SlideShare a Scribd company logo
Secure Your Social Network
Jobayer Almahmud Hossain RHCA-L3
Member Secretory ICT Cell, IDEB
Managing Director & CTO Banglanet Technologies Ltd
About Me
Jobayer Almahmud Hossain
RHCSA, RHCE, RHCSS, RHCDS, RHCA-L3
Managing Director & CTO Banglanet Technologies Ltd
Member Secretory, IDEB ICT & Innovation Division, IDEB
https://www.facebook.com/jobayer.RHCA
https://www.facebook.com/RHCA.JOBAYER
Started my career with Akij Computer Ltd. (2003-2004)
Worked at Akij Online Ltd. (ISP) (2004-2005)
Worked at Asia Infosys Ltd. (ISP) (2005-2008)
Worked at Grameen Solutions Ltd. (2008-2010)
Worked at BRAC (2010-2018) (NGO)
Social Media
• Virtually connected
• Easy to Announce
Click or Not to Click (Cyber Security Awareness )
Sometime Happiness goes away
When we are in a trouble
Because Social Media become our Identity
Need to be Careful in Social Media
• Identity Theft
• Viral (Wrong Information)
• Fallen in Cyber Crime
• Scams
What can I do if I've been phished on
Facebook?
• What is phishing?
– Phishing is when someone tries to get access to your
Facebook account by sending you a suspicious message or
link that asks for your personal information
• I think I've been phished. What can I do?
– If you are able to log in to your account, resetting your
password
• How do I avoid getting phished?
– Look out for suspicious emails or messages
– Don't click suspicious links
– Get alerts
Set up two-factor Authentication
Setting UP Extra Security
Facebook Security Features and Tips
• Protect your password
• Never share your login information
• Log out of Facebook when you use a computer
(you can log out remotely).
• Never click suspicious links, even if they
appear to come from a friend or a company
you know
• Set get alert about unrecognized login
Facebook Security Features and Tips
• Avoid Spam and Scams
– Romance scams, Lottery scams
– Access Token Theft
– People claiming to be a friend or relative in an
emergency.
• Review account activity and remove any spam
• Avoided Using Funny Apps
Will Facebook ever ask me for my
Password?
• Facebook will never ask you for your password
in an email or Facebook message
Ethics of Using Social Media
• Careful about Picture
• Don’t click the video link found on text
• Inform friends if your account generating
malware effected text
• Keep in mind the content on internet always
will not true
• Guide your Friends & family how they can stay
safe
Cyber Law in Bangladesh
 Information &
Communication and
Technology Act 2006 (ICT)
 Subsequently, the
government amended the
Act in 2009 and in 2013
 Section 54 to 67 of the ICT
Act 2006 illustrate the
cybercrimes both civil and
criminal matters.
Section 57 of the ICT Act 2006
Punishment on ICT Act 2013
(Review)
Some example of Punishment
under 57 of ICT act
Two person was found guilty under this act and
punished 3 years and fined 10,000 BDT and 7
years for the comment against Honorable Prim
minister - 2011
One NGO Leader was arrested for making
offensive comments about Muslim hajj on
facebook
Cyber Security threats is a Global
Concern
 Now a days Internet become a part of our daily life
 We can order food, cloths, or even grocery through
Internet
 Our Collage or University admission process almost
Internet based
 Social Media like Facebook creates our own virtual
world
Top Cyber Security Facts
Facts 1 :
Cyber crime damage costs
to hit $6 trillion annually by
