SlideShare a Scribd company logo
1 of 40
Download to read offline
Secure Your Social Network
Jobayer Almahmud Hossain RHCA-L3
Member Secretory ICT Cell, IDEB
Managing Director & CTO Banglanet Technologies Ltd
About Me
Jobayer Almahmud Hossain
RHCSA, RHCE, RHCSS, RHCDS, RHCA-L3
Managing Director & CTO Banglanet Technologies Ltd
Member Secretory, IDEB ICT & Innovation Division, IDEB
https://www.facebook.com/jobayer.RHCA
https://www.facebook.com/RHCA.JOBAYER
Started my career with Akij Computer Ltd. (2003-2004)
Worked at Akij Online Ltd. (ISP) (2004-2005)
Worked at Asia Infosys Ltd. (ISP) (2005-2008)
Worked at Grameen Solutions Ltd. (2008-2010)
Worked at BRAC (2010-2018) (NGO)
Social Media
• Virtually connected
• Easy to Announce
Click or Not to Click (Cyber Security Awareness )
Sometime Happiness goes away
When we are in a trouble
Because Social Media become our Identity
Need to be Careful in Social Media
• Identity Theft
• Viral (Wrong Information)
• Fallen in Cyber Crime
• Scams
What can I do if I've been phished on
Facebook?
• What is phishing?
– Phishing is when someone tries to get access to your
Facebook account by sending you a suspicious message or
link that asks for your personal information
• I think I've been phished. What can I do?
– If you are able to log in to your account, resetting your
password
• How do I avoid getting phished?
– Look out for suspicious emails or messages
– Don't click suspicious links
– Get alerts
Set up two-factor Authentication
Setting UP Extra Security
Facebook Security Features and Tips
• Protect your password
• Never share your login information
• Log out of Facebook when you use a computer
(you can log out remotely).
• Never click suspicious links, even if they
appear to come from a friend or a company
you know
• Set get alert about unrecognized login
Facebook Security Features and Tips
• Avoid Spam and Scams
– Romance scams, Lottery scams
– Access Token Theft
– People claiming to be a friend or relative in an
emergency.
• Review account activity and remove any spam
• Avoided Using Funny Apps
Will Facebook ever ask me for my
Password?
• Facebook will never ask you for your password
in an email or Facebook message
Ethics of Using Social Media
• Careful about Picture
• Don’t click the video link found on text
• Inform friends if your account generating
malware effected text
• Keep in mind the content on internet always
will not true
• Guide your Friends & family how they can stay
safe
Cyber Law in Bangladesh
 Information &
Communication and
Technology Act 2006 (ICT)
 Subsequently, the
government amended the
Act in 2009 and in 2013
 Section 54 to 67 of the ICT
Act 2006 illustrate the
cybercrimes both civil and
criminal matters.
Section 57 of the ICT Act 2006
Punishment on ICT Act 2013
(Review)
Some example of Punishment
under 57 of ICT act
Two person was found guilty under this act and
punished 3 years and fined 10,000 BDT and 7
years for the comment against Honorable Prim
minister - 2011
One NGO Leader was arrested for making
offensive comments about Muslim hajj on
facebook
Cyber Security threats is a Global
Concern
 Now a days Internet become a part of our daily life
 We can order food, cloths, or even grocery through
Internet
 Our Collage or University admission process almost
Internet based
 Social Media like Facebook creates our own virtual
world
Top Cyber Security Facts
Facts 1 :
Cyber crime damage costs
to hit $6 trillion annually by
2021. $3 trillion were just a
year ago.
Facts 2 :
Cyber Security spending to
exceed $1 trillion from 2017
to 2021.
Cyber threats for End Users
Spam
Cyber threats for End Users
Phishing
Cyber threats for End Users
Spoofing
List of Cyber Crimes
• Fraud and financial crimes
• Cyber terrorism
• Cyber extortion
• Cyber warfare
• Harassment
Cyber threats for Servers
Brute Force Attack
Cyber threats for End Users
Botnets
A collection of software robots or 'bots'
Cyber threats for End Users
Ransomware
Cyber threats for Data Center or Systems
DDoS attack
Web Site Defacement
Click or Not to Click (Cyber Security Awareness )
Top Cyber Security Facts
The number of vacant
Cyber Security jobs, which
is predicted to reach 3.5
million by 2021
Cyber Security Experts Career Path
• 4 Cybersecurity Career Paths (And the Training
to Get You There)
• Security Architect
• Security Consultant
• Penetration Tester/Ethical Hacker
• Chief Information Security Officer (CISO)
How to Start Your Cybersecurity Career
• Systems administrator
• Database administrator
• Web administrator
• Web developer
• Network administrator
• IT technician
• Security administrator
• Network engineer
• Computer software engineer
There is no one linear path to a successful
career in cybersecurity.
Security Architect Career Path
• Plan, research and design durable security
architectures for various IT projects.
• Develop requirements for networks, firewalls,
routers and related network devices.
• Perform vulnerability testing, security
assessments and risk analysis.
• Research and implement the latest security
standards, systems and best practices.
Penetration Tester/Ethical Hacker
• Perform penetration tests on web
applications, networks and computer systems
• Uncover security holes and pinpoint the
methods attackers could use to exploit system
weaknesses
• Design and implement new penetration tools
and tests
Cyber Security Experts
• Certified Ethical Hacker (CEH)
– EC-Council
• CISSP
– (ISC)²
Ethical Hacker
An Ethical Hacker, also known as
a whitehat hacker, is a security
professional who applies their
hacking skills for defensive purposes.
WordPress Security Tips
• Don’t Use Nulled Themes
• Install a WordPress Security Plugin
• Use a Strong Password
• Disable File Editing
• Install SSL Certificate
• Change your WP-login URL
• Limit Login Attempts
• Hide wp-config.php and .htaccess files
• Update your WordPress version
Linux Server Security
• Turn off root logins to improve Linux server
security
• Alter the SSH port
• Generate an SSH key pair
• Deactivate network ports when not in use
• Update Software for better Linux Server Security
• Linux security – set up a firewall
• Use SFTP, not FTP
• Backup regularly
• Stop anonymous FTP uploads
• Use a strong password
Secure Your Mobile Phone
• Buy smartphones from vendors
who release Android patches
quickly.
– LG, Motorola, HTC, Sony, Xiaomi,
OnePlus, and Samsung.
• Lock your phone.
– PIN remains the safest way
– don't use 1-2-3-4, as your PIN
• Only use apps from the Google
Play Store.
• Use device encryption.
Click or Not to Click (Cyber Security Awareness )
Questions ?
Jobayer Almahmud Hossain
RHCSA, RHCE, RHCSS, RHCDS, RHCA-L3
Managing Director & CTO Banglanet Technologies Ltd
Member Secretory IDEB ICT & Innovation Division, IDEB
Facebook ID: https://www.facebook.com/jobayer.RHCA
Facebook Page: https://www.facebook.com/RHCA.JOBAYER

