0% found this document useful (0 votes)
93 views8 pages

Cyber Crime Trend in Bangladesh, An Analysis and Ways Out To Combat The Threat

This document discusses a conference paper about analyzing cyber crime trends in Bangladesh. The paper examines the global cyber security landscape with a focus on Bangladesh. It investigates causes of cyber attacks in Bangladesh's financial sector and the country's existing legal framework for combating cyber crimes. The paper presents analysis and recommendations for reducing cyber threats in Bangladesh.

Uploaded by

Shahriar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views8 pages

Cyber Crime Trend in Bangladesh, An Analysis and Ways Out To Combat The Threat

This document discusses a conference paper about analyzing cyber crime trends in Bangladesh. The paper examines the global cyber security landscape with a focus on Bangladesh. It investigates causes of cyber attacks in Bangladesh's financial sector and the country's existing legal framework for combating cyber crimes. The paper presents analysis and recommendations for reducing cyber threats in Bangladesh.

Uploaded by

Shahriar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/324468211

Cyber crime trend in Bangladesh, an analysis and ways out to combat the threat

Conference Paper · February 2018


DOI: 10.23919/ICACT.2018.8323800

CITATIONS READS
2 9,688

6 authors, including:

Shusmoy Kundu Khandaker Annatoma Islam

5 PUBLICATIONS   17 CITATIONS   
Military Institute of Science and Technology
5 PUBLICATIONS   10 CITATIONS   
SEE PROFILE
SEE PROFILE

Tania Tahmina Jui Md Delowar Hossain

3 PUBLICATIONS   5 CITATIONS   
University of the West of Scotland
18 PUBLICATIONS   26 CITATIONS   
SEE PROFILE
SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Strategic in Action View project

Conference Paper View project

All content following this page was uploaded by Shusmoy Kundu on 05 December 2020.

The user has requested enhancement of the downloaded file.


International Conference on Advanced Communications Technology(ICACT) 474

Cyber Crime Trend in Bangladesh, an Analysis


and Ways Out to Combat the Threat
Shusmoy Kundu1,2 , Khandaker Annatoma Islam1,3 , Tania Tahmina Jui1,4 , Suzzana Rafi1,5 ,
Md. Afzal Hossain1,6 , Ishraq Haider Chowdhury1,7
1
Department of Computer Science and Engineering,
Military Institute of Science and Technology, Dhaka-1216, Bangladesh.
2
kshusmoy14@gmail, 3 [email protected], 4 [email protected],
5
suzzanarafi@gmail.com, 6 [email protected], 7 [email protected]

Abstract—In this paper an analysis has been carried out institutions, Research and Development (R&D) organiza-
on the cyber attacks, that have happened in the recent tions and other telecommunication firms etc. In this paper
years. Based on the analysis the cyber attack trend in the we shall analytically examine the cyber security scenario
financial sector of Bangladesh has been investigated. The
study is further extended to identify the causes of cyber in the world with an in-depth emphasis in Bangladesh.
heist in the financial sectors. The existing legal framework Thereafter, we shall discuss the cyber security trend in
of Bangladesh for dealing with the cyber crimes has also the financial sector of Bangladesh. After that we shall
been investigated in this paper. The analysis results are put an endeavour to find the ways out to combat cyber
presented in appropriate graphs and charts. Finally a crime in Bangladesh.
few recommendations are put forward for combating the
increasing cyber crimes in the world, and in Bangladesh in We organize the rest of the paper as follows. Back-
particular. ground study of our work is discussed in Section II. In
Keywords—Cyber security, cyber crimes, SCADA, code Section III, we are going to discuss about the major cyber
of ethics, legal issues. attacks in recent times. In Section IV a comparison is
given of cyber attacks among some other countries. In-
I. I NTRODUCTION vestments in cyber security measures by government and
Cyber Security is a security system to protect the ICT organizations will be highlighted in the Section V.
computing devices and computer network where the The trend of cyber attacks in Bangladesh are discussed
important data are stored, retrieved and interchanged in the Section VI. Next Section VII is about the legal
against any kind of attack or intersection. Cyber security framework to combat cyber crime in Bangladesh. The
includes application security, information security, net- following Section VIII contains the ways out to combat
work security, disaster recovery or planning, operational cyber crimes and finally Section IX concludes the paper.
security and so on. All over the world all most all the
II. L ITERATURE R EVIEW
organizations and enterprises are using computers, cloud
and many others server and devices. All the data which Shang, Jiang, Li and Wang [1] tried to combine the
belong to that companies are saved in the data base. available clustered knowledge on cyber security into
They are supposed to be seen only by the employees one big knowledge base and use that to train an entity
and other members who are related to that organization. recognizer. Thus the entity recognizer will be able to gain
Sometimes they have to send their secret data from one knowledge from integrated knowledge base and be able
place to another over the internet. Here professionals to identify any cyber security related entity from text.
are engaged in the art of secret communication; i.e., Duić, Cvrtila and Ivanjko [2] worked with a goal to
have developed mechanisms for ensuring confidential find more effective and long lasting ways to combat cyber
information is not leaked to unauthorized parties. The attacks and crimes happening frequently around us in the
more people are trying to access any program or system world. They emphasized on how these cyber attacks are
in an unauthorized way, the more information and data going to be threat to international relations and what is
need to be saved in a secured and protected way. the way out to fight this using NATO’s planning process
Cyber crime is a bi-product of the ever-increasing for protection from cyber crimes.
development in the areas of information and commu- Roldán-Molina, Almache-Cueva, Silva-Rabadão,
nication technology (ICT). The attackers mainly attack Yevseyeva and Basto-Fernandes [3] presented their work
the confidential data of the organizations or personal to help in estimating the probability of cyber security
information thereof. The most targeted organizations are risks and to form cyber security strategies by building a
hospitals, government offices, police stations, financial software.

