SlideShare uma empresa Scribd logo
1 de 25
Baixar para ler offline
Cyber	
  Security	
  Awareness:	
  In	
  
Perspec5ve	
  of	
  Bangladesh	
  
By-­‐	
  
Md.	
  Shaqul	
  Hasan	
  
	
  
Hasan[at]aitlbd[dot]com	
  
Internet	
  in	
  Bangladesh	
  
•  More	
  then	
  40	
  millions	
  internet	
  user	
  
•  Using	
  70Gbps+	
  of	
  internet	
  traffic	
  
•  Internet	
  user	
  growth	
  rate	
  is	
  very	
  high	
  
•  Broadband	
  penetraDon	
  is	
  increasing	
  
•  But	
  maximum	
  user	
  has	
  no	
  idea	
  about	
  Cyber	
  
Security	
  System.	
  
2	
  bdNOG2	
  
 
	
  
	
  
REAL	
  TIME	
  CYBER	
  ATTACK	
  	
  STATISTICS	
  
Presence	
  of	
  Bangladesh	
  in	
  global	
  
cyber	
  aIack	
  map	
  
4	
  bdNOG2	
  
Presence	
  of	
  Bangladesh	
  in	
  global	
  
cyber	
  aIack	
  map	
  
5	
  bdNOG2	
  
Presence	
  of	
  Bangladesh	
  in	
  global	
  
cyber	
  aIack	
  map	
  
6	
  bdNOG2	
  
Presence	
  of	
  Bangladesh	
  in	
  global	
  
cyber	
  aIack	
  map	
  
7	
  bdNOG2	
  
Cyber	
  Crime	
  In	
  Bangladesh	
  
•  By	
  Social	
  Media	
  
•  By	
  Mobile	
  Phone	
  
•  By	
  Computer	
  
 
	
  
	
  
	
  	
  	
  	
  	
  	
  	
  Social	
  Media	
  In	
  Bangladesh	
  
Social	
  media	
  security	
  vulnerabili5es:	
  
	
  
•  Social	
  media	
  site	
  facebook	
  is	
  no	
  1	
  browsed	
  web	
  by	
  country’s	
  
internet	
  user	
  
•  Most	
  user	
  are	
  not	
  concern	
  about	
  security	
  
•  Maximum	
  social	
  media	
  user	
  are	
  teenager	
  
•  Social	
  media	
  Users	
  are	
  more	
  focused	
  on	
  “	
  More	
  friends,	
  more	
  
popular”	
  
•  Social	
  media	
  enables	
  the	
  spread	
  of	
  unreliable	
  and	
  false	
  
informaDon.	
  
•  Some	
  internet	
  users	
  are	
  using	
  internet	
  only	
  for	
  staying	
  in	
  social	
  
media.	
  
•  InteracDon	
  with	
  strangers	
  in	
  social	
  media	
  is	
  very	
  high…!!!	
  	
  
10	
  bdNOG2	
  
Social	
  media	
  security	
  threats:	
  
	
  
•  Profile	
  visitor	
  plug-­‐in	
  
•  Dislike	
  buWon	
  	
  
•  hacking	
  
•  Trojans	
  
•  Malicious	
  web	
  
•  Clickjacking	
  
11	
  bdNOG2	
  
Social	
  media	
  risk	
  mi5ga5on:	
  
	
  
•  Use	
  two-­‐factor	
  authen5ca5on	
  whenever	
  possible	
  
•  Do	
  not	
  add	
  strangers	
  to	
  your	
  friends	
  list	
  	
  
•  Always	
  check	
  the	
  URL	
  of	
  a	
  page	
  status	
  before	
  
opening	
  it	
  
•  avoid	
  unnecessary	
  applica5ons	
  of	
  social	
  media	
  
•  Keep	
  your	
  browser	
  up	
  to	
  date	
  because	
  an	
  out-­‐dated	
  
browser	
  is	
  good	
  vic5m	
  
•  Awareness	
  &	
  training	
  for	
  new	
  user.	
  