More Related Content

What's hot

GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )Md Raffiqunnabi Rumman
 
Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Nilesh Sapariya
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04Kyle Lai
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 

What's hot (20)

GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
 
Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 

Similar to Click or Not to Click (Cyber Security Awareness )

Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptxsrikmhh
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security Mehedi Hasan
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
CyberSecurity.ppt
CyberSecurity.pptCyberSecurity.ppt
CyberSecurity.pptFork6
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goMichael Furman
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementBeyondTrust
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1NetWatcher
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptxJohn Donahue
 
4 . future uni presentation
4 . future uni presentation4 . future uni presentation
4 . future uni presentationRashid Khatmey
 
CyberSecurity Series Malware slides
CyberSecurity Series Malware slidesCyberSecurity Series Malware slides
CyberSecurity Series Malware slidesJim Kaplan CIA CFE
 
gagan internship.pptx
gagan internship.pptxgagan internship.pptx
gagan internship.pptxMamthaMam1
 

Similar to Click or Not to Click (Cyber Security Awareness ) (20)

NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to doNEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
CyberSecurity.ppt
CyberSecurity.pptCyberSecurity.ppt
CyberSecurity.ppt
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Eset cybersecurity awareness (laxman giri)
Eset cybersecurity awareness (laxman giri)Eset cybersecurity awareness (laxman giri)
Eset cybersecurity awareness (laxman giri)
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to go
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
4 . future uni presentation
4 . future uni presentation4 . future uni presentation
4 . future uni presentation
 
CyberSecurity Series Malware slides
CyberSecurity Series Malware slidesCyberSecurity Series Malware slides
CyberSecurity Series Malware slides
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
gagan internship.pptx
gagan internship.pptxgagan internship.pptx
gagan internship.pptx
 
Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)
 