ISBN 979-11-88428-01-4 ICACT2018 February 11 ~ 14, 2018


International Conference on Advanced Communications Technology(ICACT) 475

Azad, Mazid and Sharmin [4] presented their work that day, Kaspersky Lab reported infections in France,
wherein they have highlighted the cyber crime laws of Germany, Italy, Poland, the United Kingdom, and the
Bangladesh. United States, but the majority of infections targeted
Teoh and Mahmood [5] discussed about the relation- Russia and Ukraine, where more than 80 companies
ship between the development of cyber security strategy initially were attacked, including the National Bank of
and the successful growth of economy. Ukraine. Many organizations in Ukraine were affected,
including government sectors, banks, state power utilities
III. C YBER C RIME IN G LOBAL S CENARIO and Kiev’s airport and metro system. For the solution,
A. WannaCry Ransomware when the file is encrypting that time if process can be
On 12 May, 2017, the ransomware WannaCry has stopped, it can be saved from encryption. Many anti-virus
begun to spread. It has been reported that, within a day companies claim that their software has been updated
it infected more than 230,000 computers in over 150 for preventing this type of encryption. Kaspersky also
countries. Parts of the United Kingdom’s National Health says its security software is now capable of spotting the
Service (NHS), Spain’s Telefonica, FedEx and Deutsche malware [8]. It is safe to keep using all the updated
Bahn were hit, along with many other countries and com- software and anti-virus.
panies worldwide. The WannaCry ransomware targeted IV. C OMPARISON OF C YBER ATTACK AMONG OTHER
computers running the Microsoft Windows operating C OUNTRIES
system by encrypting data and files and then demanded
ransom payments in the Bitcoin cryptocurrency. Viruses Almost all the countries over the world are under the
are normally spread as an attachment on an email or cyber-attack threat. Due to lack of security any country’s
other downloaded file but WannaCry is a different type organization can be victim of the cyber-attack. A list of
of ransomware because it can spread through a local countries which are lowest malware infected [9] is shown
network on its own. The ransomware has hit organi- in Figure 1.
zations using aging technology and outdated software A pie chart of countries with highest malware infection
[6]. For the remedy for this ransomware, a 22-year-old rates computers is shown below in Figure 2. The highest
web security researcher from North Devon in England infected country is China and the lowest one is Poland
known as MalwareTech researched on this ransomware [9].
and analyzed the problem and code. Then he discovered Supervisory control and data acquisition (SCADA)
an effective kill switch by registering a domain name is a system architecture of software or hardware for
he found in the code of the ransomware. Kill switch process control. It is a center control system. It con-
is a mechanism which remotely stopped any system or sists of controller network interfaces input or output
software without doing any harm and deleting any data. and gathers real time data. It uses peripheral devices
But cyber criminals are fighting back by modifying the like programmable logic controllers and discrete PIF
code for further attack. controllers to the interface. The threat on SCADA is not
new. In the network communication system an effective
B. Petya Ransomware way of gaining the control means operating the system
Petya is a kind of ransomware which also encrypt the in real time. This communication can be attacked by the
data and demand for ransom through bitcoin. Petya 1st attacker. In September 2011, Russian hackers took gain
is introduced in 2016. Till now there are two versions
V1.0 and V2.0. It mainly infects the computer’s Master
Boot Record (MBR). When the malware is installed, it
overwrites the Windows bootloader and then triggers a
restart. It may come to the computers in many ways.
But when user tries to install it, pretends as a normal
software, then it shuts down the operating system and
infects the boot loader. Then there will pop out a message
which is similar with the message which user usually gets
when repairing any system. But it shows the percentage
of progress of file encrypting. After encryption, it will
give a danger message which will tell to press any key,
then it will pop out another message that user’s data
has been encrypted, for restoring the data the user has
to pay the ransom though the bitcoin [7]. On 27 June, Fig. 1. The List of Countries with Lowest Malware Infection Rates in
2017, the Petya V2.0 has been started to spread. On Computers.