2021. $3 trillion were just a
year ago.
Facts 2 :
Cyber Security spending to
exceed $1 trillion from 2017
to 2021.
Cyber threats for End Users
Spam
Cyber threats for End Users
Phishing
Cyber threats for End Users
Spoofing
List of Cyber Crimes
• Fraud and financial crimes
• Cyber terrorism
• Cyber extortion
• Cyber warfare
• Harassment
Cyber threats for Servers
Brute Force Attack
Cyber threats for End Users
Botnets
A collection of software robots or 'bots'
Cyber threats for End Users
Ransomware
Cyber threats for Data Center or Systems
DDoS attack
Web Site Defacement
Click or Not to Click (Cyber Security Awareness )
Top Cyber Security Facts
The number of vacant
Cyber Security jobs, which
is predicted to reach 3.5
million by 2021
Cyber Security Experts Career Path
• 4 Cybersecurity Career Paths (And the Training
to Get You There)
• Security Architect
• Security Consultant
• Penetration Tester/Ethical Hacker
• Chief Information Security Officer (CISO)
How to Start Your Cybersecurity Career
• Systems administrator
• Database administrator
• Web administrator
• Web developer
• Network administrator
• IT technician
• Security administrator
• Network engineer
• Computer software engineer
There is no one linear path to a successful
career in cybersecurity.
Security Architect Career Path
• Plan, research and design durable security
architectures for various IT projects.
• Develop requirements for networks, firewalls,
routers and related network devices.
• Perform vulnerability testing, security
assessments and risk analysis.
• Research and implement the latest security
standards, systems and best practices.
Penetration Tester/Ethical Hacker
• Perform penetration tests on web
applications, networks and computer systems
• Uncover security holes and pinpoint the
methods attackers could use to exploit system
weaknesses
• Design and implement new penetration tools
and tests
Cyber Security Experts
• Certified Ethical Hacker (CEH)
– EC-Council
• CISSP
– (ISC)²
Ethical Hacker
An Ethical Hacker, also known as
a whitehat hacker, is a security
professional who applies their
hacking skills for defensive purposes.
WordPress Security Tips
• Don’t Use Nulled Themes
• Install a WordPress Security Plugin
• Use a Strong Password
• Disable File Editing
• Install SSL Certificate
• Change your WP-login URL
• Limit Login Attempts
• Hide wp-config.php and .htaccess files
• Update your WordPress version
Linux Server Security
• Turn off root logins to improve Linux server
security
• Alter the SSH port
• Generate an SSH key pair
• Deactivate network ports when not in use
• Update Software for better Linux Server Security
• Linux security – set up a firewall
• Use SFTP, not FTP
• Backup regularly
• Stop anonymous FTP uploads
• Use a strong password
Secure Your Mobile Phone
• Buy smartphones from vendors
who release Android patches
quickly.
– LG, Motorola, HTC, Sony, Xiaomi,
OnePlus, and Samsung.
• Lock your phone.
– PIN remains the safest way
– don't use 1-2-3-4, as your PIN
• Only use apps from the Google
Play Store.
• Use device encryption.
Click or Not to Click (Cyber Security Awareness )
Questions ?
Jobayer Almahmud Hossain
RHCSA, RHCE, RHCSS, RHCDS, RHCA-L3
Managing Director & CTO Banglanet Technologies Ltd
Member Secretory IDEB ICT & Innovation Division, IDEB
Facebook ID: https://www.facebook.com/jobayer.RHCA
Facebook Page: https://www.facebook.com/RHCA.JOBAYER

