Welcome to my presentation on
Cyber Security
Presented by: Elias Hossen
B.Ed (Hon’s), M.Ed, PGDICT
Inspector of Police (UB)
Criminal Investigation Department (CID)
Bangladesh Police.
saymeonline@gmail.com
+8801919933221
Cyber Security
Cybersecurity or Cyber Security?
“Cybersecurity” and “cyber security” are getting more and more mixed usage
lately, so much that they are becoming almost as ambiguous as the term “cloud”
was a few years back. The challenge information security executives and
professionals are faced with is knowing ̶ as the title implies ̶ when and why the
term should be used and how it should be presented, as a single word or two.
While there isn't any recognized authority on the subject per se, there are at
least some credible sources providing guidance that can help those of us in the
industry to decide on "when, why and how" to use the term.
For more information- http://www.infosecisland.com/blogview/23287-Cybersecurity-vs-Cyber-Security-When-Why-and-How-to-Use-the-Term.html
Elias Hossen, Digital Forensic Expert, CID, Dhaka.
Cybersecurity
What is Cybersecurity?
Cybersecurity is the practice of protecting systems,
networks, and programs from digital attacks. These cyber
attacks are usually aimed at accessing, changing, or
destroying sensitive information; extorting money from
users; or interrupting normal business processes.
Elias Hossen, Digital Forensic Expert, CID, Dhaka.
Cyber Security
Elements of cybersecurity
Ensuring cybersecurity requires the coordination of efforts throughout an information system,
which includes:
01. Application Security
02. Information Security
03. Network Security
04. Disaster recovery/buisness continuity planning
05. Operational Security
06. End-user education
Elias Hossen, Digital Forensic Expert, CID, Dhaka.
Cyber Security
Types of cybersecurity threats
01. Ransomware is a type of malware that involves an attacker locking the
victim's computer system files -- typically through encryption -- and
demanding a payment to decrypt and unlock them.
02.Malware is any file or program used to harm a computer user, such as
worms, computer viruses, Trojan horses and spyware.
Elias Hossen, Digital Forensic Expert, CID, Dhaka.
Cyber Security
03. Social engineering is an attack that relies on human interaction to trick users
into breaking security procedures in order to gain sensitive information that is
typically protected.
04. Phishing is a form of fraud where fraudulent emails are sent that resemble
emails from reputable sources; however, the intention of these emails is to
steal sensitive data, such as credit card or login information.
Elias Hossen, Digital Forensic Expert, CID, Dhaka.
Cyber Security
What is cybersecurity all about?
A successful cybersecurity approach has multiple layers of protection
spread across the computers, networks, programs, or data that one
intends to keep safe. In an organization, the people, processes, and
technology must all complement one another to create an effective
defense from cyber attacks.
Elias Hossen, Digital Forensic Expert, CID, Dhaka.
Cyber Security
 People
Users must understand and comply with basic data security principles like
choosing strong passwords, being wary of attachments in email, and backing up
data. Learn more about basic cybersecurity principles.
 Processes
Organizations must have a framework for how they deal with both attempted and
successful cyber attacks. One well-respected frame work can guide you. It
explains how you can identify attacks, protect systems, detect and respond to
threats, and recover from successful attacks. Watch a video explanation of the
NIST cybersecurity framework .
Elias Hossen, Digital Forensic Expert, CID, Dhaka.
Cyber Security
 Technology
Technology is essential to giving organizations and individuals the computer
security tools needed to protect themselves from cyber attacks. Three
main entities must be protected: endpoint devices like computers, smart
devices, and routers; networks; and the cloud. Common technology used
to protect these entities include next-generation firewalls, DNS filtering,
malware protection, antivirus software, and email security solutions.
Elias Hossen, Digital Forensic Expert, CID, Dhaka.
Cyber Security
Bangladesh Government adopts cyber security declaration
The government has adopted a cyber-security declaration 2017 asking
organizations to develop actionable cyber security road maps to be approved
and monitored by the top management.
The declaration, signed by honorable State Minister for ICT Zunaid Ahmed
Palak, was released on Thursday. It has been prepared and adopted at the end
of the international cyber security conference which was held in Dhaka on
March 9.
Elias Hossen, Digital Forensic Expert, CID, Dhaka.
APPRISAL OF GUEST SPEAKER
 Police Inspector Elias Hossen
 Join BD Police: As Sub- Inspector 2007
 Educational Qualification: B.Ed (Hon's), M.Ed. PGDICT, MACPM.
Course completed:
 1. Enhancement of cyber crime investigation capability of Bangladesh Police, Soonchung Hung
University, South Korea, 2014
 2. Cyber Security Course , Gujrat Forensic Science University, India 2016
 3. Exploit Hackers Tools & Technique, Singapore, October 2018
4. Access Data FTK , UAE Dubai, December 2018
 Working Experience: Work as a Digital forensic Expert in IT Forensic Lab since 2012
 Instructional Experience : Police Academy, Forensic Training Institute (FTI), Detective Training
School (DTS), Cyber Crime Investigation Training Center (CITC)

Cyber security-presentation

  • 1.