Recently uploaded

Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdfShreedeep Rayamajhi
 
Presentation2.pptx - JoyPress Wordpress
Presentation2.pptx -  JoyPress WordpressPresentation2.pptx -  JoyPress Wordpress
Presentation2.pptx - JoyPress Wordpressssuser166378
 
Zero-day Vulnerabilities
Zero-day VulnerabilitiesZero-day Vulnerabilities
Zero-day Vulnerabilitiesalihassaah1994
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Shubham Pant
 
Bio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxBio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxnaveenithkrishnan
 
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsVision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsRoxana Stingu
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfLESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfmchristianalwyn
 
Computer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteComputer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteMavein
 
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024Jan Löffler
 

Recently uploaded (12)

Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
 
Presentation2.pptx - JoyPress Wordpress
Presentation2.pptx -  JoyPress WordpressPresentation2.pptx -  JoyPress Wordpress
Presentation2.pptx - JoyPress Wordpress
 
Zero-day Vulnerabilities
Zero-day VulnerabilitiesZero-day Vulnerabilities
Zero-day Vulnerabilities
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024
 
Bio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxBio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptx
 
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsVision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfLESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
 
Computer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteComputer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a Website
 
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
 

Click or Not to Click (Cyber Security Awareness )

  • 1. Secure Your Social Network Jobayer Almahmud Hossain RHCA-L3 Member Secretory ICT Cell, IDEB Managing Director & CTO Banglanet Technologies Ltd
  • 2. About Me Jobayer Almahmud Hossain RHCSA, RHCE, RHCSS, RHCDS, RHCA-L3 Managing Director & CTO Banglanet Technologies Ltd Member Secretory, IDEB ICT & Innovation Division, IDEB https://www.facebook.com/jobayer.RHCA https://www.facebook.com/RHCA.JOBAYER Started my career with Akij Computer Ltd. (2003-2004) Worked at Akij Online Ltd. (ISP) (2004-2005) Worked at Asia Infosys Ltd. (ISP) (2005-2008) Worked at Grameen Solutions Ltd. (2008-2010) Worked at BRAC (2010-2018) (NGO)
  • 3. Social Media • Virtually connected • Easy to Announce
  • 5. Sometime Happiness goes away When we are in a trouble Because Social Media become our Identity
  • 6. Need to be Careful in Social Media • Identity Theft • Viral (Wrong Information) • Fallen in Cyber Crime • Scams
  • 7. What can I do if I've been phished on Facebook? • What is phishing? – Phishing is when someone tries to get access to your Facebook account by sending you a suspicious message or link that asks for your personal information • I think I've been phished. What can I do? – If you are able to log in to your account, resetting your password • How do I avoid getting phished? – Look out for suspicious emails or messages – Don't click suspicious links – Get alerts
  • 8. Set up two-factor Authentication
  • 9. Setting UP Extra Security
  • 10. Facebook Security Features and Tips • Protect your password • Never share your login information • Log out of Facebook when you use a computer (you can log out remotely). • Never click suspicious links, even if they appear to come from a friend or a company you know • Set get alert about unrecognized login
  • 11. Facebook Security Features and Tips • Avoid Spam and Scams – Romance scams, Lottery scams – Access Token Theft – People claiming to be a friend or relative in an emergency. • Review account activity and remove any spam • Avoided Using Funny Apps
  • 12. Will Facebook ever ask me for my Password? • Facebook will never ask you for your password in an email or Facebook message
  • 13. Ethics of Using Social Media • Careful about Picture • Don’t click the video link found on text • Inform friends if your account generating malware effected text • Keep in mind the content on internet always will not true • Guide your Friends & family how they can stay safe
  • 14. Cyber Law in Bangladesh  Information & Communication and Technology Act 2006 (ICT)  Subsequently, the government amended the Act in 2009 and in 2013  Section 54 to 67 of the ICT Act 2006 illustrate the cybercrimes both civil and criminal matters.
  • 15. Section 57 of the ICT Act 2006
  • 16. Punishment on ICT Act 2013 (Review)
  • 17. Some example of Punishment under 57 of ICT act Two person was found guilty under this act and punished 3 years and fined 10,000 BDT and 7 years for the comment against Honorable Prim minister - 2011 One NGO Leader was arrested for making offensive comments about Muslim hajj on facebook
  • 18. Cyber Security threats is a Global Concern  Now a days Internet become a part of our daily life  We can order food, cloths, or even grocery through Internet  Our Collage or University admission process almost Internet based  Social Media like Facebook creates our own virtual world