ISBN 979-11-88428-01-4 ICACT2018 February 11 ~ 14, 2018


International Conference on Advanced Communications Technology(ICACT) 476

Fig. 2. The Pie Chart of Countries with Highest Malware Infection in Fig. 3. Top 10 Cyber Security Companies around the World.
Computer.

Here according to Investopedia, “Market capitalization


on the US SCADA, but it was not reveal until November refers the total dollar market value of a company’s out-
8th [10]. GE SCADA can be attacked by the attackers. standing shares [14]. Commonly referred to as ‘market
The use of network communication in these systems has cap’, it is calculated by multiplying a company’s shares
proven to be an effective way of gaining a means for outstanding by the current market price of one share.”
remotely operating and maintaining these infrastructures Reference [15] represents investments of various com-
in real-time. Therefore, these have become vital assets panies is shown in a bar chart in Figure 4.
providing a functionality otherwise impossible. However,
Here in the chart we can see that The White House
this also opens up the way for new threat vectors that can
will invest more on cyber security as a part of President’s
potentially compromise the efficient and secure operation
Fiscal Year 2017 budget. They has done it for their
of these systems.
nations future security. Microsoft will be spending same
The Table I below exhibits sector wise cyber attacks in
in this field. The J.P. Morgan Chase & Co. has doubled
various countries during the period 2012 to 2017, [11].
their cyber security investment budget.
V. I NVESTMENTS IN C YBER S ECURITY M EASURES In Bangladesh the situation is a bit frustrating. There
BY G OVERNMENT AND P RIVATE ICT is hardly any ICT organizations in private sector who
O RGANIZATIONS allocate and spend mention able amount for ensuring
their net security. However in the government sector
Cyber Security market, with its growing demand now- the situation is emerging day by day. The IT sections
a-days remains in the most expanding one in comparison of various government organizations are now allocating
to other fields. With the technological advancement we budget for enhancing security of their websites and net-
are losing our privacy and confidentiality also. To cope work. Good news is that ICT division (www.ictd.gov.bd)
up with the situation companies have to invest more and have undertaken a mega project for developing cyber
more to protect their valuable information and data being security labs in various universities and organizations of
hacked. The world wide cyber security market is going
to touch the $1 trillion boundary in a span of 5 years
2017 to 2021 [12]. Below we can see a chart (shown in
Figure 3) that is gathered by the Investing News Network
(INN) showing market capacity and current share price
of popular cyber security companies [13].

TABLE I
S ECTOR WISE CYBER ATTACKS IN VARIOUS COUNTRY

Organization Sectors Year


Indian Banks data breach Financial 2017
JPMorgan Chase data breach Financial 2014
VISA and Master Card Financial 2012
Bangladesh Bank Government Financial 2016
United Kingdom National health service Medical 2017
National Bank of Ukraine Govt. Financial 2017 Fig. 4. Enterprise Security Budget.

