SlideShare a Scribd company logo
Cyber	
  Security	
  Awareness:	
  In	
  
Perspec5ve	
  of	
  Bangladesh	
  
By-­‐	
  
Md.	
  Shaqul	
  Hasan	
  
	
  
Hasan[at]aitlbd[dot]com	
  
Internet	
  in	
  Bangladesh	
  
•  More	
  then	
  40	
  millions	
  internet	
  user	
  
•  Using	
  70Gbps+	
  of	
  internet	
  traffic	
  
•  Internet	
  user	
  growth	
  rate	
  is	
  very	
  high	
  
•  Broadband	
  penetraDon	
  is	
  increasing	
  
•  But	
  maximum	
  user	
  has	
  no	
  idea	
  about	
  Cyber	
  
Security	
  System.	
  
2	
  bdNOG2	
  
 
	
  
	
  
REAL	
  TIME	
  CYBER	
  ATTACK	
  	
  STATISTICS	
  
Presence	
  of	
  Bangladesh	
  in	
  global	
  
cyber	
  aIack	
  map	
  
4	
  bdNOG2	
  
Presence	
  of	
  Bangladesh	
  in	
  global	
  
cyber	
  aIack	
  map	
  
5	
  bdNOG2	
  
Presence	
  of	
  Bangladesh	
  in	
  global	
  
cyber	
  aIack	
  map	
  
6	
  bdNOG2	
  
Presence	
  of	
  Bangladesh	
  in	
  global	
  
cyber	
  aIack	
  map	
  
7	
  bdNOG2	
  
Cyber	
  Crime	
  In	
  Bangladesh	
  
•  By	
  Social	
  Media	
  
•  By	
  Mobile	
  Phone	
  
•  By	
  Computer	
  
 
	
  
	
  
	
  	
  	
  	
  	
  	
  	
  Social	
  Media	
  In	
  Bangladesh	
  
Social	
  media	
  security	
  vulnerabili5es:	
  
	
  
•  Social	
  media	
  site	
  facebook	
  is	
  no	
  1	
  browsed	
  web	
  by	
  country’s	
  
internet	
  user	
  
•  Most	
  user	
  are	
  not	
  concern	
  about	
  security	
  
•  Maximum	
  social	
  media	
  user	
  are	
  teenager	
  
•  Social	
  media	
  Users	
  are	
  more	
  focused	
  on	
  “	
  More	
  friends,	
  more	
  
popular”	
  
•  Social	
  media	
  enables	
  the	
  spread	
  of	
  unreliable	
  and	
  false	
  
informaDon.	
  
•  Some	
  internet	
  users	
  are	
  using	
  internet	
  only	
  for	
  staying	
  in	
  social	
  
media.	
  
•  InteracDon	
  with	
  strangers	
  in	
  social	
  media	
  is	
  very	
  high…!!!	
  	
  
10	
  bdNOG2	
  
Social	
  media	
  security	
  threats:	
  
	
  
•  Profile	
  visitor	
  plug-­‐in	
  
•  Dislike	
  buWon	
  	
  
•  hacking	
  
•  Trojans	
  
•  Malicious	
  web	
  
•  Clickjacking	
  
11	
  bdNOG2	
  
Social	
  media	
  risk	
  mi5ga5on:	
  
	
  
•  Use	
  two-­‐factor	
  authen5ca5on	
  whenever	
  possible	
  
•  Do	
  not	
  add	
  strangers	
  to	
  your	
  friends	
  list	
  	
  
•  Always	
  check	
  the	
  URL	
  of	
  a	
  page	
  status	
  before	
  
opening	
  it	
  
•  avoid	
  unnecessary	
  applica5ons	
  of	
  social	
  media	
  
•  Keep	
  your	
  browser	
  up	
  to	
  date	
  because	
  an	
  out-­‐dated	
  
browser	
  is	
  good	
  vic5m	
  
•  Awareness	
  &	
  training	
  for	
  new	
  user.	
  