  • 19. Top Cyber Security Facts Facts 1 : Cyber crime damage costs to hit $6 trillion annually by 2021. $3 trillion were just a year ago. Facts 2 : Cyber Security spending to exceed $1 trillion from 2017 to 2021.
  • 20. Cyber threats for End Users Spam
  • 21. Cyber threats for End Users Phishing
  • 22. Cyber threats for End Users Spoofing
  • 23. List of Cyber Crimes • Fraud and financial crimes • Cyber terrorism • Cyber extortion • Cyber warfare • Harassment
  • 24. Cyber threats for Servers Brute Force Attack
  • 25. Cyber threats for End Users Botnets A collection of software robots or 'bots'
  • 26. Cyber threats for End Users Ransomware
  • 27. Cyber threats for Data Center or Systems DDoS attack
  • 30. Top Cyber Security Facts The number of vacant Cyber Security jobs, which is predicted to reach 3.5 million by 2021
  • 31. Cyber Security Experts Career Path • 4 Cybersecurity Career Paths (And the Training to Get You There) • Security Architect • Security Consultant • Penetration Tester/Ethical Hacker • Chief Information Security Officer (CISO)
  • 32. How to Start Your Cybersecurity Career • Systems administrator • Database administrator • Web administrator • Web developer • Network administrator • IT technician • Security administrator • Network engineer • Computer software engineer There is no one linear path to a successful career in cybersecurity.
  • 33. Security Architect Career Path • Plan, research and design durable security architectures for various IT projects. • Develop requirements for networks, firewalls, routers and related network devices. • Perform vulnerability testing, security assessments and risk analysis. • Research and implement the latest security standards, systems and best practices.
  • 34. Penetration Tester/Ethical Hacker • Perform penetration tests on web applications, networks and computer systems • Uncover security holes and pinpoint the methods attackers could use to exploit system weaknesses • Design and implement new penetration tools and tests
  • 35. Cyber Security Experts • Certified Ethical Hacker (CEH) – EC-Council • CISSP – (ISC)² Ethical Hacker An Ethical Hacker, also known as a whitehat hacker, is a security professional who applies their hacking skills for defensive purposes.
  • 36. WordPress Security Tips • Don’t Use Nulled Themes • Install a WordPress Security Plugin • Use a Strong Password • Disable File Editing • Install SSL Certificate • Change your WP-login URL • Limit Login Attempts • Hide wp-config.php and .htaccess files • Update your WordPress version
  • 37. Linux Server Security • Turn off root logins to improve Linux server security • Alter the SSH port • Generate an SSH key pair • Deactivate network ports when not in use • Update Software for better Linux Server Security • Linux security – set up a firewall • Use SFTP, not FTP • Backup regularly • Stop anonymous FTP uploads • Use a strong password
  • 38. Secure Your Mobile Phone • Buy smartphones from vendors who release Android patches quickly. – LG, Motorola, HTC, Sony, Xiaomi, OnePlus, and Samsung. • Lock your phone. – PIN remains the safest way – don't use 1-2-3-4, as your PIN • Only use apps from the Google Play Store. • Use device encryption.
  • 40. Questions ? Jobayer Almahmud Hossain RHCSA, RHCE, RHCSS, RHCDS, RHCA-L3 Managing Director & CTO Banglanet Technologies Ltd Member Secretory IDEB ICT & Innovation Division, IDEB Facebook ID: https://www.facebook.com/jobayer.RHCA Facebook Page: https://www.facebook.com/RHCA.JOBAYER

Editor's Notes

  1. Spam is one of the more common methods of both sending information out and collecting it from unsuspecting people. The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs.
  2. Phishing is used most often by cyber criminals because it's easy to execute and can produce the results they're looking for with very little effort. Fake emails, text messages and websites created to look like they're from authentic companies. They're sent by criminals to steal personal and financial information from you. This is also known as “spoofing”. Trick you into giving them information by asking you to update, validate or confirm your account. It is often presented in a manner than seems official and intimidating, to encourage you to take action. Provides cyber criminals with your username and passwords so that they can access your accounts (your online bank account, shopping accounts, etc.) and steal your credit card numbers.
  3. This technique is often used in conjunction with phishing in an attempt to steal your information.  A website or email address that is created to look like it comes from a legitimate source. An email address may even include your own name, or the name of someone you know, making it difficult to discern whether or not the sender is real. Spends spam using your email address, or a variation of your email address, to your contact list. Recreates websites that closely resemble the authentic site. This could be a financial institution or other site that requires login or other personal information.
  4. distributed denial-of-service