	
  
12	
  bdNOG2	
  
 
	
  
	
  
Mobile	
  Phone	
  in	
  Bangladesh	
  
Mobile	
  Phone	
  Security	
  Vulnerabili5es	
  
•  Mobile	
  Money	
  transfer	
  increasing	
  day	
  by	
  day	
  
•  Online	
  banking	
  is	
  Popular	
  	
  
•  Rapid	
  growing	
  Social	
  media	
  user	
  via	
  mobile	
  
•  Smartphone	
  user	
  growing	
  rapidly	
  
•  But	
  they	
  are	
  in	
  dark	
  about	
  cyber	
  security	
  
14	
  bdNOG2	
  
Phone	
  Security	
  Threats	
  
•  Missed	
  call	
  or	
  call	
  from	
  unknown	
  number	
  
•  Sms/call	
  from	
  special	
  number	
  
•  Voice	
  phishing	
  or	
  vishing	
  
•  Common	
  operaDng	
  systems	
  
•  Apps	
  without	
  security	
  check	
  
•  LoWery	
  winner	
  scam	
  
15	
  bdNOG2	
  
Phone	
  threat	
  mi5ga5on	
  
•  When	
  choosing	
  a	
  mobile	
  phone	
  	
  consider	
  its	
  security	
  
features.	
  
•  Maintain	
  physical	
  control	
  of	
  the	
  device,	
  especially	
  in	
  
public	
  or	
  semi-­‐public	
  places.	
  	
  
•  Disable	
  interfaces	
  that	
  are	
  not	
  currently	
  in	
  use,	
  such	
  
as	
  Bluetooth,	
  infrared,	
  or	
  	
  Wifi	
  .	
  
•  Do	
  not	
  follow	
  links	
  sent	
  in	
  suspicious	
  	
  email	
  or	
  text	
  
messages	
  or	
  suspicious	
  call.	
  
•  Limit	
  exposure	
  of	
  your	
  	
  mobile	
  	
  phone	
  number	
  
•  Be	
  choosy	
  when	
  selecDng	
  and	
  installing	
  new	
  apps.	
  
16	
  bdNOG2	
  
 
	
  
	
  
Computer	
  in	
  Bangladesh	
  	
  
Local	
  infec5on	
  rate	
  
18	
  bdNOG2	
  
Top	
  10	
  Local	
  infec5on	
  country	
  list	
  
19	
  bdNOG2	
  
World	
  top	
  	
  10	
  Infected	
  country	
  
20	
  bdNOG2	
  
Internet	
  user	
  	
  Vulnerabili5es	
  
21	
  bdNOG2	
  
Computer	
  Security	
  Vulnerabili5es	
  
•  Very	
  High	
  rate	
  of	
  local	
  pc	
  infecDon	
  
•  Huge	
  number	
  of	
  user	
  are	
  not	
  aware	
  about	
  cyber	
  
security	
  
•  large	
  	
  shared	
  broadband	
  network	
  
•  Huge	
  Pirated	
  sobware	
  user	
  
•  Very	
  few	
  user	
  used	
  anDvirus	
  	
  
•  Large	
  number	
  of	
  free	
  sobware	
  or	
  apps	
  are	
  used	
  
•  Large	
  NATed	
  	
  IP	
  network	
  
•  Weak	
  password	
  pracDce	
  
•  Huge	
  peer-­‐to-­‐peer	
  network	
  user	
  
22	
  bdNOG2	
  
Computer	
  Security	
  Threat	
  
•  Virus	
  
•  Spyware	
  
•  Adware	
  
•  Malware	
  
•  Phishing	
  
•  Trojan	
  
•  Web	
  hijacking	
  
•  Hacking	
  
•  Keylogger	
  	
  
	
  
23	
  bdNOG2	
  
How	
  to	
  Mi5gate	
  
•  Properly	
  configure	
  and	
  patch	
  opera5ng	
  systems,	
  browsers,	
  
and	
  other	
  soUware	
  .	
  
•  Use	
  and	
  regularly	
  update	
  of	
  firewalls,	
  an5-­‐virus,	
  and	
  an5-­‐
spyware	
  .	
  
•  Use	
  of	
  strong	
  passwords	
  and	
  never	
  share	
  passwords.	
  
•  Think	
  before	
  you	
  click.	
  	
  
•  Do	
  not	
  open	
  email	
  or	
  related	
  aIachments	
  from	
  un-­‐trusted	
  
sources.	
  
•  Protect	
  access	
  creden5als	
  from	
  outsider.	
  
•  Follow	
  your	
  organiza5on's	
  cyber	
  security	
  policies,	
  and	
  report	
  
viola5on	
  issues	
  when	
  they	
  occur	
  to	
  concern	
  authority	
  .	
  