	
  
12	
  bdNOG2	
  
 
	
  
	
  
Mobile	
  Phone	
  in	
  Bangladesh	
  
Mobile	
  Phone	
  Security	
  Vulnerabili5es	
  
•  Mobile	
  Money	
  transfer	
  increasing	
  day	
  by	
  day	
  
•  Online	
  banking	
  is	
  Popular	
  	
  
•  Rapid	
  growing	
  Social	
  media	
  user	
  via	
  mobile	
  
•  Smartphone	
  user	
  growing	
  rapidly	
  
•  But	
  they	
  are	
  in	
  dark	
  about	
  cyber	
  security	
  
14	
  bdNOG2	
  
Phone	
  Security	
  Threats	
  
•  Missed	
  call	
  or	
  call	
  from	
  unknown	
  number	
  
•  Sms/call	
  from	
  special	
  number	
  
•  Voice	
  phishing	
  or	
  vishing	
  
•  Common	
  operaDng	
  systems	
  
•  Apps	
  without	
  security	
  check	
  
•  LoWery	
  winner	
  scam	
  
15	
  bdNOG2	
  
Phone	
  threat	
  mi5ga5on	
  
•  When	
  choosing	
  a	
  mobile	
  phone	
  	
  consider	
  its	
  security	
  
features.	
  
•  Maintain	
  physical	
  control	
  of	
  the	
  device,	
  especially	
  in	
  
public	
  or	
  semi-­‐public	
  places.	
  	
  
•  Disable	
  interfaces	
  that	
  are	
  not	
  currently	
  in	
  use,	
  such	
  
as	
  Bluetooth,	
  infrared,	
  or	
  	
  Wifi	
  .	
  
•  Do	
  not	
  follow	
  links	
  sent	
  in	
  suspicious	
  	
  email	
  or	
  text	
  
messages	
  or	
  suspicious	
  call.	
  
•  Limit	
  exposure	
  of	
  your	
  	
  mobile	
  	
  phone	
  number	
  
•  Be	
  choosy	
  when	
  selecDng	
  and	
  installing	
  new	
  apps.	
  
16	
  bdNOG2	
  
 
	
  
	
  
Computer	
  in	
  Bangladesh	
  	
  
Local	
  infec5on	
  rate	
  
18	
  bdNOG2	
  
Top	
  10	
  Local	
  infec5on	
  country	
  list	
  
19	
  bdNOG2	
  
World	
  top	
  	
  10	
  Infected	
  country	
  
20	
  bdNOG2	
  
Internet	
  user	
  	
  Vulnerabili5es	
  
21	
  bdNOG2	
  
Computer	
  Security	
  Vulnerabili5es	
  
•  Very	
  High	
  rate	
  of	
  local	
  pc	
  infecDon	
  
•  Huge	
  number	
  of	
  user	
  are	
  not	
  aware	
  about	
  cyber	
  
security	
  
•  large	
  	
  shared	
  broadband	
  network	
  
•  Huge	
  Pirated	
  sobware	
  user	
  
•  Very	
  few	
  user	
  used	
  anDvirus	
  	
  
•  Large	
  number	
  of	
  free	
  sobware	
  or	
  apps	
  are	
  used	
  
•  Large	
  NATed	
  	
  IP	
  network	
  
•  Weak	
  password	
  pracDce	
  
•  Huge	
  peer-­‐to-­‐peer	
  network	
  user	
  
22	
  bdNOG2	
  
Computer	
  Security	
  Threat	
  
•  Virus	
  
•  Spyware	
  
•  Adware	
  
•  Malware	
  
•  Phishing	
  
•  Trojan	
  
•  Web	
  hijacking	
  
•  Hacking	
  
•  Keylogger	
  	
  
	
  
23	
  bdNOG2	
  
How	
  to	
  Mi5gate	
  
•  Properly	
  configure	
  and	
  patch	
  opera5ng	
  systems,	
  browsers,	
  
and	
  other	
  soUware	
  .	
  
•  Use	
  and	
  regularly	
  update	
  of	
  firewalls,	
  an5-­‐virus,	
  and	
  an5-­‐
spyware	
  .	
  
•  Use	
  of	
  strong	
  passwords	
  and	
  never	
  share	
  passwords.	
  
•  Think	
  before	
  you	
  click.	
  	
  
•  Do	
  not	
  open	
  email	
  or	
  related	
  aIachments	
  from	
  un-­‐trusted	
  
sources.	
  
•  Protect	
  access	
  creden5als	
  from	
  outsider.	
  
•  Follow	
  your	
  organiza5on's	
  cyber	
  security	
  policies,	
  and	
  report	
  
viola5on	
  issues	
  when	
  they	
  occur	
  to	
  concern	
  authority	
  .	
  