ISBN 979-11-88428-01-4 ICACT2018 February 11 ~ 14, 2018


International Conference on Advanced Communications Technology(ICACT) 477

the country [16]. succeeded. They kept trying to transition, after that they
were able to transfer money though their fake accounts.
VI. C YBER ATTACK T REND IN BANGLADESH
After that when on Sunday the bank is opened after
Bangladesh is a developing country. In most of the weekend, the officials noticed that something wrong had
countries like Bangladesh have limitations in information happened because the malware also stopped printer from
accessing and it is because of having very less knowledge printing the transition information. The malware also
about the existing infrastructure. Cyber crime is a prop- handled the log in and log out process and also controlled
erty related crime. Victims are not the priority here, only the server and modification. Then they said to Philippines
snatching of properties such as information, data etc. is bank to stop the transition, but that time in Philippines
the purpose of this crime. In our country most of the it was there weekend. The malware was programmed
banks are at high security risk. According to Bangladesh for activation up to 6th February. After identifying the
Institute of Bank Management (BIBM), approximately attack, the transition has been stopped, but the attacker
Tk 1,793 crore was invested in the banking IT sector in succeeded to transfer $81 million.
2016. Still this banking sector is not cyber crime free at Credit cards, debit cards etc are denoted as “plastic
all. A study of Bangladesh Institute of Bank Management money” are the replacement of conventional financial
(BIBM) says that, a total of 52% of the banks in our components paper money in the current living time. The
country are at high risk of cyber security issues (shown in use of ATM is convenient but has a negative phase,
Figure 5). Out of that 52% banks, 16% banks are at very which comes out in the form of “ATM frauds”. “Internet
high risk and 36% banks are high risk [17]. Risks in 32% fraud” is the use of internet services or software with
banks are moderate, 12% banks are at low risk and the internet access to defraud victims or to otherwise take
remaining 4% of banks are at very low risk region. Cyber advantage of them using various components of the
security in the banking sectors is a burning question in internet, like chat rooms, email, forums, or websites -
recent times especially after the Bangladesh Bank Heist. to execute fraudulent transactions. Bank criminals are
The incident Bangladesh Bank Heist held on 4th making utilization of different electronic medium, for
February 2016, where the hackers (still unknown) tried example, web, email, and encoded messages for their
to steal $1 billion. The hackers managed to get $81 fraudulent activities [19].
million sent to Rizal Commercial Banking Corporation In the last few years, several security breaches had
in the Philippines and PABC bank in the Srilanka via happened in the banking sector of Bangladesh [19], some
four different transfer requests and an additional $20 of those are shown in Table II.
million sent to Pan Asia Banking in a single request. The
malware’s name was evtdiag.exe. The attackers are called VII. L EGAL F RAMEWORK TO C OMBAT C YBER
Reuters [18]. The hacker did this through a malware C RIME IN BANGLADESH
which worked on swift messaging system. This malware The term Cyber Law is used to describe the legal
deletes any incoming message and the confirmation issues related to use of information and communications
message before sending the office printer [7]. On 4th technologies(ICT). An effective cyber law can play a
February, Thursday after working hour, the malware vital role in ensuring that the cyber criminals are fairly
was activated. As Friday was holiday in Bangladesh, and successfully tried and judged for their crimes. Cyber
there was no one for monitoring the transition message. law is much needed to control the misuse and abuse
The attacker gave many request for transition, not all of computer technologies in order to protect nations

Fig. 5. Banks of Bangladesh at Cyber Risks. Fig. 6. Technology and related crimes.