24	
  bdNOG2	
  
Thank	
  You	
  
25	
  bdNOG2	
  

Mais conteúdo relacionado

Mais procurados (20)

Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber crime-in-bangladesh
Cyber crime-in-bangladesh Cyber crime-in-bangladesh
Cyber crime-in-bangladesh
 
Cyber law
Cyber lawCyber law
Cyber law
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in Bangladesh
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Cyber law nepal
Cyber law nepalCyber law nepal
Cyber law nepal
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 

Destaque

Africa telecom market report, 2010 2011
Africa telecom market report, 2010 2011Africa telecom market report, 2010 2011
Africa telecom market report, 2010 2011ResearchInChina
 
Children of the internet
Children of the internetChildren of the internet
Children of the internetTeam Pramkaew
 
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Fakrul Alam
 
Design and Development of Internet System for Residential Smart-Grid
Design and Development of Internet System for Residential  Smart-Grid Design and Development of Internet System for Residential  Smart-Grid
Design and Development of Internet System for Residential Smart-Grid Ateeq Ur Rehman
 
Internet for Development
Internet for DevelopmentInternet for Development
Internet for DevelopmentRoberto Polillo
 
Optical Fiber Communication & Bangladesh
Optical Fiber Communication & BangladeshOptical Fiber Communication & Bangladesh
Optical Fiber Communication & BangladeshMd. Atiqur Rahman
 
Introduction to Development for the Internet
Introduction to Development for the InternetIntroduction to Development for the Internet
Introduction to Development for the InternetMike Crabb
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 

Destaque (19)

ISP status in Bangladesh 2016
ISP status in Bangladesh 2016ISP status in Bangladesh 2016
ISP status in Bangladesh 2016
 
Africa telecom market report, 2010 2011
Africa telecom market report, 2010 2011Africa telecom market report, 2010 2011
Africa telecom market report, 2010 2011
 
Children of the internet
Children of the internetChildren of the internet
Children of the internet
 
Awareness of Children Internet Addiction
Awareness of Children Internet Addiction Awareness of Children Internet Addiction
Awareness of Children Internet Addiction
 
History and Evolution of Bangladesh Internet
History and Evolution of Bangladesh Internet History and Evolution of Bangladesh Internet
History and Evolution of Bangladesh Internet
 
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
 
Internet Development Experiences and Lessons
Internet Development Experiences and Lessons Internet Development Experiences and Lessons
Internet Development Experiences and Lessons
 
Design and Development of Internet System for Residential Smart-Grid
Design and Development of Internet System for Residential  Smart-Grid Design and Development of Internet System for Residential  Smart-Grid
Design and Development of Internet System for Residential Smart-Grid
 
Internet for Development
Internet for DevelopmentInternet for Development
Internet for Development
 
IP Transit : Simple Math - Simple Calculation
IP Transit : Simple Math - Simple CalculationIP Transit : Simple Math - Simple Calculation
IP Transit : Simple Math - Simple Calculation
 
India :Telecommunication Sector Report_August 2013
India :Telecommunication Sector Report_August 2013India :Telecommunication Sector Report_August 2013
India :Telecommunication Sector Report_August 2013
 
Fast Convergence Techniques
Fast Convergence TechniquesFast Convergence Techniques
Fast Convergence Techniques
 
Optical Fiber Communication & Bangladesh
Optical Fiber Communication & BangladeshOptical Fiber Communication & Bangladesh
Optical Fiber Communication & Bangladesh
 
Broadband for Digital Bangladesh & recommendation from ISPAB
Broadband for Digital Bangladesh & recommendation from ISPABBroadband for Digital Bangladesh & recommendation from ISPAB
Broadband for Digital Bangladesh & recommendation from ISPAB
 
Introduction to Development for the Internet
Introduction to Development for the InternetIntroduction to Development for the Internet
Introduction to Development for the Internet
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Semelhante a Cyber security Awareness: In perspective of Bangladesh

Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five yearsSABBY GILL
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthDababrata Mondal
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
Transparent Smartphone Spying
Transparent Smartphone SpyingTransparent Smartphone Spying
Transparent Smartphone SpyingGeorgia Weidman
 
