際際滷

際際滷Share a Scribd company logo
Security Concerns: A perspective in
Smart Bangladesh
Md. Najmul Islam BPM
Police Super
(Additional Deputy Police Commissioner)
Cyber Crime Investigation Division
Counter Terrorism and Transnational Crime Unit
Dhaka Metropolitan Police
 1st
and 2nd
IR in Europe and 3rd
is in USA and west.
 Steam Engine in 1784, Electricity in 1870, Computer in 1943
and Internet in 1969, which were the factors of the past three
IR.
 IR 4.0 leaded by ASIA, mentioned in WEF in Davos in 2012. BD
has a great potential in IR 4.0 based on Digital Technology.
 Main Trait: IOT, Quantum Computing, Virtual reality, 3D
Printing, Artificial Intelligence (ML)
 BD can be mid income country in 2024 and developed country
in 2041 by IR 4.0 and grab 200 billion dollars business on IT
and ITS.
Society 4.0(IR4.0)
 12 Dec, 2008 Digital Bangladesh phenomenon
was developed.
 After almost a decade we are on board in achieving
a SMART BANGLADESH.
 Key Pillars: Smart Citizen, Smart Government, Smart
Society, and Smart Economy.
 IR4.0 has a close connection to SMART
BANGLADESH
SMART BANGLADESH a transition
 Internet has offered us a much more convenient way to
share information across time and place.
 Cyberspace also opened a new venue for criminal
activities.
 Cyber attacks
 Distribution of illegal materials in cyberspace
 Computer-mediated illegal communications within big crime
groups or terrorists
 Cyber threats has become one of the major security
issues for the law enforcement community.
Introduction
People are into virtual life
means criminals are in virtual life
In Bangladesh-
 A new Facebook user is being added in every 10 seconds.
 Nearly 70 millions people use Facebook.
 This rate is higher than the current birth rate of the country.
 We have been connected over fiber optic cables across the country.
 We are now using 4G and going to be on 5G soon.
 Data users : 120 millions and 160 Mllions Mobile Subscribers.
 Facebook, Google/Youtube got their cache server in Bangladeh.
These are the parameters which indicates the development of ICT in Bangladesh and
development of criminal use of internet
Cybercrimes and Cyber Threats
 Cybercrime Definition:
 Illegal computer-mediated activities that can be
conducted through global electronic networks. [Thomas,
2000]
 Cyber crime is an evil having its origin in the growing
dependence on computer in modern life.
 A simple definition of cyber crime would be unlawful
acts wherein the computer is either a tool or a target or
both.
Cybercrime and Cyber Threats
 What Is a Cyber Threat?
 the possibility of a malicious attempt to damage or
disrupt a computer network or system which
eventually attempts to access files and infiltrate or
steal data.
 A cyber threat is deemed any malicious act that
attempts to gain access to a computer network
without authorization or permission from the
owners.
 Cyber Threat is itself a subset of cyber crime
Global Cyber Threats
 Advanced Persistent Threats (stuxnet in Iran Nuclear Site)
 Phishing Trojans (misguiding users and stealing credentials)
 Botnets (Robotics used for repeated attacks or spreading malicious
things)
 Ransomware (WannaCry, Petya)
 Distributed Denial of Service (DDoS)
 Intellectual Property Theft
 Theft of Money (Online Bank forgery/ ATM forgery)
 Data Manipulation (Integrity lose)
 Data Destruction
 Spyware/Malware (Used by LEA)
 And importantly the dark web and blockchain
Sources of Cyber Threats
 Nation states or national governments
 Terrorists (ISIS/Al Quayeda)
 Industrial spies
 Organized crime groups
 Hacktivists and hackers
 Business competitors
Some Trendy Security Concerns
DNS Poisoning
DDOS Attack
SSL/TLS
Use of IP6.0
DNS Poisoning:
 Definition of DNS Poisoning
 Illustration: Poisoning the DNS Cache
DNS Security Measures:
DNSSEC Overview
Benefits of DNS Security
DDoS Attack:
 Definition of Distributed Denial of Service
 Impact on Network Availability
DDoS Mitigation Strategies:
 Traffic Filtering and Rate Limiting
 Utilizing Content Delivery Networks (CDNs)
DDoS Mitigation Strategies for ISPs
 Deploy traffic scrubbing centers: Establish
dedicated facilities to analyze and filter
malicious traffic before it reaches the ISP's
infrastructure.
