DhakaCom Bangladesh Cyber Security Status Global Perspective Mohammad Fakrul Alam dhakaCom Limited fakrul [at] dhakacom [dot] com

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

Steps towards E-Government in Syria
ETHICAL HACKING.
Jinhyun CHO Senior Researcher Korea Internet and Security Agency.
Breaking Trust On The Internet
Cyber crime: a new challenge for law enforcers!
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
1 Telstra in Confidence Managing Security for our Mobile Technology.
INFORMATION SOCIETY DEVELOPMENT IN THE REPUBLIC OF BULGARIA “Information Society perspectives in South-Eastern Europe” Thessaloniki, 29 & 30 June 2001.
Copyright Security-Assessment.com 2005 From The Trenches (Australia) What We Are Seeing Within Security Today by Peter Benson.
(Geneva, Switzerland, September 2014)
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
1 Kuwait Central Agency for information technology.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
GOVERNMENT OF UGANDA PLANS FOR INFORMATION SECURITY ASSURANCE PETER KAHIIGI, CISSP®. DIRECTOR INFORMATION SECURITY 30th JANUARY 2013 Directorate of Information.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Norman SecureSurf Protect your users when surfing the Internet.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Securing Information Systems
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Cyber Security Nevada Businesses Overview June, 2014.
Mobile Banking By: Chenyu Gong, Jalal Hafidi, Harika Malineni.
INFORMATION SECURITY GOVERNANCE READINESS IN GOVERNMENT INSTITUTION
1 Commonwealth Security Information Resource Center Michael Watson Security Incident Management Director 10/17/2008
Ali Alhamdan, PhD National Information Center Ministry of Interior
Freedom of Expression in the Information Society : Some Current Issues & Development Dr. A.K. Chakravarti * Adviser Department of Information Technology.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
Training on “Albanian and Italian experience in investigation and prosecution of Cybercrime” General Prosecutor Office, Tirana 10 June 2014 VQA Ivano GABRIELLI.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
IT Security in Nepal: Issues and challenges Rajan R. Pant ITSERT-NP.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Chapter 11 Implementing Social Commerce Systems. Learning Objectives 1.Describe the major issues in the social commerce implementation landscape. 2.Discuss.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
The Federal eGovernment of the United Arab Emirates the United Arab Emirates(20/06/2012) 1.
Presented by Solomon Ingba David Afoenyi Afure Iloka Niteabai Domininc.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
Securing Information Systems
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Cyber Security Zafar Sadik
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
Cybersecurity - What’s Next? June 2017
SECURITY STANDARDS AND CYBER LAWS
Amity School of Business BBA, Semester - II E - Commerce Arpan Sinha
A Project on CYBER SECURITY
What is the CYBERSECURITY plan for tomorrow?
Challenges We Face On the Internet
Chapter 5 Electronic Commerce | Security
Presented by Security Management Partners Waltham, MA
The Cyber Threats Landscape
Chapter 5 Electronic Commerce | Security
Federal Reserve Retail Payments Risk Forum
Challenges and Successes in the Zambian ICT Security Sector
Ðì SA Effective Monitoring and Evaluation of Progress on the SDGs Monitoring SDGs : the perspective of Armstat Learning Conference: Implementing.
Module 4 System and Application Security
Environment for Electronic Commerce (Vietnam)
Digital Empowerment of Women in KP
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

dhakaCom Bangladesh Cyber Security Status Global Perspective Mohammad Fakrul Alam dhakaCom Limited fakrul [at] dhakacom [dot] com

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 2 Agenda  Global Cyber Security Statistics  Bangladesh Cyber Security Incidents [few cases]  Bangladesh Information Technology and Cyber Security Status

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 3 Cyber Attack Definitions Cyber-warfare is the use of computers and the Internet in conducting warfare in cyberspace. Computer to computer attack that undermines the confidentiality, integrity or availability of a computer or information resident on it.