TOP 10 INTERNET SAFETY RULES AND WHAT NOT.pptx
TOP 10 INTERNET SAFETY RULES AND WHAT NOT.pptxTOP 10 INTERNET SAFETY RULES AND WHAT NOT.pptx
TOP 10 INTERNET SAFETY RULES AND WHAT NOT.pptxRoNTertainmentTV
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017chauhananand17
 
Information security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh GhodelaInformation security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh GhodelaChandan Singh Ghodela
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!Asma Hossain
 
The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityAVG Technologies AU
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxShubhamGupta833557
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed Great Bay Software
 
Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion Ernest Staats
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 
What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceCengage Learning
 

Semelhante a Cyber security Awareness: In perspective of Bangladesh (20)

Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on Youth
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber security
Cyber security        Cyber security
Cyber security
 
Transparent Smartphone Spying
Transparent Smartphone SpyingTransparent Smartphone Spying
Transparent Smartphone Spying
 
TOP 10 INTERNET SAFETY RULES AND WHAT NOT.pptx
TOP 10 INTERNET SAFETY RULES AND WHAT NOT.pptxTOP 10 INTERNET SAFETY RULES AND WHAT NOT.pptx
TOP 10 INTERNET SAFETY RULES AND WHAT NOT.pptx
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
 
Information security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh GhodelaInformation security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh Ghodela
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our Community
 
News Bytes - December 2015
News Bytes - December 2015News Bytes - December 2015
News Bytes - December 2015
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing Conference
 

Mais de Bangladesh Network Operators Group

Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and CephAccelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and CephBangladesh Network Operators Group
 
Contents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User ExperienceContents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User ExperienceBangladesh Network Operators Group
 
Re-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with GrafanaRe-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with GrafanaBangladesh Network Operators Group
 

Mais de Bangladesh Network Operators Group (20)

Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and CephAccelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
 
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJRecent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
 
Fact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in BangladeshFact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in Bangladesh
 
AI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the PyramidAI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the Pyramid
 
IPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCTIPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCT
 
Network eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life ProductNetwork eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life Product
 
A plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s DeploymentA plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s Deployment
 
IPv6 Deployment in South Asia 2022
IPv6 Deployment in South Asia  2022IPv6 Deployment in South Asia  2022
IPv6 Deployment in South Asia 2022
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
 
An Overview about open UDP Services
An Overview about open UDP ServicesAn Overview about open UDP Services
An Overview about open UDP Services
 
12 Years in DNS Security As a Defender
12 Years in DNS Security As a Defender12 Years in DNS Security As a Defender
12 Years in DNS Security As a Defender
 
Contents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User ExperienceContents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User Experience
 
BdNOG-20220625-MT-v6.0.pptx
BdNOG-20220625-MT-v6.0.pptxBdNOG-20220625-MT-v6.0.pptx
BdNOG-20220625-MT-v6.0.pptx
 
Route Leak Prevension with BGP Community
Route Leak Prevension with BGP CommunityRoute Leak Prevension with BGP Community
Route Leak Prevension with BGP Community
 
Tale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIXTale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIX
 
MANRS for Network Operators
MANRS for Network OperatorsMANRS for Network Operators
MANRS for Network Operators
 
Re-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with GrafanaRe-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with Grafana
 
RPKI ROA updates
RPKI ROA updatesRPKI ROA updates
RPKI ROA updates
 
Blockchain Demystified
Blockchain DemystifiedBlockchain Demystified
Blockchain Demystified
 

Último

Google-Next-Madrid-BBVA-Research inv.pdf
Google-Next-Madrid-BBVA-Research inv.pdfGoogle-Next-Madrid-BBVA-Research inv.pdf
Google-Next-Madrid-BBVA-Research inv.pdfMaria Adalfio
 
overview of Virtualization, concept of Virtualization
overview of Virtualization, concept of Virtualizationoverview of Virtualization, concept of Virtualization
overview of Virtualization, concept of VirtualizationRajan yadav
 
如何办理朴茨茅斯大学毕业证书学位证书成绩单?
如何办理朴茨茅斯大学毕业证书学位证书成绩单?如何办理朴茨茅斯大学毕业证书学位证书成绩单?
如何办理朴茨茅斯大学毕业证书学位证书成绩单?krc0yvm5
 
Generalities about NFT , as a new technology
Generalities about NFT , as a new technologyGeneralities about NFT , as a new technology
Generalities about NFT , as a new technologysoufianbouktaib1
 