 Ensure ample bandwidth: Over-provision
bandwidth capacity to absorb and mitigate
volumetric DDoS attacks without affecting
service quality.
 Implement BGP route filtering: Use Border
Gateway Protocol (BGP) to filter out malicious
traffic and prevent it from propagating across
the ISP's network.
 Invest in real-time traffic analysis: Utilize
advanced traffic analysis tools to quickly
identify and mitigate DDoS attacks as they
occur.
TLS (Transport Layer Security):
 Introduction to TLS
 Importance in Securing
Communication
How TLS Works:
Handshake Process
Encryption of Data in Transit
TLS Certificates:
 Explanation of SSL/TLS Certificates
 Role in Verifying Website Authenticity
IPv6 Introduction:
 Overview of IPv6
 Addressing the Limitations of IPv4
Benefits of IPv6:
Address Space Expansion
Improved Security Features
IPv6 Security Benefits
 IPv6 mandates the implementation of IPsec, providing a standardized
and integral approach to network layer security
 IPv6 includes a feature called Neighbor Discovery Protocol (NDP) that
helps prevent common attacks like ARP (Address Resolution Protocol)
spoofing by introducing techniques such as Cryptographically
 The vast address space of IPv6 makes it more challenging for attackers
to conduct successful network scans and reconnaissance, enhancing
network security
Comprehensive Network Security:
 Integration of DNS Security, TLS, DDoS Mitigation, and IPv6
 Strengthening Overall Network Defense
Incident Response Plan:
 Developing and Implementing an Effective Plan
 Importance of Timely Responses
Continuous Improvement:
 Regular Security Audits and Assessments
 Adapting to Evolving Threat Landscapes
Cryptography for ISPs
 Secure Data Transmission: Implement SSL/TLS protocols for encrypting
data in transit. This ensures that sensitive information, such as login
credentials and customer data, is securely transmitted between users
and servers.
 Virtual Private Network (VPN): Offer VPN services for both internal
communications and for customers. VPNs use encryption to create
secure communication channels, especially important for remote
workers or users accessing sensitive data.
 DNS Security Extensions (DNSSEC): Implement DNSSEC to protect
against DNS spoofing and ensure the authenticity of domain name
information, preventing attacks like cache poisoning.
Incident Response Planning for ISPs
 Formation of IRT: Establish a dedicated
incident response team with clearly defined
roles and responsibilities.
 Monitoring Systems: Implement continuous
monitoring of network and system activities
to detect potential incidents in real-time.
 Internal and External Communication: Define
communication channels for incident
reporting, both within the organization and
with external stakeholders. Like (LEA, E-Gov
CIRT, Overseas Organizations)
Common Cyber Threats in Bangladesh
amount to Cyber Crime
 Facebook, email account hack and website hack by web phishing or by other
means (back door, penetration, sql injection etc)
 Online Financial Frauds (Fake and false email -Nigerian Scam), E-business etc
 Sharing false propaganda, information and obscene pictures or video by fake
accounts in social media and fake news portal
 ATM, POS(Point of Sale) and others online banking frauds (Central Bank
Reserve Hack)
 Mobile Banking frauds (BKASH, ROCKET, MCASH)
 Pornography (to harass people or deliberate production for fame)
 Crimes on chat engines like imo, viber, whatsapp
 Online terrorism propaganda over social media and blogs
 Online gambling, darkweb and Cryptocurrency (bitcoin)
BDNOG17 Plenary Session, Security Concerns: A perspective in Smart Bangladesh
What should be our role?
Dos
 Develop cyber ethics
 Use cyber space for knowledge and economic
development
 Respect Pluralism on internet
 Try to understand fake news and propaganda with hate
speech
 Build strong connectivity amongst the alike people to
counter extremism over internet
 Make counter narratives against rumor and hate speech
What should be our role?
Donts
 Dont harass people specially women.
 Avoid the page and groups of radicalism
 Dont post over internet or social media
anything that supports extremism and violates
existing laws of the land like Pornography
control Act, Cyber Security Act and ATI ACT.
 Dont spread obscene contents and false info
 Dont forget to report to police
Challenges of Cybercrime and Cyber Threat
Investigation
Challenges of Cyber Threat Investigation
 Lake of proper awareness about Cyber Crime and
threats.
