Information Security and Bangladesh
Name: Umme Habiba
ID: 142-15-3677,Section: B
Abstract
Information is critical to any business and paramount to the survival of
any organization in today’s globalized digital economy. IT professionals
must have core knowledge of information security management and the
governance requirements involved. This report investigates the evolution
of information security; where it came from, where it is today and the
direction in which it is moving. It is argued that information security is
not about looking at the past in anger of an attack once faced; neither is
it about looking at the present in fear of being attacked; nor about
looking at the future with uncertainty about what might befall us. The
message is that organizations and individuals must be alert at all times.
Furthermore, this report also highlights critical information security
issues that are being overlooked or not being addressed by research
efforts currently undertaken. New research efforts are required that
minimize the gap between regulatory issues and technical
implementations.
Keywords
Information security; Information security topics; Goals; Information
security trends; Security implementation approach.
1. Introduction:
Information security has evolved from addressing minor and harmless
security breaches to managing those with a huge impact on
organizations’ economic growth.
Information security: a “well-informed sense of assurance that the
information risks and controls are in balance.” —James Anderson,
Inovant (2002)
IT professionals must have core knowledge of information security
management and the governance requirements involved. The IT industry
is a relatively new sector in the country's economy. Though it is yet to
make tangible contributions in the national economy, it is an important
growth industry. Comparatively, the information security of Bangladesh
is not as much better as others developed country.
2. Information security:
The protection of information and its critical elements, including
systems and hardware that use, store, and transmit that information. The
best offense is a good defense when it comes to our network’s security.
Security testing and assessments provide organizations with the
knowledge, expertise and efficiency needed to conduct thorough security
and risk evaluations of our environment.
Necessary tools: policy, awareness, training, education, technology
Fig.1: Components of Information Security
3. Goals:
A primary goal of information security is to fulfill the above demands
that clarify how reliable our security is! Controlling access to sensitive
information is crucial to the security of any organization. Information
security can be decomposed into three basic categories:
making sure that those who should not see
information.
making sure that the information has not been changed from
its original.
making sure that the information is available for use
when you need it.
These categories are not mutually exclusive as a loss in confidentiality
can often times lead to a loss in integrity and/or availability. Many
different security models have been proposed to help address the
concerns of confidentiality, integrity and availability.
4. Approaches to Information Security Implementation:
A. Bottom-Up Approach:
Grassroots effort: systems administrators attempt to improve security
of their systems
Key advantage: technical expertise of individual administrators
Seldom works, as it lacks a number of critical features:
Participant support
Organizational staying power
B. Top-Down Approach:
Initiated by upper management
Issue policy, procedures and processes
Dictate goals and expected outcomes of project
Determine accountability for each required action
The most successful also involve formal development strategy referred
to as systems development life cycle.
Fig.2: Approaches to Information Security Implementation.
5.Information security trends in Bangladesh:
Located in South Asia, Bangladesh is an Islamic country with a young
and rapidly growing population of 164 million.
According to the BASIS 2012 survey the ICT industry has consistently
grown in recent years at 20 to 30 percent per annum. Over 800
registered ICT companies generated total revenues of approximately
$250 million. More than 75 percent of companies are involved in
customized application development and maintenance, 50 percent are
dedicated to IT enabled services, and 45 percent offer E-commerce/Web
services. The survey also shows that 60 percent of companies solely
focus on the domestic market.
According to this survey, we can say that our ICT industry has grown up
day by day and plays a vital role on our economy. That’s why our
information security system needs to be modified for our future
betterment and improvement.
In February 2012, Bangladesh Declared Cyber War against India on the
Protest of Unjust Border Killings By Indian BSF and Indian Cyber
Warriors and finally Bangladesh defeated India. That means our security
system was not bad but it is not satisfactory at all as several time it’s
bank are hacked by outer country’s hacker.