24	
  bdNOG2	
  
Thank	
  You	
  
25	
  bdNOG2	
  

More Related Content

What's hot

Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
Kaushal Solanki
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Hacking
HackingHacking
Hacking
Ranjan Som
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs cracking
Naren Naren
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In Bangladesh
Home
 
Cyber security
 Cyber security Cyber security
Cyber security
Tanu Basoiya
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
Sanguine_Eva
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
Sheetal Kandhare
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
kishore golla
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
Bangladesh Network Operators Group
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
Arindam Sarkar
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on Youth
Dababrata Mondal
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
Tushar Rajput
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Reyad Hossain
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 

What's hot (20)

Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Hacking
HackingHacking
Hacking
 
cyber crime
cyber crimecyber crime
cyber crime
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs cracking
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In Bangladesh
 
Cyber security
 Cyber security Cyber security
Cyber security
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on Youth
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Viewers also liked

ISP status in Bangladesh 2016
ISP status in Bangladesh 2016ISP status in Bangladesh 2016
ISP status in Bangladesh 2016
Bangladesh Network Operators Group
 
Africa telecom market report, 2010 2011
Africa telecom market report, 2010 2011Africa telecom market report, 2010 2011
Africa telecom market report, 2010 2011ResearchInChina
 
Children of the internet
Children of the internetChildren of the internet
Children of the internetTeam Pramkaew
 
Awareness of Children Internet Addiction
Awareness of Children Internet Addiction Awareness of Children Internet Addiction
Awareness of Children Internet Addiction
Bangladesh Network Operators Group
 
History and Evolution of Bangladesh Internet
History and Evolution of Bangladesh Internet History and Evolution of Bangladesh Internet
History and Evolution of Bangladesh Internet
Bangladesh Network Operators Group
 
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Fakrul Alam
 
Internet Development Experiences and Lessons
Internet Development Experiences and Lessons Internet Development Experiences and Lessons
Internet Development Experiences and Lessons
Bangladesh Network Operators Group
 
Design and Development of Internet System for Residential Smart-Grid
Design and Development of Internet System for Residential  Smart-Grid Design and Development of Internet System for Residential  Smart-Grid
Design and Development of Internet System for Residential Smart-Grid
Ateeq Ur Rehman
 
Internet for Development
Internet for DevelopmentInternet for Development
Internet for Development
Roberto Polillo
 
IP Transit : Simple Math - Simple Calculation
IP Transit : Simple Math - Simple CalculationIP Transit : Simple Math - Simple Calculation
IP Transit : Simple Math - Simple Calculation
Bangladesh Network Operators Group
 
India :Telecommunication Sector Report_August 2013
India :Telecommunication Sector Report_August 2013India :Telecommunication Sector Report_August 2013
India :Telecommunication Sector Report_August 2013
India Brand Equity Foundation
 
Fast Convergence Techniques
Fast Convergence TechniquesFast Convergence Techniques
Fast Convergence Techniques
Bangladesh Network Operators Group
 
Optical Fiber Communication & Bangladesh
Optical Fiber Communication & BangladeshOptical Fiber Communication & Bangladesh
Optical Fiber Communication & Bangladesh
Md. Atiqur Rahman
 
Broadband for Digital Bangladesh & recommendation from ISPAB
Broadband for Digital Bangladesh & recommendation from ISPABBroadband for Digital Bangladesh & recommendation from ISPAB
Broadband for Digital Bangladesh & recommendation from ISPAB
Bangladesh Network Operators Group
 
Introduction to Development for the Internet
Introduction to Development for the InternetIntroduction to Development for the Internet
Introduction to Development for the Internet
Mike Crabb
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
bgmartinez1971
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 

Viewers also liked (19)

ISP status in Bangladesh 2016
ISP status in Bangladesh 2016ISP status in Bangladesh 2016
ISP status in Bangladesh 2016
 
Africa telecom market report, 2010 2011
Africa telecom market report, 2010 2011Africa telecom market report, 2010 2011
Africa telecom market report, 2010 2011
 
Children of the internet
Children of the internetChildren of the internet
Children of the internet
 
Awareness of Children Internet Addiction
Awareness of Children Internet Addiction Awareness of Children Internet Addiction
Awareness of Children Internet Addiction
 