Benefits of Fiber Internet vs. Traditional Internet.pptx
Benefits of Fiber Internet vs. Traditional Internet.pptxBenefits of Fiber Internet vs. Traditional Internet.pptx
Benefits of Fiber Internet vs. Traditional Internet.pptxlibertyuae uae
 
Tungsten Webinar: v6 & v7 Release Recap, and Beyond
Tungsten Webinar: v6 & v7 Release Recap, and BeyondTungsten Webinar: v6 & v7 Release Recap, and Beyond
Tungsten Webinar: v6 & v7 Release Recap, and BeyondContinuent
 
Mary Meeker Internet Trends Report for 2019
Mary Meeker Internet Trends Report for 2019Mary Meeker Internet Trends Report for 2019
Mary Meeker Internet Trends Report for 2019Eric Johnson
 
SQL Server on Azure VM datasheet.dsadaspptx
SQL Server on Azure VM datasheet.dsadaspptxSQL Server on Azure VM datasheet.dsadaspptx
SQL Server on Azure VM datasheet.dsadaspptxJustineGarcia32
 
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...hasimatwork
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 

Último (10)

Google-Next-Madrid-BBVA-Research inv.pdf
Google-Next-Madrid-BBVA-Research inv.pdfGoogle-Next-Madrid-BBVA-Research inv.pdf
Google-Next-Madrid-BBVA-Research inv.pdf
 
overview of Virtualization, concept of Virtualization
overview of Virtualization, concept of Virtualizationoverview of Virtualization, concept of Virtualization
overview of Virtualization, concept of Virtualization
 
如何办理朴茨茅斯大学毕业证书学位证书成绩单?
如何办理朴茨茅斯大学毕业证书学位证书成绩单?如何办理朴茨茅斯大学毕业证书学位证书成绩单?
如何办理朴茨茅斯大学毕业证书学位证书成绩单?
 
Generalities about NFT , as a new technology
Generalities about NFT , as a new technologyGeneralities about NFT , as a new technology
Generalities about NFT , as a new technology
 
Benefits of Fiber Internet vs. Traditional Internet.pptx
Benefits of Fiber Internet vs. Traditional Internet.pptxBenefits of Fiber Internet vs. Traditional Internet.pptx
Benefits of Fiber Internet vs. Traditional Internet.pptx
 
Tungsten Webinar: v6 & v7 Release Recap, and Beyond
Tungsten Webinar: v6 & v7 Release Recap, and BeyondTungsten Webinar: v6 & v7 Release Recap, and Beyond
Tungsten Webinar: v6 & v7 Release Recap, and Beyond
 
Mary Meeker Internet Trends Report for 2019
Mary Meeker Internet Trends Report for 2019Mary Meeker Internet Trends Report for 2019
Mary Meeker Internet Trends Report for 2019
 
SQL Server on Azure VM datasheet.dsadaspptx
SQL Server on Azure VM datasheet.dsadaspptxSQL Server on Azure VM datasheet.dsadaspptx
SQL Server on Azure VM datasheet.dsadaspptx
 