Capitalizing on weaknesses in the security of the Bangladesh Central
Bank, including the possible involvement of some of its employees,[6]
perpetrators attempted to steal $951 million from the Bangladesh central
bank's account with the Federal Reserve Bank of New York sometime
between February 4–5 in 2016 when Bangladesh Bank's offices were
closed. The perpetrators managed to compromise Bangladesh Bank's
computer network, observe how transfers are done, and gain access to
the bank's credentials for payment transfers. They used these credentials
to authorize about three dozen requests to the Federal Reserve Bank of
New York to transfer funds from the account Bangladesh Bank held
there to accounts in Sri Lanka and the Philippines.
Thirty transactions worth $851 million were flagged by the banking
system for staff review, but five requests were granted; $20 million to
Sri Lanka (later recovered[7][8]), and $81 million lost to the Philippines,
entering the Southeast Asian country's banking system on February 5,
2016. This money was laundered through casinos and some later
transferred to Hong Kong.
In 2013, the Sonali Bank of Bangladesh was also successfully targeted
by hackers who were able to cart away US$250,000. In 2015, two other
hacking attempts were recorded, a $12 million theft from Banco del
Austro in Ecuador in January and an attack on Vietnam's Tien Phong
Bank in December that was not successful. In all these cases, the
perpetrators are suspected to have been aided by insiders within the
targeted banks, who assisted in taking advantage of weaknesses within
the SWIFT global payment network.
Investigation
Initially, Bangladesh Bank was uncertain if its system had been
compromised. The governor of the central bank engaged World
Informatics Cyber Security, a US based firm, to lead the security
incident response, vulnerability assessment and remediation. World
Informatics Cyber Security brought in the leading forensic investigation
company Mandiant, a FireEye company, for the investigation. These
cyber security experts found "footprints" and malware of hackers, which
suggested that the system had been breached. The investigators also said
that the hackers were based outside Bangladesh. An internal
investigation has been launched by Bangladesh Bank regarding the case.
The Bangladesh Bank's forensic investigation found out that malware
was installed within the bank's system sometime in January 2016, and
gathered information on the bank's operational procedures for
international payments and fund transfers.
The investigation also looked into an unsolved 2013 hacking incident at
the Sonali Bank, wherein US$250,000 was stolen by still unidentified
hackers. According to reports, just as in the 2016 Central Bank hack, the
theft also used fraudulent fund transfers using the Swift International
Payment Network. The incident was treated by Bangladeshi police
authorities as a cold-case until the suspiciously similar 2016 Bangladesh
Central Bank heist.
Bangladesh Bank chief governor Atiur Rahman resigned from his post
amid the current investigation of the heist and money laundering. He
submitted his resignation letter to Prime Minister Sheikh Hasina on
March 15, 2016. Before the resignation was made public, Rahman stated
that he would resign for the sake of his country.
6. Conclusion:
Information security is a “well-informed sense of assurance that the
information risks and controls are in balance.” Computer security began
immediately after first mainframes were developed. Successful
organizations have multiple layers of security in place: physical,
personal, operations, communications, network, and information.
Security should be considered a balance between protection and
availability. Information security must be managed similar to any major
system implemented in an organization using a methodology like
SecSDLC.
At last, I want to say that information of any country is as like as
backbone of its. So, it’s security protection need to be a great
concerning and sensitive issue of all country for more secure life.
7. References
[1] https://en.wikipedia.org/wiki/Information_security
[2] https://en.wikipedia.org/wiki/2016_Bangladesh_Bank_heist
[3] http://www.sciencedirect.com/science/article/pii/S016740480
8001168
[4] http://newsinfo.inquirer.net/773842/bangladesh-central-bank-
governor-quits-over-81m-heist
[5] http://www.thedailystar.net/news-detail-120615
[6] http://www.journals.elsevier.com/journal-of-information-security-
and-applications/call-for-papers/special-issue-on-security-and-
dependability-of-internet-of-t
[7]http://www.computerweekly.com/feature/How-to-create-a-good-
information-security-policy
[8]Anderson, J. M. (2003). "Why we need a new definition of
information security".Computers & Security, 22(4), 308–313.
doi:10.1016/S0167-4048(03)00407-3.
[9]Jump up^ Venter, H. S., & Eloff, J. H. P. (2003). "A taxonomy for
information security technologies".Computers & Security, 22(4), 299–
307. doi:10.1016/S0167-4048(03)00406-1.
[10] https://www.youtube.com/watch?v=MsCe1x3zLAU
Informationsecurity