History and Evolution of Bangladesh Internet
History and Evolution of Bangladesh Internet History and Evolution of Bangladesh Internet
History and Evolution of Bangladesh Internet
 
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
 
Internet Development Experiences and Lessons
Internet Development Experiences and Lessons Internet Development Experiences and Lessons
Internet Development Experiences and Lessons
 
Design and Development of Internet System for Residential Smart-Grid
Design and Development of Internet System for Residential  Smart-Grid Design and Development of Internet System for Residential  Smart-Grid
Design and Development of Internet System for Residential Smart-Grid
 
Internet for Development
Internet for DevelopmentInternet for Development
Internet for Development
 
IP Transit : Simple Math - Simple Calculation
IP Transit : Simple Math - Simple CalculationIP Transit : Simple Math - Simple Calculation
IP Transit : Simple Math - Simple Calculation
 
India :Telecommunication Sector Report_August 2013
India :Telecommunication Sector Report_August 2013India :Telecommunication Sector Report_August 2013
India :Telecommunication Sector Report_August 2013
 
Fast Convergence Techniques
Fast Convergence TechniquesFast Convergence Techniques
Fast Convergence Techniques
 
Optical Fiber Communication & Bangladesh
Optical Fiber Communication & BangladeshOptical Fiber Communication & Bangladesh
Optical Fiber Communication & Bangladesh
 
Broadband for Digital Bangladesh & recommendation from ISPAB
Broadband for Digital Bangladesh & recommendation from ISPABBroadband for Digital Bangladesh & recommendation from ISPAB
Broadband for Digital Bangladesh & recommendation from ISPAB
 
Introduction to Development for the Internet
Introduction to Development for the InternetIntroduction to Development for the Internet
Introduction to Development for the Internet
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar to Cyber security Awareness: In perspective of Bangladesh

Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
SABBY GILL
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
Varshil Patel
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
Priyanka Aash
 
Cyber security
Cyber security        Cyber security
Cyber security
Shubhamlohiya
 
Transparent Smartphone Spying
Transparent Smartphone SpyingTransparent Smartphone Spying
Transparent Smartphone SpyingGeorgia Weidman
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
chauhananand17
 
Information security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh GhodelaInformation security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh Ghodela
Chandan Singh Ghodela
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
Dr. Amitabha Yadav
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
Asma Hossain
 
The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our Community
AVG Technologies AU
 
News Bytes - December 2015
News Bytes - December 2015News Bytes - December 2015
News Bytes - December 2015
n|u - The Open Security Community
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
ShubhamGupta833557
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
Great Bay Software
 
Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion
Ernest Staats
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
Sazed Salman
 
What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing Conference
Cengage Learning
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
Tech Mahindra Ltd.
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuityAlisha Korpal
 

Similar to Cyber security Awareness: In perspective of Bangladesh (20)

Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber security
Cyber security        Cyber security
Cyber security
 
Transparent Smartphone Spying
Transparent Smartphone SpyingTransparent Smartphone Spying
Transparent Smartphone Spying
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
 
Information security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh GhodelaInformation security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh Ghodela
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our Community
 
News Bytes - December 2015
News Bytes - December 2015News Bytes - December 2015
News Bytes - December 2015
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing Conference
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 

More from Bangladesh Network Operators Group

Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and CephAccelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Bangladesh Network Operators Group
 
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJRecent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
Bangladesh Network Operators Group
 
Fact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in BangladeshFact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in Bangladesh
Bangladesh Network Operators Group
 
AI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the PyramidAI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the Pyramid
Bangladesh Network Operators Group
 
IPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCTIPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCT
Bangladesh Network Operators Group
 
Network eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life ProductNetwork eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life Product
Bangladesh Network Operators Group
 
A plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s DeploymentA plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s Deployment
Bangladesh Network Operators Group
 
IPv6 Deployment in South Asia 2022
IPv6 Deployment in South Asia  2022IPv6 Deployment in South Asia  2022
IPv6 Deployment in South Asia 2022
Bangladesh Network Operators Group
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
Bangladesh Network Operators Group
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
Bangladesh Network Operators Group
 
An Overview about open UDP Services
An Overview about open UDP ServicesAn Overview about open UDP Services
An Overview about open UDP Services
Bangladesh Network Operators Group
 