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 

Cyber security Awareness: In perspective of Bangladesh

  • 1. Cyber  Security  Awareness:  In   Perspec5ve  of  Bangladesh   By-­‐   Md.  Shaqul  Hasan     Hasan[at]aitlbd[dot]com  
  • 2. Internet  in  Bangladesh   •  More  then  40  millions  internet  user   •  Using  70Gbps+  of  internet  traffic   •  Internet  user  growth  rate  is  very  high   •  Broadband  penetraDon  is  increasing   •  But  maximum  user  has  no  idea  about  Cyber   Security  System.   2  bdNOG2  
  • 3.       REAL  TIME  CYBER  ATTACK    STATISTICS  
  • 4. Presence  of  Bangladesh  in  global   cyber  aIack  map   4  bdNOG2  
  • 5. Presence  of  Bangladesh  in  global   cyber  aIack  map   5  bdNOG2  
  • 6. Presence  of  Bangladesh  in  global   cyber  aIack  map   6  bdNOG2  
  • 7. Presence  of  Bangladesh  in  global   cyber  aIack  map   7  bdNOG2  
  • 8. Cyber  Crime  In  Bangladesh   •  By  Social  Media   •  By  Mobile  Phone   •  By  Computer  
  • 9.                    Social  Media  In  Bangladesh  
  • 10. Social  media  security  vulnerabili5es:     •  Social  media  site  facebook  is  no  1  browsed  web  by  country’s   internet  user   •  Most  user  are  not  concern  about  security   •  Maximum  social  media  user  are  teenager   •  Social  media  Users  are  more  focused  on  “  More  friends,  more   popular”   •  Social  media  enables  the  spread  of  unreliable  and  false   informaDon.   •  Some  internet  users  are  using  internet  only  for  staying  in  social   media.   •  InteracDon  with  strangers  in  social  media  is  very  high…!!!     10  bdNOG2  
  • 11. Social  media  security  threats:     •  Profile  visitor  plug-­‐in   •  Dislike  buWon     •  hacking   •  Trojans   •  Malicious  web   •  Clickjacking   11  bdNOG2  
  • 12. Social  media  risk  mi5ga5on:     •  Use  two-­‐factor  authen5ca5on  whenever  possible   •  Do  not  add  strangers  to  your  friends  list     •  Always  check  the  URL  of  a  page  status  before   opening  it   •  avoid  unnecessary  applica5ons  of  social  media   •  Keep  your  browser  up  to  date  because  an  out-­‐dated   browser  is  good  vic5m   •  Awareness  &  training  for  new  user.     12  bdNOG2  
  • 13.       Mobile  Phone  in  Bangladesh  
  • 14. Mobile  Phone  Security  Vulnerabili5es   •  Mobile  Money  transfer  increasing  day  by  day   •  Online  banking  is  Popular     •  Rapid  growing  Social  media  user  via  mobile   •  Smartphone  user  growing  rapidly   •  But  they  are  in  dark  about  cyber  security   14  bdNOG2  
  • 15. Phone  Security  Threats   •  Missed  call  or  call  from  unknown  number   •  Sms/call  from  special  number   •  Voice  phishing  or  vishing   •  Common  operaDng  systems   •  Apps  without  security  check   •  LoWery  winner  scam   15  bdNOG2  
  • 16. Phone  threat  mi5ga5on   •  When  choosing  a  mobile  phone    consider  its  security   features.   •  Maintain  physical  control  of  the  device,  especially  in   public  or  semi-­‐public  places.     •  Disable  interfaces  that  are  not  currently  in  use,  such   as  Bluetooth,  infrared,  or    Wifi  .   •  Do  not  follow  links  sent  in  suspicious    email  or  text   messages  or  suspicious  call.   •  Limit  exposure  of  your    mobile    phone  number   •  Be  choosy  when  selecDng  and  installing  new  apps.   16  bdNOG2  
  • 17.       Computer  in  Bangladesh    
  • 18. Local  infec5on  rate   18  bdNOG2  
  • 19. Top  10  Local  infec5on  country  list   19  bdNOG2  
  • 20. World  top    10  Infected  country   20  bdNOG2  
  • 21. Internet  user    Vulnerabili5es   21  bdNOG2  
  • 22. Computer  Security  Vulnerabili5es   •  Very  High  rate  of  local  pc  infecDon   •  Huge  number  of  user  are  not  aware  about  cyber   security   •  large    shared  broadband  network   •  Huge  Pirated  sobware  user   •  Very  few  user  used  anDvirus     •  Large  number  of  free  sobware  or  apps  are  used   •  Large  NATed    IP  network   •  Weak  password  pracDce   •  Huge  peer-­‐to-­‐peer  network  user   22  bdNOG2  
  • 23. Computer  Security  Threat   •  Virus   •  Spyware   •  Adware   •  Malware   •  Phishing   •  Trojan   •  Web  hijacking   •  Hacking   •  Keylogger       23  bdNOG2  
  • 24. How  to  Mi5gate   •  Properly  configure  and  patch  opera5ng  systems,  browsers,   and  other  soUware  .   •  Use  and  regularly  update  of  firewalls,  an5-­‐virus,  and  an5-­‐ spyware  .   •  Use  of  strong  passwords  and  never  share  passwords.   •  Think  before  you  click.     •  Do  not  open  email  or  related  aIachments  from  un-­‐trusted   sources.   •  Protect  access  creden5als  from  outsider.   •  Follow  your  organiza5on's  cyber  security  policies,  and  report   viola5on  issues  when  they  occur  to  concern  authority  .   24  bdNOG2  
  • 25. Thank  You   25  bdNOG2