More Related Content

PPTX
Baker Tilly Presents: Emerging Trends in Cybersecurity
PDF
ROLE OF ARTIFICIAL INTELLIGENCE IN COMBATING CYBER THREATS IN BANKING
PDF
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
PDF
Understanding Identity Management and Security.
PDF
IBM Security Services
PDF
Reinforcement of Information Privacy and Security Nowadays
PDF
Safety Mechanism of Cyber Crime in Indian Banking System
PPT
Policies and Law in IT
Baker Tilly Presents: Emerging Trends in Cybersecurity
ROLE OF ARTIFICIAL INTELLIGENCE IN COMBATING CYBER THREATS IN BANKING
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Understanding Identity Management and Security.
IBM Security Services
Reinforcement of Information Privacy and Security Nowadays
Safety Mechanism of Cyber Crime in Indian Banking System
Policies and Law in IT

What's hot (20)

PDF
Why is cyber security a disruption in the digital economy
PDF
CII Whitepaper India Cyber Risk & Resilience Review 2018
DOCX
India and its wall of data security
PDF
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
PPTX
August 2017 - Anatomy of a Cyber Attacker
PPTX
Data security
PDF
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
PPTX
September 2019 part 9
PDF
Cyber fraud in banks
PPTX
What is data privacy?
PDF
Paper id 35201568
PDF
Cyber Security work shop by Kapil Mehrotra
PPTX
Cyber crime and laws
PDF
Dealing with Data Breaches Amidst Changes In Technology
PDF
The International Journal of Engineering and Science (The IJES)
PDF
Sept 2012 data security & cyber liability
PPTX
Internet is a threat in financial secotr
PDF
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
PPTX
Cyber Fraud - The New Frontiers
PPTX
June 2017 - Your Biggest Risk Could Be You
Why is cyber security a disruption in the digital economy
CII Whitepaper India Cyber Risk & Resilience Review 2018
India and its wall of data security
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
August 2017 - Anatomy of a Cyber Attacker
Data security
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
September 2019 part 9
Cyber fraud in banks
What is data privacy?
Paper id 35201568
Cyber Security work shop by Kapil Mehrotra
Cyber crime and laws
Dealing with Data Breaches Amidst Changes In Technology
The International Journal of Engineering and Science (The IJES)
Sept 2012 data security & cyber liability
Internet is a threat in financial secotr
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
Cyber Fraud - The New Frontiers
June 2017 - Your Biggest Risk Could Be You
Ad

Viewers also liked (15)

PDF
62 how to track someone elses line messages
PPTX
The forest around the planet
PPTX
без инт
PDF
how to spy on husbands line messages
PDF
بروشور معرفی مرکز دولتی صدور گواهی الکترونیکی ریشه
PDF
how to hack LINE chat of others
PPTX
Who Would Be The Audience For Your Media Product?
PDF
how to track husband's line messages
PDF
how to spy on LINE from pc
PDF
اصالت‌سنجی اسناد الکترونیکی (راهکار جلوگیری از جعل اسناد الکترونیکی)
PDF
معرفی مرکز دولتی صدور گواهی الکترونیکی ریشه
PDF
how to track line messages
PDF
how to monitor line messages android
PPTX
The forest around the planet
PDF
how to track someones line conversations
62 how to track someone elses line messages
The forest around the planet
без инт
how to spy on husbands line messages
بروشور معرفی مرکز دولتی صدور گواهی الکترونیکی ریشه
how to hack LINE chat of others
Who Would Be The Audience For Your Media Product?
how to track husband's line messages
how to spy on LINE from pc
اصالت‌سنجی اسناد الکترونیکی (راهکار جلوگیری از جعل اسناد الکترونیکی)
معرفی مرکز دولتی صدور گواهی الکترونیکی ریشه
how to track line messages
how to monitor line messages android
The forest around the planet
how to track someones line conversations
Ad

Similar to Informationsecurity (20)