 Complexities in Legal Framework
 Non cooperation with the giant like Google, Facebook,
Twitter
 Local internet infrastructure (Log Server/Nating/IP6.0)
 Investigating officials, prosecutors and judges are not
well trained
 Low numbers of expert people are working on it
Face the challenges
 Establishing cyber police station and cyber tribunal in
each district.
 Local Internet infrastructure like IIG, ISP, Mobile
operators should comply the call of LEAs.
 Google, facebook, twitter should make direct
cooperation with LEA.
 Strengthening the LEA with training and resources.
Move Forward.
Developing International Cooperation and collaboration
Exchange program like training and technology
Holding international symposium and seminars
Making common platform to fight cyber threats.
Working with the corporate giants like facebook, google, twitter
etc.
Reducing digital divide and transportation of technologies
Legislations
 Cyber Security Act -2018
 Pornography Control Act-2012
 Telecommunication Control Act-2001
 ICT Act-2006
 Anti Terrorism Act-2009
 Mutual Legal Assistance in Criminal Matters Act, 2012(section
28-30 digital evidence and 31-request by Central Authority)
Regular review of the laws to accommodate the changing
pattern of cyber crimes
Bangladesh Police in Cyber Arena
 Police Headquarters
 DMP-Cyber Crime Investigation Division
 DMP- DB Cyber
 CID-Cyber Police Bureau
 PBI-Cyber Unit
 RMP-Cyber Unit
 CMP-Cyber
 Two State of the art forensic labs
 Two modern cyber training centers
Where to report instantly
 Call Hotline 999/01320046494/01320046221-22
 AC-CT Cyber: 01320046480/01320046479
 AC-DB Cyber: 01320046236
 CID-Cyber Police Bureau(Additional SP-CID Cyber)-01320010131
 PHQ - Police Cyber Support for Women: 01320-000888
 RMP- AC Cyber- 01320061983
 Mail to :
 cyberhelp@dmp.gov.bd
 cyber.db@dmp.gov.bd
 cyber@police.gov.bd
 cybersupport.women@police.gov.bd
 And I am available over : 01320046472 , cyberunit@dmp.gov.bd
Where to report through fb page
 Be connected with these pages/ID.
 facebook.com/cyberctdmp
 facebook.com/cybercrimedb
 facebook.com/ cpccidbdpolice
 facebook.com/ PCSW.PHQ
 facebook.com/najmulsumon (My Profile)
?????

More Related Content

BDNOG17 Plenary Session, Security Concerns: A perspective in Smart Bangladesh

  • 1. Security Concerns: A perspective in Smart Bangladesh Md. Najmul Islam BPM Police Super (Additional Deputy Police Commissioner) Cyber Crime Investigation Division Counter Terrorism and Transnational Crime Unit Dhaka Metropolitan Police
  • 2. 1st and 2nd IR in Europe and 3rd is in USA and west. Steam Engine in 1784, Electricity in 1870, Computer in 1943 and Internet in 1969, which were the factors of the past three IR. IR 4.0 leaded by ASIA, mentioned in WEF in Davos in 2012. BD has a great potential in IR 4.0 based on Digital Technology. Main Trait: IOT, Quantum Computing, Virtual reality, 3D Printing, Artificial Intelligence (ML) BD can be mid income country in 2024 and developed country in 2041 by IR 4.0 and grab 200 billion dollars business on IT and ITS. Society 4.0(IR4.0)
  • 3. 12 Dec, 2008 Digital Bangladesh phenomenon was developed. After almost a decade we are on board in achieving a SMART BANGLADESH. Key Pillars: Smart Citizen, Smart Government, Smart Society, and Smart Economy. IR4.0 has a close connection to SMART BANGLADESH SMART BANGLADESH a transition
  • 4. Internet has offered us a much more convenient way to share information across time and place. Cyberspace also opened a new venue for criminal activities. Cyber attacks Distribution of illegal materials in cyberspace Computer-mediated illegal communications within big crime groups or terrorists Cyber threats has become one of the major security issues for the law enforcement community. Introduction
  • 5. People are into virtual life means criminals are in virtual life In Bangladesh- A new Facebook user is being added in every 10 seconds. Nearly 70 millions people use Facebook. This rate is higher than the current birth rate of the country. We have been connected over fiber optic cables across the country. We are now using 4G and going to be on 5G soon. Data users : 120 millions and 160 Mllions Mobile Subscribers. Facebook, Google/Youtube got their cache server in Bangladeh. These are the parameters which indicates the development of ICT in Bangladesh and development of criminal use of internet
  • 6. Cybercrimes and Cyber Threats Cybercrime Definition: Illegal computer-mediated activities that can be conducted through global electronic networks. [Thomas, 2000] Cyber crime is an evil having its origin in the growing dependence on computer in modern life. A simple definition of cyber crime would be unlawful acts wherein the computer is either a tool or a target or both.