ISBN 979-11-88428-01-4 ICACT2018 February 11 ~ 14, 2018


International Conference on Advanced Communications Technology(ICACT) 478

TABLE II bans production, preservation, transportation and


S ECURITY B REACHES IN BANGLADESH marketing of any kind of pornographic materials.
Time of Occurrence Incident Upon breaking the law, the criminal is given proper
January 06, 2013 Islami Bank Bangladesh site was punishment.
hacked by Human Mind Cracker
2015 Accounts of a private bank were
hacked and money was withdrawn VIII. WAYS O UT TO C OMBAT C YBER C RIME
December 02, 2015 Sonali Bank’s network security
was broken and control was taken In order to combat cyber threats wholistic approach
by the hacker for several hours by both government and private organizations needs to
February, 2016 Attacks in six ATM booths of
three commercial banks be undertaken. Our government, through ICT division
February, 2016 Hackers stole $101 million has already taken some measures in this regard. Yet it
from Bangladesh Bank is not enough. Hackers or intruders find some way to
hamper our privacy, mess with our valuable information
and sometimes make damages that takes years to get over
against cyber attacks and bring the perpetrators behind
for a country like us. Here we shall propose measures
the bar. Most of the developed countries are already
that the concerned organizations may consider to deal
equipped with cyber security strategies and laws. Some
with cyber security.
of them are- Cyber security strategy in Singapore (2016),
Finland’s cyber security strategy [20], National Strategy
for the Protection of the Switzerland against Cyber Risks A. Investments in Cyber Security Aspects
[21] etc. Observing the cyber crime trend in Bangladesh it is
The legal framework to deal with cyber crimes in needless to mention that both private and public sector
Bangladesh are given below: need to invest substantial amount of their budget for
Laws related to cyber security were first enacted in enhancing cyber security measures. Bangladesh govern-
Bangladesh in 2006. [22] Section 57 of the ICT Act ment has invested 40 crore BDT to build up cyber
2006 is related to cyber security. It says, “If any person, security branch in the ICT division [24]. At the same
willingly publishes or broadcasts any material on website time private sectors are need to be encouraged to invest
or any other electronic form that is false and vulgar, in cyber security aspects of their business.
or given the situation upon reading, writing or listening
to that material, any person can become derailed or B. Legal Framework
dishonest, or which causes defamation, worsen or create
the possibility to worsen the law and order situation, Our government has passed various legal acts to fight
damage a person’s or state’s image, or harm or may back the cyber attack and also stop digital harassment.
harm religious feelings, or provocation is instigated upon We have ICT acts 2006, 2009, 2013(amendment), Draft
any person or organization through these materials, then Digital Act 2016 [25], [26]. The Draft Digital Act 2016
his/her such act will be a crime”. may be enacted at the earliest All these acts combine the
In the latest amendment(2013), offences under Section cyber security in our country.
57 were made non-bailable and the maximum penalty
was extended to 14-year imprisonment. C. Seminar and Training
• This section has aroused huge criticism amongst the
The government arranges various seminars, workshops
citizens as it contradicts with freedom of speech at college, university and institution level to make people
and expression (constitutional right). As such the aware about the cyber crime issues. These seminars or
government is going to abolish this Section 57 by workshops enlighten people about cyber crime happening
enacting a new law named ‘Digital Security Act, around the world and also in our country and how to
2016’, which has been prepared by ICT division. fight back them. In supervision of bdCERT many training
[20] programs are held [27].
• ‘The National ICT Policy 2009’ is a framework that
tells us how to use ICT for the social and economic
D. CERT Group Formation
development of the country [23]. It includes creation
of ICT infrastructure, research and development of CERT means Computer Emergency Response Team.
ICT, application of ICT on various sectors etc. This team’s responsibility is to deal any instant devas-
• The Bangladesh government had approved this very tating situation arisen due to cyber attack. Bangladesh
effective Anti pornography act in 2012 [21]. It is government has given us a 24*7 hours CERT assistance
believed to be Bangladesh’s first law specifically named bdCERT [27]. Each organization and institution
controlling the spread of pornography. The law need to form their individual CERT.