PPT
Cyber crime
PDF
Managing Information Assurance in Financial Services 1 edition Edition H. R. Rao
PDF
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
PPTX
Swift-cyber-attacks.pptx
PDF
Managing Information Assurance In Financial Services 1 Edition H R Rao
PPTX
IS Chap 1 by whitman chapter 1 pptx.pptx
PPTX
Information security Chap 1 whitman.pptx
DOCX
Best Cyber Security Courses In Bangladesh.docx
PDF
Is security model by dawit mekonnen
PDF
Application of Soft Systems Methodology (SSM) to develop Information Systems ...
PPTX
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
PDF
Unit 1&2.pdf
PPTX
Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
PDF
The significance of the 7 Colors of Information Security
PDF
Managing Information Assurance in Financial Services 1 edition Edition H. R. Rao
PPT
Security Manager - Slides - Module 1 Powerpoint Presentation
PPT
Security Manager - Slides - Module 1 Powerpoint Presentation
DOCX
The financial sector under siege from vicious banking malware @ReveeliumBlog
PPTX
Introduction to Ethical Hacking
Cyber crime
Managing Information Assurance in Financial Services 1 edition Edition H. R. Rao
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
Swift-cyber-attacks.pptx
Managing Information Assurance In Financial Services 1 Edition H R Rao
IS Chap 1 by whitman chapter 1 pptx.pptx
Information security Chap 1 whitman.pptx
Best Cyber Security Courses In Bangladesh.docx
Is security model by dawit mekonnen
Application of Soft Systems Methodology (SSM) to develop Information Systems ...
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
Unit 1&2.pdf
Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...
Accounting Information Systems 11th Edition Bodnar Solutions Manual
The significance of the 7 Colors of Information Security
Managing Information Assurance in Financial Services 1 edition Edition H. R. Rao
Security Manager - Slides - Module 1 Powerpoint Presentation
Security Manager - Slides - Module 1 Powerpoint Presentation
The financial sector under siege from vicious banking malware @ReveeliumBlog
Introduction to Ethical Hacking

More from Umme habiba (20)

DOCX
Compiler lab final report writing
PPTX
online bus ticket booking system
PPTX
online bus ticket booking system
PPTX
online bus ticket booking system
PPT
Accounting adjusting
DOCX
Economic.assignment
DOCX
Major economic problems of bangladesh
PPT
Overview of various types of operating system
DOCX
Os lab report(shell coding)
PPTX
Ecommerce(online Shopping)
DOCX
Different types of Addressing.cao
PPTX
2nd generation of computer
DOCX
Art_of_living assignment
PPTX
Art_of_living
PPT
SQL Joinning.Database
PPTX
WLAN of networking.ppt
PPTX
simpson's in numerical method
PPTX
Error detection in Data comunication
PPTX
microsoft word & powerpoint
PPTX
Upmovie review (1)
Compiler lab final report writing
online bus ticket booking system
online bus ticket booking system
online bus ticket booking system
Accounting adjusting
Economic.assignment
Major economic problems of bangladesh
Overview of various types of operating system
Os lab report(shell coding)
Ecommerce(online Shopping)
Different types of Addressing.cao
2nd generation of computer
Art_of_living assignment
Art_of_living
SQL Joinning.Database
WLAN of networking.ppt
simpson's in numerical method
Error detection in Data comunication
microsoft word & powerpoint
Upmovie review (1)

Recently uploaded (20)

PDF
ASPEN PLUS USER GUIDE - PROCESS SIMULATIONS
PDF
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
PPTX
Module1.pptxrjkeieuekwkwoowkemehehehrjrjrj
PDF
Using Technology to Foster Innovative Teaching Practices (www.kiu.ac.ug)
PPTX
Wireless sensor networks (WSN) SRM unit 2
PDF
Artificial Intelligence_ Basics .Artificial Intelligence_ Basics .
PDF
Principles of operation, construction, theory, advantages and disadvantages, ...
PPTX
SE unit 1.pptx by d.y.p.akurdi aaaaaaaaaaaa
PPTX
Design ,Art Across Digital Realities and eXtended Reality
PDF
IAE-V2500 Engine Airbus Family A319/320
PDF
Research on ultrasonic sensor for TTU.pdf
PPT
Programmable Logic Controller PLC and Industrial Automation
PPTX
SE unit 1.pptx aaahshdhajdviwhsiehebeiwheiebeiev
PDF
Cryptography and Network Security-Module-I.pdf
PPTX
DATA STRCUTURE LABORATORY -BCSL305(PRG1)
PDF
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
PPTX
BBOC407 BIOLOGY FOR ENGINEERS (CS) - MODULE 1 PART 1.pptx
PDF
Mechanics of materials week 2 rajeshwari
PPTX
ARCHITECTURE AND PROGRAMMING OF EMBEDDED SYSTEMS
PPTX
Environmental studies, Moudle 3-Environmental Pollution.pptx
ASPEN PLUS USER GUIDE - PROCESS SIMULATIONS
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
Module1.pptxrjkeieuekwkwoowkemehehehrjrjrj
Using Technology to Foster Innovative Teaching Practices (www.kiu.ac.ug)
Wireless sensor networks (WSN) SRM unit 2
Artificial Intelligence_ Basics .Artificial Intelligence_ Basics .
Principles of operation, construction, theory, advantages and disadvantages, ...
SE unit 1.pptx by d.y.p.akurdi aaaaaaaaaaaa
Design ,Art Across Digital Realities and eXtended Reality
IAE-V2500 Engine Airbus Family A319/320
Research on ultrasonic sensor for TTU.pdf
Programmable Logic Controller PLC and Industrial Automation
SE unit 1.pptx aaahshdhajdviwhsiehebeiwheiebeiev
Cryptography and Network Security-Module-I.pdf
DATA STRCUTURE LABORATORY -BCSL305(PRG1)
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
BBOC407 BIOLOGY FOR ENGINEERS (CS) - MODULE 1 PART 1.pptx
Mechanics of materials week 2 rajeshwari
ARCHITECTURE AND PROGRAMMING OF EMBEDDED SYSTEMS
Environmental studies, Moudle 3-Environmental Pollution.pptx