  • 7. Cybercrime and Cyber Threats What Is a Cyber Threat? the possibility of a malicious attempt to damage or disrupt a computer network or system which eventually attempts to access files and infiltrate or steal data. A cyber threat is deemed any malicious act that attempts to gain access to a computer network without authorization or permission from the owners. Cyber Threat is itself a subset of cyber crime
  • 8. Global Cyber Threats Advanced Persistent Threats (stuxnet in Iran Nuclear Site) Phishing Trojans (misguiding users and stealing credentials) Botnets (Robotics used for repeated attacks or spreading malicious things) Ransomware (WannaCry, Petya) Distributed Denial of Service (DDoS) Intellectual Property Theft Theft of Money (Online Bank forgery/ ATM forgery) Data Manipulation (Integrity lose) Data Destruction Spyware/Malware (Used by LEA) And importantly the dark web and blockchain
  • 9. Sources of Cyber Threats Nation states or national governments Terrorists (ISIS/Al Quayeda) Industrial spies Organized crime groups Hacktivists and hackers Business competitors
  • 10. Some Trendy Security Concerns DNS Poisoning DDOS Attack SSL/TLS Use of IP6.0
  • 11. DNS Poisoning: Definition of DNS Poisoning Illustration: Poisoning the DNS Cache
  • 12. DNS Security Measures: DNSSEC Overview Benefits of DNS Security
  • 13. DDoS Attack: Definition of Distributed Denial of Service Impact on Network Availability
  • 14. DDoS Mitigation Strategies: Traffic Filtering and Rate Limiting Utilizing Content Delivery Networks (CDNs)
  • 15. DDoS Mitigation Strategies for ISPs Deploy traffic scrubbing centers: Establish dedicated facilities to analyze and filter malicious traffic before it reaches the ISP's infrastructure. Ensure ample bandwidth: Over-provision bandwidth capacity to absorb and mitigate volumetric DDoS attacks without affecting service quality. Implement BGP route filtering: Use Border Gateway Protocol (BGP) to filter out malicious traffic and prevent it from propagating across the ISP's network. Invest in real-time traffic analysis: Utilize advanced traffic analysis tools to quickly identify and mitigate DDoS attacks as they occur.
  • 16. TLS (Transport Layer Security): Introduction to TLS Importance in Securing Communication
  • 17. How TLS Works: Handshake Process Encryption of Data in Transit
  • 18. TLS Certificates: Explanation of SSL/TLS Certificates Role in Verifying Website Authenticity
  • 19. IPv6 Introduction: Overview of IPv6 Addressing the Limitations of IPv4
  • 20. Benefits of IPv6: Address Space Expansion Improved Security Features
  • 21. IPv6 Security Benefits IPv6 mandates the implementation of IPsec, providing a standardized and integral approach to network layer security IPv6 includes a feature called Neighbor Discovery Protocol (NDP) that helps prevent common attacks like ARP (Address Resolution Protocol) spoofing by introducing techniques such as Cryptographically The vast address space of IPv6 makes it more challenging for attackers to conduct successful network scans and reconnaissance, enhancing network security
  • 22. Comprehensive Network Security: Integration of DNS Security, TLS, DDoS Mitigation, and IPv6 Strengthening Overall Network Defense
  • 23. Incident Response Plan: Developing and Implementing an Effective Plan Importance of Timely Responses
  • 24. Continuous Improvement: Regular Security Audits and Assessments Adapting to Evolving Threat Landscapes
  • 25. Cryptography for ISPs Secure Data Transmission: Implement SSL/TLS protocols for encrypting data in transit. This ensures that sensitive information, such as login credentials and customer data, is securely transmitted between users and servers. Virtual Private Network (VPN): Offer VPN services for both internal communications and for customers. VPNs use encryption to create secure communication channels, especially important for remote workers or users accessing sensitive data. DNS Security Extensions (DNSSEC): Implement DNSSEC to protect against DNS spoofing and ensure the authenticity of domain name information, preventing attacks like cache poisoning.