ISBN 979-11-88428-01-4 ICACT2018 February 11 ~ 14, 2018


International Conference on Advanced Communications Technology(ICACT) 479

E. Cyber Security Strategy [6] “Wannacry cyber attack,” https://


www.thestreet.com/story/14147814/1/
Each and every organizations must have a strategy to how-hackers-changed-their-style-in-the-wanna-cry-attacks.html.
combat cyber crime and take immediate decisions when [7] “Bangladesh Bank Attackers Used Custom Mal-
needed. This strategy should be made as per the National ware,” https://www.pcworld.com/article/3060724/
bangladesh-bank-attackers-used-custom-malware.
Cyber Security Strategy [28]. [8] “Petya virus new analysis,” https://www.theverge.com/2017/6/28/
15887496/petya-virus-not-actually-ransomware-analysis-shows.
F. Code of Ethics [9] “Countries which are most vulnerable to cyber
Each organizations should have a culture of complying attacks,” https://www.cybersecurity-insiders.com/
list-of-countries-which-are-most-vulnerable-to-cyber-attacks/,
with code of ethics (ACM code) by their employees [29]. [Online; accessed 22-March-2017].
ICT education in universities and institutions need to [10] “Scada,” https://www.infosecurity-magazine.com/news/
include courses on engineering code of ethics in their russian-hackers-behind-first-successful-us-scada/.
[11] “Bangladesh bank heist, swift software was
curriculum. Bangladesh government has already made compromised,” https://www.itgovernance.co.uk/blog/
ICT education compulsory in its secondary and higher list-of-data-breaches-and-cyber-attacks-in-april-2017/.
secondary level. In this curriculum code of computer [12] “Cyber security companies,” https://cybersecurityventures.com/
cybersecurity-500/, [Online; accessed 24-September-2017].
ethics (ACM) may be incorporated. [13] “Cyber security market report,” https://investingnews.
IX. C ONCLUSION com/daily/tech-investing/cybersecurity-investing/
top-cyber-security-companies/, [Online; accessed 4-October-
The current cyber attack trend in Bangladesh demands 2017].
prompt attention for creating and maintaining robust [14] “Market capitalization,” http://www.investopedia.com/terms/m/
marketcapitalization.asp, [Online; accessed 4-October-2017].
and workable cyber security strategy to keep our cyber [15] “Cyber security market report,” https://cybersecurityventures.
space safe and secure against any potential cyber attack. com/cybersecurity-market-report/, [Online; accessed 24-
It needs to consider our country’s economic capacity, September-2017].
[16] “Ict ministry news,” http://doict.portal.gov.bd/site/page/
availability of skills and resources. Government has pri- 73fa42ac-fae9-4c0b-bec7-5edbb6841e64/.
oritized this and invested a lot in ICT sector. But a strong [17] “Dhaka tribune news,” http://www.dhakatribune.com/business/
cyber security strategy is yet to be prepared and put in banks/2017/05/05/banks-high-cyber-risks/.
[18] “Bangladesh bank heist, swift software was
action in our country. Comparison of cyber threats among compromised,” http://www.reuters.com/article/
various countries is shown in this paper. It also highlights us-usa-nyfed-bangladesh-malware-exclusiv-idUSKCN0XM0DR.
the trend and statistics of cyber threats in various sectors [19] “Cyber crime scenario in bangladesh,” http://www.icmab.org.bd/
images/stories/journal/2016/Mar-Apr/3.Cyber-crime.pdf.
like industry, finance and government. To combat the [20] “Ict amendment 2013,” http://www.askbd.org/ask/2013/10/09/
cyber crimes, the measures taken in foreign countries, ict-amendment-act-2013-information-freedom-expression-threat/.
as well as in Bangladesh are discussed here. Govern- [21] “Anti pornography act 2012,” http://www.iiste.org/Journals/
index.php/JLPG/article/viewFile/21714/21905http://www.acm.
ment and private sectors contribute in creating awareness org/about-acm/acm-code-of-ethics-and-professional-conduct.
for combating cyber crimes through holding seminars, [22] “Ict act 2006,” http://bcc.portal.gov.bd/sites/default/files/files/bcc.
conferences, workshops, trainings etc. The need for a portal.gov.bd/page/97cc59c3_8f51_4d39_a84b_8c0b39ae3f62/
ICT_ACT_2006.pdf.
culture of complying with codes of engineering ethics to [23] “National ict policy,2009,” http://www.bcs.org.bd/img/upload/
deal with cyber crimes has also been mentioned. A few page/11.pdf.
proposals have been put forward in this paper to enhance [24] “Cyber security market report,” https://www.ictd.gov.bd/project/
proposed, [Online; accessed 4-October-2017].
the cyber security strength of Bangladesh. [25] “Ict act 2006 bangladesh,” http://bdlaws.minlaw.gov.bd/bangla_
pdf_part.php?id=950&vol=37&search=2006/, [Online; accessed
R EFERENCES 25-September-2017].
[1] H. Shang, R. Jiang, A. Li, and W. Wang, “A framework to [26] “Ict act 2009 bangladesh,” http://bdlaws.minlaw.gov.bd/bangla_
construct knowledge base for cyber security,” in 2017 IEEE pdf_part.php?id=1011&vol=39&search=2009/, [Online; accessed
Second International Conference on Data Science in Cyberspace 25-September-2017].
(DSC), June 2017, pp. 242–248. [27] “Cyber security market report,” http://www.bdcert.org/, [Online;
[2] I. Duić, V. Cvrtila, and T. Ivanjko, “International cyber se- accessed 4-October-2017].
curity challenges,” in 2017 40th International Convention on [28] “Cyber security market report,” https://www.unodc.org/res/
Information and Communication Technology, Electronics and cld/lessons-learned/the_national_cybersecurity_strategy_of_
Microelectronics (MIPRO), May 2017, pp. 1309–1313. bangladesh_html/The_National_Cybersecurity_Strategy_of_
[3] G. RoldÃan-Molina,
˛ M. Almache-Cueva, C. Silva-RabadÃčo, Bangladesh.pdf, [Online; accessed 4-October-2017].
I. Yevseyeva, and V. Basto-Fernandes, “A decision support system [29] “Acm code of ethics,” http://www.acm.org/about-acm/
for corporations cybersecurity management,” in 2017 12th Iberian acm-code-of-ethics-and-professional-conduct/, [Online; accessed
Conference on Information Systems and Technologies (CISTI), 27-September-2017].
June 2017, pp. 1–6.
[4] K. N. M. Dr Mir Mohammad Azad and S. S. Sharmin, “Cyber
crime problem areas, legal areas and the cyber crime law,” July
2017.
[5] C. S. Teoh and A. K. Mahmood, “National cyber security
strategies for digital economy,” in 2017 International Conference
on Research and Innovation in Information Systems (ICRIIS), July
2017, pp. 1–6.