12 Years in DNS Security As a Defender
12 Years in DNS Security As a Defender12 Years in DNS Security As a Defender
12 Years in DNS Security As a Defender
Bangladesh Network Operators Group
 
Contents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User ExperienceContents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User Experience
Bangladesh Network Operators Group
 
BdNOG-20220625-MT-v6.0.pptx
BdNOG-20220625-MT-v6.0.pptxBdNOG-20220625-MT-v6.0.pptx
BdNOG-20220625-MT-v6.0.pptx
Bangladesh Network Operators Group
 
Route Leak Prevension with BGP Community
Route Leak Prevension with BGP CommunityRoute Leak Prevension with BGP Community
Route Leak Prevension with BGP Community
Bangladesh Network Operators Group
 
Tale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIXTale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIX
Bangladesh Network Operators Group
 
MANRS for Network Operators
MANRS for Network OperatorsMANRS for Network Operators
MANRS for Network Operators
Bangladesh Network Operators Group
 
Re-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with GrafanaRe-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with Grafana
Bangladesh Network Operators Group
 
RPKI ROA updates
RPKI ROA updatesRPKI ROA updates
Blockchain Demystified
Blockchain DemystifiedBlockchain Demystified
Blockchain Demystified
Bangladesh Network Operators Group
 

More from Bangladesh Network Operators Group (20)

Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and CephAccelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
 
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJRecent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
 
Fact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in BangladeshFact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in Bangladesh
 
AI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the PyramidAI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the Pyramid
 
IPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCTIPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCT
 
Network eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life ProductNetwork eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life Product
 
A plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s DeploymentA plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s Deployment
 
IPv6 Deployment in South Asia 2022
IPv6 Deployment in South Asia  2022IPv6 Deployment in South Asia  2022
IPv6 Deployment in South Asia 2022
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
 
An Overview about open UDP Services
An Overview about open UDP ServicesAn Overview about open UDP Services
An Overview about open UDP Services
 
12 Years in DNS Security As a Defender
12 Years in DNS Security As a Defender12 Years in DNS Security As a Defender
12 Years in DNS Security As a Defender
 
Contents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User ExperienceContents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User Experience
 
BdNOG-20220625-MT-v6.0.pptx
BdNOG-20220625-MT-v6.0.pptxBdNOG-20220625-MT-v6.0.pptx
BdNOG-20220625-MT-v6.0.pptx
 
Route Leak Prevension with BGP Community
Route Leak Prevension with BGP CommunityRoute Leak Prevension with BGP Community
Route Leak Prevension with BGP Community
 
Tale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIXTale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIX
 
MANRS for Network Operators
MANRS for Network OperatorsMANRS for Network Operators
MANRS for Network Operators
 
Re-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with GrafanaRe-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with Grafana
 
RPKI ROA updates
RPKI ROA updatesRPKI ROA updates
RPKI ROA updates
 
Blockchain Demystified
Blockchain DemystifiedBlockchain Demystified
Blockchain Demystified
 

Recently uploaded

Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 

Recently uploaded (16)

Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 

Cyber security Awareness: In perspective of Bangladesh

  • 1. Cyber  Security  Awareness:  In   Perspec5ve  of  Bangladesh   By-­‐   Md.  Shaqul  Hasan     Hasan[at]aitlbd[dot]com  
  • 2. Internet  in  Bangladesh   •  More  then  40  millions  internet  user   •  Using  70Gbps+  of  internet  traffic   •  Internet  user  growth  rate  is  very  high   •  Broadband  penetraDon  is  increasing   •  But  maximum  user  has  no  idea  about  Cyber   Security  System.   2  bdNOG2  
  • 3.       REAL  TIME  CYBER  ATTACK    STATISTICS  
  • 4. Presence  of  Bangladesh  in  global   cyber  aIack  map   4  bdNOG2  
  • 5. Presence  of  Bangladesh  in  global   cyber  aIack  map   5  bdNOG2  
  • 6. Presence  of  Bangladesh  in  global   cyber  aIack  map   6  bdNOG2  
  • 7. Presence  of  Bangladesh  in  global   cyber  aIack  map   7  bdNOG2  
  • 8. Cyber  Crime  In  Bangladesh   •  By  Social  Media   •  By  Mobile  Phone   •  By  Computer  
  • 9.                    Social  Media  In  Bangladesh  
  • 10. Social  media  security  vulnerabili5es:     •  Social  media  site  facebook  is  no  1  browsed  web  by  country’s   internet  user   •  Most  user  are  not  concern  about  security   •  Maximum  social  media  user  are  teenager   •  Social  media  Users  are  more  focused  on  “  More  friends,  more   popular”   •  Social  media  enables  the  spread  of  unreliable  and  false   informaDon.   •  Some  internet  users  are  using  internet  only  for  staying  in  social   media.   •  InteracDon  with  strangers  in  social  media  is  very  high…!!!     10  bdNOG2  
  • 11. Social  media  security  threats:     •  Profile  visitor  plug-­‐in   •  Dislike  buWon     •  hacking   •  Trojans   •  Malicious  web   •  Clickjacking   11  bdNOG2  
  • 12. Social  media  risk  mi5ga5on:     •  Use  two-­‐factor  authen5ca5on  whenever  possible   •  Do  not  add  strangers  to  your  friends  list     •  Always  check  the  URL  of  a  page  status  before   opening  it   •  avoid  unnecessary  applica5ons  of  social  media   •  Keep  your  browser  up  to  date  because  an  out-­‐dated   browser  is  good  vic5m   •  Awareness  &  training  for  new  user.     12  bdNOG2  
  • 13.       Mobile  Phone  in  Bangladesh  
  • 14. Mobile  Phone  Security  Vulnerabili5es   •  Mobile  Money  transfer  increasing  day  by  day   •  Online  banking  is  Popular     •  Rapid  growing  Social  media  user  via  mobile   •  Smartphone  user  growing  rapidly   •  But  they  are  in  dark  about  cyber  security   14  bdNOG2  
  • 15. Phone  Security  Threats   •  Missed  call  or  call  from  unknown  number   •  Sms/call  from  special  number   •  Voice  phishing  or  vishing   •  Common  operaDng  systems   •  Apps  without  security  check   •  LoWery  winner  scam   15  bdNOG2  
  • 16. Phone  threat  mi5ga5on   •  When  choosing  a  mobile  phone    consider  its  security   features.   •  Maintain  physical  control  of  the  device,  especially  in   public  or  semi-­‐public  places.     •  Disable  interfaces  that  are  not  currently  in  use,  such   as  Bluetooth,  infrared,  or    Wifi  .   •  Do  not  follow  links  sent  in  suspicious    email  or  text   messages  or  suspicious  call.   •  Limit  exposure  of  your    mobile    phone  number   •  Be  choosy  when  selecDng  and  installing  new  apps.   16  bdNOG2  
  • 17.       Computer  in  Bangladesh    
  • 18. Local  infec5on  rate   18  bdNOG2  
  • 19. Top  10  Local  infec5on  country  list   19  bdNOG2  
  • 20. World  top    10  Infected  country   20  bdNOG2  
  • 21. Internet  user    Vulnerabili5es   21  bdNOG2  
  • 22. Computer  Security  Vulnerabili5es   •  Very  High  rate  of  local  pc  infecDon   •  Huge  number  of  user  are  not  aware  about  cyber   security   •  large    shared  broadband  network   •  Huge  Pirated  sobware  user   •  Very  few  user  used  anDvirus     •  Large  number  of  free  sobware  or  apps  are  used   •  Large  NATed    IP  network   •  Weak  password  pracDce   •  Huge  peer-­‐to-­‐peer  network  user   22  bdNOG2  
  • 23. Computer  Security  Threat   •  Virus   •  Spyware   •  Adware   •  Malware   •  Phishing   •  Trojan   •  Web  hijacking   •  Hacking   •  Keylogger       23  bdNOG2  
  • 24. How  to  Mi5gate   •  Properly  configure  and  patch  opera5ng  systems,  browsers,   and  other  soUware  .   •  Use  and  regularly  update  of  firewalls,  an5-­‐virus,  and  an5-­‐ spyware  .   •  Use  of  strong  passwords  and  never  share  passwords.   •  Think  before  you  click.     •  Do  not  open  email  or  related  aIachments  from  un-­‐trusted   sources.   •  Protect  access  creden5als  from  outsider.   •  Follow  your  organiza5on's  cyber  security  policies,  and  report   viola5on  issues  when  they  occur  to  concern  authority  .   24  bdNOG2  
  • 25. Thank  You   25  bdNOG2