquely identify the accused ID.
  • 99. Facebook Investigation  How to collect this information-  Asked the complainant to open his facebook id.  Doubble click on the accused Name.  You get the Accused User Name in Friend search option & User ID in the url.
  • 101. Facebook Investigation By the user ID/Profile ID, you can find-out numeric personal ID. Go to the Browser and past the user ID/profile ID in the blank space of the bellow website & click find numeric id. www.findmyfbid.com www.lookup-id.com
  • 105. Facebook Investigation How to take the posted objectionable content with link? 1. Double click on the post if is any .jpg /.png file. 2. You see the link in top url & picture is expand.
  • 106. Facebook Investigation After expanding the post like picture- 1. Just press PrtScr/PrtSysRQ button one time & past it on the word file by Ctrl+V.
  • 107. Facebook Investigation 1. Collect all of the information & past it on the word file. 2. Print the word file & seize before the witness.