Cyber Security Guideline
Cyber Security Guideline
Cyber Security Guideline
CYBERSECURITY STRATEGY
EXECUTIVE SUMMARY
Bangladesh requires reliable physical and information communication technologies (ICTs). The two types
of infrastructure jointly support essential services in sectors such as communications, emergency
services, energy, finance, food, government, health, transport and water. Therefore, to achieve our
economic security and democratic objectives, we require reliable physical and digital infrastructure.
Physical assets increasingly depend upon the reliable functioning of the digital infrastructure or critical
information infrastructure (CII) to deliver services and to conduct business. Consequently, significant
disruption to CII could have an immediate and debilitating impact that reaches far beyond the ICT sector
and affects the ability of a nation to perform its essential missions in multiple sectors. Therefore, critical
information infrastructure protection (CIIP) is everyones responsibility.
This document is The National Cybersecurity Strategy of Bangladesh. It is one of the long-term
measures for protecting our cyber world against security threats, risks and challenges to national
security. The Strategy addresses the countrys national security strategy. The purpose of this document
is to create a coherent vision for 2021 keeping Bangladesh secure and prosperous by coordinating
government, private sector, citizens and international cyberspace defense efforts.
This National Cybersecurity Strategy outlines a framework for organizing and prioritizing efforts to
manage risks to our cyberspace or critical information infrastructure. To achieve the aforesaid goals
above, this Strategy significantly raises the profile of cybersecurity within our governments and defines
clear roles and responsibilities. Cognizant of the shared nature of cyber vulnerabilities, this Strategy also
requires a public-private partnership to fix the potential vulnerability of private sector-owned critical
infrastructures in banking, utilities and telecommunications sectors against cyber attacks.
In addition, we recognize that cybersecurity is a global challenge that demands truly international
solutions. Therefore, we commit ourselves to joining regional and international partnerships creating
solutions for addressing the cybersecurity challenge regardless of threat. We, therefore, present this
Strategy in terms of the Pillars of the International Telecommunication Unions Global Cybersecurity
Agenda (GCA). The GCA contains five strategic pillars and seven goals for building collaboration between
relevant parties in the fight against cyber threats. We aim to help the GCA become the key framework
for creating a secure and safe information society.
STRATEGIC CONTEXT
Bangladesh needs to build confidence and security in the use of ICTs because of the growing
sophistication, frequency and gravity of cyber threats. Cyber threats are a concern because the
disruption or destruction of critical information infrastructure could potentially have severe economic,
social and national security impacts.
Our cyberspace faces a range of threats. Cyber threats range from espionage directed towards obtaining
political intelligence to phishing to facilitate credit card fraud. In addition to Government information,
espionage now targets the intellectual property of commercial enterprises in areas such as
communication technologies, optics, electronics and genetics. The design of the Internet infrastructure
facilitates some of the cyber threats due to its borderless, anonymous and cross-border nature. Yet, the
same insecure Internet serves as a basis for critical government and private sector services in
Bangladesh.
We attach great value to the protection of all types of cyber threats. Indeed, cyberspace is swiftly
becoming critical to the control of cyber threat devices linked to the energy and transportation sectors
such as electronic transformers and pipeline pumps. New smart grid technologies deliver intelligent
monitoring, control, communication and self-healing technologies. However, smart meters are
susceptible to unauthorized modification, distributed denial of service and disruption during patching.
We are also concerned about an increasing number of cyber attacks. For example, a growing number of
cyber attacks aim to steal official government documents detailing negotiating positions. Disclosure of
such details would seriously harm our national security and interests.
Worryingly, cyber espionage and other cybercrimes are very low cost activities. Attack tools and
methodologies for activities such as phishing or malware distribution are freely available on the Internet
even to amateurs. Besides, perpetrators face little risk of conviction due to incompatible legal
frameworks and the lack of organizational structures to aid international cooperation, dialogue and
coordination in dealing with cyber threats. Silent surveillance enables hostile nations to map the
structure and defenses around key government and private sector infrastructures, plant backdoors,
create and test attacks.
GOAL
Working collaboratively home and abroad, to manage all major cyber risks that affect us directly
irrespective of their origin and type, thereby creating a safe, secure and resilient critical national
information infrastructure for our economy and society.
PURPOSE OF STRATEGY
This Strategy recognizes the impact of cyber threats, risks and challenges to our national values and
interests. The Strategy underlines the need for concerted effort to counter these fast evolving threats.
This fully integrated approach leverages the resources of the Government, organizations across all
sectors, individual private citizens and international partners in mitigating threats to our cyberspace.
The Strategy defines the organizational structures required to address this embryonic risk to our
prosperity and national security.
WAYS PRIORITIES
The Strategy is the basis for a coordinated national and globally compatible approach to protecting our
critical infrastructure against cyber threats. In line with the Global Cyber security Agenda (GCA) of ITU,
our strategic Areas are:
The development of a comprehensive set of national cybercrime legislation that is regionally and
globally applicable and harmonized
The implementation of measures to reduce vulnerabilities in software products through the
deployment of accreditation schemes, protocols and standards;
The definition of strategies for capacity building mechanisms to raise awareness, transfer know-how
and boost cyber security on the national policy agenda; and
The development of a unified national multi-stakeholder strategy for international cooperation,
dialogue and coordination in dealing with cyber threats.
legislation with the ITU Toolkit for Cybercrime helps international cooperation and addresses
jurisdictional and evidentiary issues.
Additionally, internationally harmonized legislation strengthens cybersecurity, as it helps our country
build capacity for preventing, deterring and prosecuting cybercrime.
The cybercrime law should be evaluated by all ministries and legislative committees that might have an
interest in it, even if they have nothing to do with criminal justice, so that no useful idea is missed.
The cybercrime law should similarly be evaluated by the local private sector, by any local affiliate of the
international private sector, by local non-governmental organizations, by academics, by unaffiliated
interested citizens, by willing foreign governments, and anyone else with a recognized interest.
It is recommended that the text of National Cybercrime law be drafted to comply with the provisions of
the Convention on Cybercrime (2001)
Perform and fund research and development with other agencies to create a new generation of
secure cyber technologies.
An annual review assesses the effectiveness of the Councils cybersecurity activities.
With private sector input, the Government shall also develop a coordinated national strategy for
participating in major international discussions that shape policy in areas such as territorial jurisdiction,
sovereign responsibility and the use of cyberspace for war.
Additionally, the Cybersecurity Coordinator or an equally empowered party works with government
departments and agencies, the private sector and academia to formulate and coordinate Bangladeshs
international cybersecurity positions. Thereafter, the ministries of Foreign Affairs should work on
improving international cooperation.
Nations are increasingly dependent on complex systems and information technology. In many cases,
information and communications technologies (ICT) vital to national and economic security are subject
to disruption from a number of causes, either originating from within or outside the nation. Leaders in
government and private industry are increasingly confronted with uncertainty about cyber risk and
vulnerabilities. This uncertainty stems from the complexity and interconnectivity of evolving technology
used to support critical systems. To ensure security and economic vitality, nations must manage cyber
security in accordance with their own economic, social, and political considerations.
Hasan-Uj- Zaman
Assistant Programmer
Bangladesh Computer Council
(Member, Drafting Committee)