More Related Content

ODP
Cyber security awareness
PPTX
Cyber Security
PPTX
Cyber security government ppt By Vishwadeep Badgujar
PPTX
Cyber Security
PPT
General Awareness On Cyber Security
PPTX
Cyber security
PPTX
Cyber Crime And Security
PPTX
Cyber security awareness
Cyber Security
Cyber security government ppt By Vishwadeep Badgujar
Cyber Security
General Awareness On Cyber Security
Cyber security
Cyber Crime And Security

What's hot (20)

PPTX
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
PDF
Cyber Security Workshop @SPIT- 3rd October 2015
PDF
CyberSecurity - UH IEEE Presentation 2015-04
PPTX
Cyber crime and security
PPTX
Cyber security
PPTX
CYBER SECURITY
PPTX
Cyber Security in Society
PPTX
Cyber security
PPTX
Cyber crime and security
PPTX
Cyber crime and security
PPT
PPTX
Cybersecurity
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPT
Cyber crime and cyber security
PPTX
Cyber attacks and IT security management in 2025
PPTX
Cyber security presentation
PPTX
Cyber security
PPTX
Cyber security presentation
PPTX
Cyber Crime and Cyber Security
PPTX
Cyber security system presentation
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
Cyber Security Workshop @SPIT- 3rd October 2015
CyberSecurity - UH IEEE Presentation 2015-04
Cyber crime and security
Cyber security
CYBER SECURITY
Cyber Security in Society
Cyber security
Cyber crime and security
Cyber crime and security
Cybersecurity
Cybersecurity Attack Vectors: How to Protect Your Organization
Cyber crime and cyber security
Cyber attacks and IT security management in 2025
Cyber security presentation
Cyber security
Cyber security presentation
Cyber Crime and Cyber Security
Cyber security system presentation
Ad

Similar to Click or Not to Click (Cyber Security Awareness ) (20)

PPTX
SIT Summer School (Cyber Security)
PDF
Log Out Cyber Awareness
PPTX
Cyber Security Awareness Program.pptx
PDF
Cyber security awareness presentation nepal
PPTX
An An Exploration Into the Cyber Security
PPT
CyberSecurity.ppt
PPTX
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
PPTX
Cyber Security Awareness Session for Executives and Non-IT professionals
PPTX
Internet and personal privacy
PPT
Cyber security & Importance of Cyber Security
PDF
cybersecurity-180303131014.pdf
PPTX
Introductory lecture on cyber security
PPTX
Computer hacking
PDF
Introduction to information security
PPTX
TheCyberThreatAndYou2_deck.pptx
PPTX
STAY SAFE ONLINE GUIDE TO CYBERSECURITY
PPTX
Cyber security and its controls.pptx
PPTX
Information Security Awareness: at Work, at Home, and For Your Kids
PPTX
Eset cybersecurity awareness (laxman giri)
PPTX
Digital Security in Cyber Law and Mitigating Cyberxrimes
SIT Summer School (Cyber Security)
Log Out Cyber Awareness
Cyber Security Awareness Program.pptx
Cyber security awareness presentation nepal
An An Exploration Into the Cyber Security
CyberSecurity.ppt
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
Cyber Security Awareness Session for Executives and Non-IT professionals
Internet and personal privacy
Cyber security & Importance of Cyber Security
cybersecurity-180303131014.pdf
Introductory lecture on cyber security
Computer hacking
Introduction to information security
TheCyberThreatAndYou2_deck.pptx
STAY SAFE ONLINE GUIDE TO CYBERSECURITY
Cyber security and its controls.pptx
Information Security Awareness: at Work, at Home, and For Your Kids
Eset cybersecurity awareness (laxman giri)
Digital Security in Cyber Law and Mitigating Cyberxrimes
Ad

Recently uploaded (20)

PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PDF
Slides PDF: The World Game (s) Eco Economic Epochs.pdf
PPT
Ethics in Information System - Management Information System
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
Database Information System - Management Information System
PPTX
artificial intelligence overview of it and more
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
Introduction to cybersecurity and digital nettiquette
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PDF
si manuel quezon at mga nagawa sa bansang pilipinas
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PDF
The Evolution of Traditional to New Media .pdf
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
Internet Safety for Seniors presentation
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Slides PDF: The World Game (s) Eco Economic Epochs.pdf
Ethics in Information System - Management Information System
Mathew Digital SEO Checklist Guidlines 2025
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Database Information System - Management Information System
artificial intelligence overview of it and more
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Uptota Investor Deck - Where Africa Meets Blockchain
SASE Traffic Flow - ZTNA Connector-1.pdf
Introduction to cybersecurity and digital nettiquette
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
si manuel quezon at mga nagawa sa bansang pilipinas
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
Layers_of_the_Earth_Grade7.pptx class by
The Evolution of Traditional to New Media .pdf
Power Point - Lesson 3_2.pptx grad school presentation
Internet Safety for Seniors presentation
isotopes_sddsadsaadasdasdasdasdsa1213.ppt