ISBN 979-11-88428-01-4 ICACT2018 February 11 ~ 14, 2018


International Conference on Advanced Communications Technology(ICACT) 480

Shusmoy Kundu was born in Jhenaidah, Md Afzal Hossain was graduated from
Bangladesh in 1996. He is completing his Bangladesh Institute of Technology (BIT),
B.Sc from Military Institute of Science and Rajshahi from the department of Electrical
Technology (MIST). His major of study is and Electronic Engineering (EEE) securing
Computer Science and Engineering. Cyber 1st class. He obtained M.Sc (EEE) degree
security is the field of his final year re- from Bangladesh University of Engineering
search work. He has keen interest to work and Technology (BUET). He is pursuing PhD
regarding cyber and network security. He (in engineering) in the field of Multicore
has completed several projects related to AI, Optical Fiber (MCF) at BUET. He has ob-
Computer Interfacing, Computer Graphics, tained MBA (MIS) degree from IBA (Dhaka
Database Management System, Android Apps University) and M.Phil degree in National
Development. Shusmoy has completed courses on Cisco Certified Net- Security and Strategy from the University of Madras, Chennai, India.
work Associate (CCNA) and Mobile Apps Development. He attended His fields of research interests are ’Optical Fiber Communication’ and
2nd IEEE International Conference on Communications and Photonics ’Information System Security’. He has a good number of publications
(ICTP), International Humanitarian Technology Project Competition in his credit in national and international conference proceedings and
(IHTPC) in Bangladesh University of Engineering and Technology. journals. Mr. Hossain attended the 12th ICACT (2010) in Phoenix Park,
South Korea to present his research paper. Currently Afzal is serving
as Senior Instructor (professor) in the Department of CSE, Military
Institute of Science and Technology (MIST).

Khandaker Annatoma Islam was born in


1994 at Dhaka, Bangladesh. She is a final year
student in Military Institute of Science and
Technology (MIST). She Her research interest
is in Cyber Security, Computer Networking
and Computer Interfacing. Her projects in-
clude automated electricity bill monitoring
system in Interfacing, 3D DX-Ball in Graph-
ics. She has a certification on Mobile Appli-
cation Development Course, Arduino Micro-
controller and Robotics Course.

Tania Tahmina Jui was born in 1995 at


Pabna, Bangladesh. She is a final year student Ishraq Haider Chowdhury was born in
of MIST on department of computer science 1993 at Dhaka, Bangladesh. He is a final
and engineering. Her projects include Com- year student of Military Institute of Science
puter graphics, computer networking, artifi- and Technology (MIST) in Department of
cial intelligence, web development and data Computer Science and Engineering. He has
management. She also has a certificate on research Interest in Image Processing, Com-
CCNA in computer networking. puter Interfacing and Artificial Intelligence.
His projects include controlling intensity of
light in a room using artificial intelligence. He
also has a certification on Mobile Application
Development.

Suzzana Rafi was born in 1993 at Dhaka,


Bangladesh. She is a final year student of
Military Institute of Science and Technology
(MIST) in Department of Computer Science
and Engineering. She has interest in Com-
puter Graphics, Computer Networking and
Artificial Intelligence. Her projects include
creating a short animation in 3ds max in
Graphics, a smart menu system in AI. She
also has a certificate on CCNA in Computer
networking.

ISBN 979-11-88428-01-4 ICACT2018 February 11 ~ 14, 2018

View publication stats

You might also like