Informationsecurity

  • 1. Information Security and Bangladesh Name: Umme Habiba ID: 142-15-3677,Section: B Abstract Information is critical to any business and paramount to the survival of any organization in today’s globalized digital economy. IT professionals must have core knowledge of information security management and the governance requirements involved. This report investigates the evolution of information security; where it came from, where it is today and the direction in which it is moving. It is argued that information security is not about looking at the past in anger of an attack once faced; neither is it about looking at the present in fear of being attacked; nor about looking at the future with uncertainty about what might befall us. The message is that organizations and individuals must be alert at all times. Furthermore, this report also highlights critical information security issues that are being overlooked or not being addressed by research efforts currently undertaken. New research efforts are required that minimize the gap between regulatory issues and technical implementations. Keywords Information security; Information security topics; Goals; Information security trends; Security implementation approach.
  • 2. 1. Introduction: Information security has evolved from addressing minor and harmless security breaches to managing those with a huge impact on organizations’ economic growth. Information security: a “well-informed sense of assurance that the information risks and controls are in balance.” —James Anderson, Inovant (2002) IT professionals must have core knowledge of information security management and the governance requirements involved. The IT industry is a relatively new sector in the country's economy. Though it is yet to make tangible contributions in the national economy, it is an important growth industry. Comparatively, the information security of Bangladesh is not as much better as others developed country. 2. Information security: The protection of information and its critical elements, including systems and hardware that use, store, and transmit that information. The best offense is a good defense when it comes to our network’s security. Security testing and assessments provide organizations with the knowledge, expertise and efficiency needed to conduct thorough security and risk evaluations of our environment. Necessary tools: policy, awareness, training, education, technology
  • 3. Fig.1: Components of Information Security 3. Goals: A primary goal of information security is to fulfill the above demands that clarify how reliable our security is! Controlling access to sensitive information is crucial to the security of any organization. Information security can be decomposed into three basic categories: making sure that those who should not see information. making sure that the information has not been changed from its original.
  • 4. making sure that the information is available for use when you need it. These categories are not mutually exclusive as a loss in confidentiality can often times lead to a loss in integrity and/or availability. Many different security models have been proposed to help address the concerns of confidentiality, integrity and availability. 4. Approaches to Information Security Implementation: A. Bottom-Up Approach: Grassroots effort: systems administrators attempt to improve security of their systems Key advantage: technical expertise of individual administrators Seldom works, as it lacks a number of critical features: Participant support Organizational staying power B. Top-Down Approach: Initiated by upper management Issue policy, procedures and processes Dictate goals and expected outcomes of project Determine accountability for each required action The most successful also involve formal development strategy referred to as systems development life cycle.
  • 5. Fig.2: Approaches to Information Security Implementation. 5.Information security trends in Bangladesh: Located in South Asia, Bangladesh is an Islamic country with a young and rapidly growing population of 164 million. According to the BASIS 2012 survey the ICT industry has consistently grown in recent years at 20 to 30 percent per annum. Over 800 registered ICT companies generated total revenues of approximately $250 million. More than 75 percent of companies are involved in customized application development and maintenance, 50 percent are dedicated to IT enabled services, and 45 percent offer E-commerce/Web services. The survey also shows that 60 percent of companies solely focus on the domestic market.