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 4 Global Cyber Security Statistics

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 5 Global Security Statistics SPAM 52.7%52.9%38.7% ANNUAL SPAM TOTALS 2009 [source : Trustwave Global Security Report 2012]

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 6 Global Security Statistics DDoS: Largest Bandwidth Attacks Reported [source : Worldwide Infrastructure Security Report 2011, Volume VII, Arbor Networks, Inc] Gbps

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 7 Global Security Statistics Application-Layer DDoS Attacks [source : Worldwide Infrastructure Security Report 2011, Volume VII, Arbor Networks, Inc] Application-Layer DDoS Attack Methodologies.. HTTP GET and HTTP POST were the most common application- layer DDoS attack vectors, more sophisticated mechanisms such as Slowloris, LOIC, Apache Killer, SIP call-control floods, SlowPost and HOIC are increasingly prevalent.

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 8 Global Security Statistics Distribution of Attack Techniques [source :

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 9 Social Media Twitter / Facebook

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 10 Bangladesh Cyber Security Incidents [few cases]

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 11 Bangladesh Cyber Security Incidents Data reported from 1 st June, 2012 to 30 th November, 2012 Data received from different sensors across the globe individual incident, Unique IP

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 12 Hacker Groups  Different hacker group emerge.  Bangladesh Cyber Army & Bangladesh Black Hat Hackers are most active one.  Claims that they have collaboration with other underground hacking group.  Hacktivism takes center stage.

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 13 Use of Social Media  Facebook, Twitter and other social media were used to organize the attack.

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 14 Site Defacement  Site hacked by hacker group named Indishell.  Government sites were targeted.

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 15 Site Defacement  Site defacement using known techniques like SQL Injection, Metasploit and CMS vulnerability.  64 district web-portals inaugurated on 06 January 2010 while the hackers invaded 19 of them by 21 March/2010.

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 16 DDoS Attack  DDoS attack on several financial institutions websites.  Reported application layer (HTTP GET Flood) on online newspaper portal. Attack stays for 72 hours with roughly 5 million packets per second.

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 17 Phishing Attack

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 18 Information Leakage  Information data leakage in PASTEBIN

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 19 Bangladesh Information Technology and Cyber Security Status

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 20 Digital Bangladesh  The government published it’s “Vision 2021” which targets the establishment of a resourceful and modern country by 2012 through effective use of information and communication technology called “Digital Bangladesh”.  e-Government framework.  Bangladesh Government web portal ( provides information on the most popular citizen services by the Government of Bangladesh.

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 21 Digital Bangladesh  Bangladesh Bank is introducing in stages services like e- banking, e-commerce, e-recruitment, e-tendering, mobile banking and automated clearing house service.  Online payment gateways are coming up and credit/debit cards are allowed for transaction.  Approximately 0.8 million mobile banking users.  Within 2020 it will be around 50 million which will be 47% of adult nationality.

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 22 Related ACTs  Pornography Regulation Act, 2012  Information & Communication Technology Act, 2006  Bangladesh Telecommunication Regulation Act, 2001

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 23 Legal Action  Some identified Cyber Crimes covered by ICT ACT 2006: -Hacking or unauthorized entry into information systems -Publishing or distribution of obscene content in electronic form -Tampering with electronic documents required to be kept under the law -Frauds using electronic documents -Violation of Copyright, Trademark or Patent design -Holdings out threats through  5 years imprisonment and a fine of up to $0.6 million for offenders for the first conviction.  Could be extended to 10 years imprisonment and $1.2 million as fine for each subsequent offence of the same nature.

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 24 Findings  Sites running on CMS are not fully patched and inherently carrying bugs which is quite easy for the hacker to penetrate.  Tools are available in the internet.  Lack of proactive monitoring and enforcement of standards.  Lack of awareness and most of the incidents were unpublished, unregistered and un-investigated.  There is no defined cyber security strategy in place to manage and mitigate cyber security incidents in case of a coordinated cyber attack on the Critical National Information Infrastructure (CNII).  There is no comprehensive cyber security law enacted or adopted yet. ICT related crimes are usually treated under the existing penal code.  Very few locally produced cyber security experts.

Bangladesh Cyber Security Status: Global Perspective dhakaCom Page 25 “To expect the world to treat you fairly, because you’re a good person, is somewhat like asking a bull not to attack you, because you’re a vegetarian !” - Quote from the Reader’s Digest