Click or Not to Click (Cyber Security Awareness )

  • 1. Secure Your Social Network Jobayer Almahmud Hossain RHCA-L3 Member Secretory ICT Cell, IDEB Managing Director & CTO Banglanet Technologies Ltd
  • 2. About Me Jobayer Almahmud Hossain RHCSA, RHCE, RHCSS, RHCDS, RHCA-L3 Managing Director & CTO Banglanet Technologies Ltd Member Secretory, IDEB ICT & Innovation Division, IDEB https://www.facebook.com/jobayer.RHCA https://www.facebook.com/RHCA.JOBAYER Started my career with Akij Computer Ltd. (2003-2004) Worked at Akij Online Ltd. (ISP) (2004-2005) Worked at Asia Infosys Ltd. (ISP) (2005-2008) Worked at Grameen Solutions Ltd. (2008-2010) Worked at BRAC (2010-2018) (NGO)
  • 3. Social Media • Virtually connected • Easy to Announce
  • 5. Sometime Happiness goes away When we are in a trouble Because Social Media become our Identity
  • 6. Need to be Careful in Social Media • Identity Theft • Viral (Wrong Information) • Fallen in Cyber Crime • Scams
  • 7. What can I do if I've been phished on Facebook? • What is phishing? – Phishing is when someone tries to get access to your Facebook account by sending you a suspicious message or link that asks for your personal information • I think I've been phished. What can I do? – If you are able to log in to your account, resetting your password • How do I avoid getting phished? – Look out for suspicious emails or messages – Don't click suspicious links – Get alerts
  • 8. Set up two-factor Authentication
  • 9. Setting UP Extra Security
  • 10. Facebook Security Features and Tips • Protect your password • Never share your login information • Log out of Facebook when you use a computer (you can log out remotely). • Never click suspicious links, even if they appear to come from a friend or a company you know • Set get alert about unrecognized login
  • 11. Facebook Security Features and Tips • Avoid Spam and Scams – Romance scams, Lottery scams – Access Token Theft – People claiming to be a friend or relative in an emergency. • Review account activity and remove any spam • Avoided Using Funny Apps
  • 12. Will Facebook ever ask me for my Password? • Facebook will never ask you for your password in an email or Facebook message
  • 13. Ethics of Using Social Media • Careful about Picture • Don’t click the video link found on text • Inform friends if your account generating malware effected text • Keep in mind the content on internet always will not true • Guide your Friends & family how they can stay safe
  • 14. Cyber Law in Bangladesh  Information & Communication and Technology Act 2006 (ICT)  Subsequently, the government amended the Act in 2009 and in 2013  Section 54 to 67 of the ICT Act 2006 illustrate the cybercrimes both civil and criminal matters.
  • 15. Section 57 of the ICT Act 2006
  • 16. Punishment on ICT Act 2013 (Review)
  • 17. Some example of Punishment under 57 of ICT act Two person was found guilty under this act and punished 3 years and fined 10,000 BDT and 7 years for the comment against Honorable Prim minister - 2011 One NGO Leader was arrested for making offensive comments about Muslim hajj on facebook
  • 18. Cyber Security threats is a Global Concern  Now a days Internet become a part of our daily life  We can order food, cloths, or even grocery through Internet  Our Collage or University admission process almost Internet based  Social Media like Facebook creates our own virtual world
  • 19. Top Cyber Security Facts Facts 1 : Cyber crime damage costs to hit $6 trillion annually by 2021. $3 trillion were just a year ago. Facts 2 : Cyber Security spending to exceed $1 trillion from 2017 to 2021.
  • 20. Cyber threats for End Users Spam
  • 21. Cyber threats for End Users Phishing
  • 22. Cyber threats for End Users Spoofing
  • 23. List of Cyber Crimes • Fraud and financial crimes • Cyber terrorism • Cyber extortion • Cyber warfare • Harassment
  • 24. Cyber threats for Servers Brute Force Attack
  • 25. Cyber threats for End Users Botnets A collection of software robots or 'bots'
  • 26. Cyber threats for End Users Ransomware
  • 27. Cyber threats for Data Center or Systems DDoS attack
  • 30. Top Cyber Security Facts The number of vacant Cyber Security jobs, which is predicted to reach 3.5 million by 2021