  • 6. According to this survey, we can say that our ICT industry has grown up day by day and plays a vital role on our economy. That’s why our information security system needs to be modified for our future betterment and improvement. In February 2012, Bangladesh Declared Cyber War against India on the Protest of Unjust Border Killings By Indian BSF and Indian Cyber Warriors and finally Bangladesh defeated India. That means our security system was not bad but it is not satisfactory at all as several time it’s bank are hacked by outer country’s hacker. Capitalizing on weaknesses in the security of the Bangladesh Central Bank, including the possible involvement of some of its employees,[6] perpetrators attempted to steal $951 million from the Bangladesh central bank's account with the Federal Reserve Bank of New York sometime between February 4–5 in 2016 when Bangladesh Bank's offices were closed. The perpetrators managed to compromise Bangladesh Bank's computer network, observe how transfers are done, and gain access to the bank's credentials for payment transfers. They used these credentials to authorize about three dozen requests to the Federal Reserve Bank of New York to transfer funds from the account Bangladesh Bank held there to accounts in Sri Lanka and the Philippines. Thirty transactions worth $851 million were flagged by the banking system for staff review, but five requests were granted; $20 million to Sri Lanka (later recovered[7][8]), and $81 million lost to the Philippines, entering the Southeast Asian country's banking system on February 5, 2016. This money was laundered through casinos and some later transferred to Hong Kong. In 2013, the Sonali Bank of Bangladesh was also successfully targeted by hackers who were able to cart away US$250,000. In 2015, two other
  • 7. hacking attempts were recorded, a $12 million theft from Banco del Austro in Ecuador in January and an attack on Vietnam's Tien Phong Bank in December that was not successful. In all these cases, the perpetrators are suspected to have been aided by insiders within the targeted banks, who assisted in taking advantage of weaknesses within the SWIFT global payment network. Investigation Initially, Bangladesh Bank was uncertain if its system had been compromised. The governor of the central bank engaged World Informatics Cyber Security, a US based firm, to lead the security incident response, vulnerability assessment and remediation. World Informatics Cyber Security brought in the leading forensic investigation company Mandiant, a FireEye company, for the investigation. These cyber security experts found "footprints" and malware of hackers, which suggested that the system had been breached. The investigators also said that the hackers were based outside Bangladesh. An internal investigation has been launched by Bangladesh Bank regarding the case. The Bangladesh Bank's forensic investigation found out that malware was installed within the bank's system sometime in January 2016, and gathered information on the bank's operational procedures for international payments and fund transfers. The investigation also looked into an unsolved 2013 hacking incident at the Sonali Bank, wherein US$250,000 was stolen by still unidentified hackers. According to reports, just as in the 2016 Central Bank hack, the
  • 8. theft also used fraudulent fund transfers using the Swift International Payment Network. The incident was treated by Bangladeshi police authorities as a cold-case until the suspiciously similar 2016 Bangladesh Central Bank heist. Bangladesh Bank chief governor Atiur Rahman resigned from his post amid the current investigation of the heist and money laundering. He submitted his resignation letter to Prime Minister Sheikh Hasina on March 15, 2016. Before the resignation was made public, Rahman stated that he would resign for the sake of his country. 6. Conclusion: Information security is a “well-informed sense of assurance that the information risks and controls are in balance.” Computer security began immediately after first mainframes were developed. Successful organizations have multiple layers of security in place: physical, personal, operations, communications, network, and information. Security should be considered a balance between protection and availability. Information security must be managed similar to any major system implemented in an organization using a methodology like SecSDLC. At last, I want to say that information of any country is as like as backbone of its. So, it’s security protection need to be a great concerning and sensitive issue of all country for more secure life. 7. References [1] https://en.wikipedia.org/wiki/Information_security
  • 9. [2] https://en.wikipedia.org/wiki/2016_Bangladesh_Bank_heist [3] http://www.sciencedirect.com/science/article/pii/S016740480 8001168 [4] http://newsinfo.inquirer.net/773842/bangladesh-central-bank- governor-quits-over-81m-heist [5] http://www.thedailystar.net/news-detail-120615 [6] http://www.journals.elsevier.com/journal-of-information-security- and-applications/call-for-papers/special-issue-on-security-and- dependability-of-internet-of-t [7]http://www.computerweekly.com/feature/How-to-create-a-good- information-security-policy [8]Anderson, J. M. (2003). "Why we need a new definition of information security".Computers & Security, 22(4), 308–313. doi:10.1016/S0167-4048(03)00407-3. [9]Jump up^ Venter, H. S., & Eloff, J. H. P. (2003). "A taxonomy for information security technologies".Computers & Security, 22(4), 299– 307. doi:10.1016/S0167-4048(03)00406-1. [10] https://www.youtube.com/watch?v=MsCe1x3zLAU