  • 26. Incident Response Planning for ISPs Formation of IRT: Establish a dedicated incident response team with clearly defined roles and responsibilities. Monitoring Systems: Implement continuous monitoring of network and system activities to detect potential incidents in real-time. Internal and External Communication: Define communication channels for incident reporting, both within the organization and with external stakeholders. Like (LEA, E-Gov CIRT, Overseas Organizations)
  • 27. Common Cyber Threats in Bangladesh amount to Cyber Crime Facebook, email account hack and website hack by web phishing or by other means (back door, penetration, sql injection etc) Online Financial Frauds (Fake and false email -Nigerian Scam), E-business etc Sharing false propaganda, information and obscene pictures or video by fake accounts in social media and fake news portal ATM, POS(Point of Sale) and others online banking frauds (Central Bank Reserve Hack) Mobile Banking frauds (BKASH, ROCKET, MCASH) Pornography (to harass people or deliberate production for fame) Crimes on chat engines like imo, viber, whatsapp Online terrorism propaganda over social media and blogs Online gambling, darkweb and Cryptocurrency (bitcoin)
  • 29. What should be our role? Dos Develop cyber ethics Use cyber space for knowledge and economic development Respect Pluralism on internet Try to understand fake news and propaganda with hate speech Build strong connectivity amongst the alike people to counter extremism over internet Make counter narratives against rumor and hate speech
  • 30. What should be our role? Donts Dont harass people specially women. Avoid the page and groups of radicalism Dont post over internet or social media anything that supports extremism and violates existing laws of the land like Pornography control Act, Cyber Security Act and ATI ACT. Dont spread obscene contents and false info Dont forget to report to police
  • 31. Challenges of Cybercrime and Cyber Threat Investigation
  • 32. Challenges of Cyber Threat Investigation Lake of proper awareness about Cyber Crime and threats. Complexities in Legal Framework Non cooperation with the giant like Google, Facebook, Twitter Local internet infrastructure (Log Server/Nating/IP6.0) Investigating officials, prosecutors and judges are not well trained Low numbers of expert people are working on it
  • 33. Face the challenges Establishing cyber police station and cyber tribunal in each district. Local Internet infrastructure like IIG, ISP, Mobile operators should comply the call of LEAs. Google, facebook, twitter should make direct cooperation with LEA. Strengthening the LEA with training and resources.
  • 34. Move Forward. Developing International Cooperation and collaboration Exchange program like training and technology Holding international symposium and seminars Making common platform to fight cyber threats. Working with the corporate giants like facebook, google, twitter etc. Reducing digital divide and transportation of technologies
  • 35. Legislations Cyber Security Act -2018 Pornography Control Act-2012 Telecommunication Control Act-2001 ICT Act-2006 Anti Terrorism Act-2009 Mutual Legal Assistance in Criminal Matters Act, 2012(section 28-30 digital evidence and 31-request by Central Authority) Regular review of the laws to accommodate the changing pattern of cyber crimes
  • 36. Bangladesh Police in Cyber Arena Police Headquarters DMP-Cyber Crime Investigation Division DMP- DB Cyber CID-Cyber Police Bureau PBI-Cyber Unit RMP-Cyber Unit CMP-Cyber Two State of the art forensic labs Two modern cyber training centers
  • 37. Where to report instantly Call Hotline 999/01320046494/01320046221-22 AC-CT Cyber: 01320046480/01320046479 AC-DB Cyber: 01320046236 CID-Cyber Police Bureau(Additional SP-CID Cyber)-01320010131 PHQ - Police Cyber Support for Women: 01320-000888 RMP- AC Cyber- 01320061983 Mail to : cyberhelp@dmp.gov.bd cyber.db@dmp.gov.bd cyber@police.gov.bd cybersupport.women@police.gov.bd And I am available over : 01320046472 , cyberunit@dmp.gov.bd
  • 38. Where to report through fb page Be connected with these pages/ID. facebook.com/cyberctdmp facebook.com/cybercrimedb facebook.com/ cpccidbdpolice facebook.com/ PCSW.PHQ facebook.com/najmulsumon (My Profile)
  • 39. ?????