  • 31. Cyber Security Experts Career Path • 4 Cybersecurity Career Paths (And the Training to Get You There) • Security Architect • Security Consultant • Penetration Tester/Ethical Hacker • Chief Information Security Officer (CISO)
  • 32. How to Start Your Cybersecurity Career • Systems administrator • Database administrator • Web administrator • Web developer • Network administrator • IT technician • Security administrator • Network engineer • Computer software engineer There is no one linear path to a successful career in cybersecurity.
  • 33. Security Architect Career Path • Plan, research and design durable security architectures for various IT projects. • Develop requirements for networks, firewalls, routers and related network devices. • Perform vulnerability testing, security assessments and risk analysis. • Research and implement the latest security standards, systems and best practices.
  • 34. Penetration Tester/Ethical Hacker • Perform penetration tests on web applications, networks and computer systems • Uncover security holes and pinpoint the methods attackers could use to exploit system weaknesses • Design and implement new penetration tools and tests
  • 35. Cyber Security Experts • Certified Ethical Hacker (CEH) – EC-Council • CISSP – (ISC)² Ethical Hacker An Ethical Hacker, also known as a whitehat hacker, is a security professional who applies their hacking skills for defensive purposes.
  • 36. WordPress Security Tips • Don’t Use Nulled Themes • Install a WordPress Security Plugin • Use a Strong Password • Disable File Editing • Install SSL Certificate • Change your WP-login URL • Limit Login Attempts • Hide wp-config.php and .htaccess files • Update your WordPress version
  • 37. Linux Server Security • Turn off root logins to improve Linux server security • Alter the SSH port • Generate an SSH key pair • Deactivate network ports when not in use • Update Software for better Linux Server Security • Linux security – set up a firewall • Use SFTP, not FTP • Backup regularly • Stop anonymous FTP uploads • Use a strong password
  • 38. Secure Your Mobile Phone • Buy smartphones from vendors who release Android patches quickly. – LG, Motorola, HTC, Sony, Xiaomi, OnePlus, and Samsung. • Lock your phone. – PIN remains the safest way – don't use 1-2-3-4, as your PIN • Only use apps from the Google Play Store. • Use device encryption.
  • 40. Questions ? Jobayer Almahmud Hossain RHCSA, RHCE, RHCSS, RHCDS, RHCA-L3 Managing Director & CTO Banglanet Technologies Ltd Member Secretory IDEB ICT & Innovation Division, IDEB Facebook ID: https://www.facebook.com/jobayer.RHCA Facebook Page: https://www.facebook.com/RHCA.JOBAYER

Editor's Notes

  • #21: Spam is one of the more common methods of both sending information out and collecting it from unsuspecting people. The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs.
  • #22: Phishing is used most often by cyber criminals because it's easy to execute and can produce the results they're looking for with very little effort. Fake emails, text messages and websites created to look like they're from authentic companies. They're sent by criminals to steal personal and financial information from you. This is also known as “spoofing”. Trick you into giving them information by asking you to update, validate or confirm your account. It is often presented in a manner than seems official and intimidating, to encourage you to take action. Provides cyber criminals with your username and passwords so that they can access your accounts (your online bank account, shopping accounts, etc.) and steal your credit card numbers.
  • #23: This technique is often used in conjunction with phishing in an attempt to steal your information.  A website or email address that is created to look like it comes from a legitimate source. An email address may even include your own name, or the name of someone you know, making it difficult to discern whether or not the sender is real. Spends spam using your email address, or a variation of your email address, to your contact list. Recreates websites that closely resemble the authentic site. This could be a financial institution or other site that requires login or other personal information.
  • #28: distributed denial-of-service