    Welcome to mypresentation on Cyber Security Presented by: Elias Hossen B.Ed (Hon’s), M.Ed, PGDICT Inspector of Police (UB) Criminal Investigation Department (CID) Bangladesh Police. saymeonline@gmail.com +8801919933221
  • 2.
    Cyber Security Cybersecurity orCyber Security? “Cybersecurity” and “cyber security” are getting more and more mixed usage lately, so much that they are becoming almost as ambiguous as the term “cloud” was a few years back. The challenge information security executives and professionals are faced with is knowing ̶ as the title implies ̶ when and why the term should be used and how it should be presented, as a single word or two. While there isn't any recognized authority on the subject per se, there are at least some credible sources providing guidance that can help those of us in the industry to decide on "when, why and how" to use the term. For more information- http://www.infosecisland.com/blogview/23287-Cybersecurity-vs-Cyber-Security-When-Why-and-How-to-Use-the-Term.html Elias Hossen, Digital Forensic Expert, CID, Dhaka.
  • 3.
    Cybersecurity What is Cybersecurity? Cybersecurityis the practice of protecting systems, networks, and programs from digital attacks. These cyber attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Elias Hossen, Digital Forensic Expert, CID, Dhaka.
  • 4.
    Cyber Security Elements ofcybersecurity Ensuring cybersecurity requires the coordination of efforts throughout an information system, which includes: 01. Application Security 02. Information Security 03. Network Security 04. Disaster recovery/buisness continuity planning 05. Operational Security 06. End-user education Elias Hossen, Digital Forensic Expert, CID, Dhaka.
  • 5.
    Cyber Security Types ofcybersecurity threats 01. Ransomware is a type of malware that involves an attacker locking the victim's computer system files -- typically through encryption -- and demanding a payment to decrypt and unlock them. 02.Malware is any file or program used to harm a computer user, such as worms, computer viruses, Trojan horses and spyware. Elias Hossen, Digital Forensic Expert, CID, Dhaka.
  • 6.
    Cyber Security 03. Socialengineering is an attack that relies on human interaction to trick users into breaking security procedures in order to gain sensitive information that is typically protected. 04. Phishing is a form of fraud where fraudulent emails are sent that resemble emails from reputable sources; however, the intention of these emails is to steal sensitive data, such as credit card or login information. Elias Hossen, Digital Forensic Expert, CID, Dhaka.
  • 7.
    Cyber Security What iscybersecurity all about? A successful cybersecurity approach has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe. In an organization, the people, processes, and technology must all complement one another to create an effective defense from cyber attacks. Elias Hossen, Digital Forensic Expert, CID, Dhaka.
  • 8.
    Cyber Security  People Usersmust understand and comply with basic data security principles like choosing strong passwords, being wary of attachments in email, and backing up data. Learn more about basic cybersecurity principles.  Processes Organizations must have a framework for how they deal with both attempted and successful cyber attacks. One well-respected frame work can guide you. It explains how you can identify attacks, protect systems, detect and respond to threats, and recover from successful attacks. Watch a video explanation of the NIST cybersecurity framework . Elias Hossen, Digital Forensic Expert, CID, Dhaka.
  • 9.
    Cyber Security  Technology Technologyis essential to giving organizations and individuals the computer security tools needed to protect themselves from cyber attacks. Three main entities must be protected: endpoint devices like computers, smart devices, and routers; networks; and the cloud. Common technology used to protect these entities include next-generation firewalls, DNS filtering, malware protection, antivirus software, and email security solutions. Elias Hossen, Digital Forensic Expert, CID, Dhaka.
  • 10.
    Cyber Security Bangladesh Governmentadopts cyber security declaration The government has adopted a cyber-security declaration 2017 asking organizations to develop actionable cyber security road maps to be approved and monitored by the top management. The declaration, signed by honorable State Minister for ICT Zunaid Ahmed Palak, was released on Thursday. It has been prepared and adopted at the end of the international cyber security conference which was held in Dhaka on March 9. Elias Hossen, Digital Forensic Expert, CID, Dhaka.
  • 11.
    APPRISAL OF GUESTSPEAKER  Police Inspector Elias Hossen  Join BD Police: As Sub- Inspector 2007  Educational Qualification: B.Ed (Hon's), M.Ed. PGDICT, MACPM. Course completed:  1. Enhancement of cyber crime investigation capability of Bangladesh Police, Soonchung Hung University, South Korea, 2014  2. Cyber Security Course , Gujrat Forensic Science University, India 2016  3. Exploit Hackers Tools & Technique, Singapore, October 2018 4. Access Data FTK , UAE Dubai, December 2018  Working Experience: Work as a Digital forensic Expert in IT Forensic Lab since 2012  Instructional Experience : Police Academy, Forensic Training Institute (FTI), Detective Training School (DTS), Cyber Crime Investigation Training Center (CITC)