Sunteți pe pagina 1din 4

2017 IEEE Region 10 Humanitarian Technology Conference (R10-HTC)

21 - 23 Dec 2017, Dhaka, Bangladesh

Cybersecurity Awareness Survey:


An Analysis from Bangladesh Perspective

Nadeem Ahmed, Umme Kulsum, M. Ershadul Haque Mohammad Shahriar Rahman


Md. Imran Bin Azad, A S Zaforullah Department of Statistics, University of Department of Computer Science and
Momtaz Dhaka, Dhaka-1000, Bangladesh Engineering, University of Liberal
Department of Computer Science and ershad_sbi@du.ac.bd Arts Bangladesh, Dhaka-1209,
Engineering, University of Asia Pacific, Bangladesh
Dhaka-1215, Bangladesh shahriar.rahman@ulab.edu.bd
{nadeem11, uktumpa}@gmail.com
{imranbinazad, zaforullah}@uap-bd.edu

Abstract— In modern era digital devices are the part and measure. There are several sources for calculating the cost.
parcel in everyday life. Easy access to internet across the globe Statistical data are originated by the government, business,
has totally changed the pattern of life. Web has become the main industry and IT security firms regarding the present state of
source of acquiring knowledge and information. Email is cybersecurity threats in the U.S. and globally. G20 nations
replacing the postal mail system. Use of computer is a mandatory affected by the major losses. The first four biggest economies
from primary education sector to government level enterprise. [3] in the world (the US, China, Japan, and Germany) had loss
Facebook, twitter, whatsapp, viber are becoming main way to $200 billion from cybercrime. Underprivileged nations have
social communication. All these developments made life of people faced meager losses, however this will grow up very quickly
easier and comfortable but at the same time crimes associated
as these countries are increasing internet and mobile platform
with technologies have also emerged especially in a developing
country like Bangladesh. Cybercrime has become a vital issue.
usages. Cybercrime is seriously impacting on employment
This study conveys an in-depth survey about the awareness of especially for the developed countries. The effect is to shift
cybercrime amongst the people of Bangladesh. Both online and employment away from jobs that create the most value. The
offline version of the survey were created to conduct this study. report presented that more than 200,000 jobs were vanished in
The study finds that there is a patchy awareness level and it is not the U.S. due to cybercrime. It was also estimated that
satisfactory. The general people are unaware of standard European Union had loss as many as 150,000 jobs from
practices for cybersecurity. The government and respective cybercrime [4].
organizations is not vibrant regarding cybercrime related issues.
In Bangladesh the rate of internet user is increasing
A proper guideline is required. Also it needs to be updated on
timely manner. Additionally, Pearson's Chi-squared test was
rapidly. Bangladesh Telecommunication Regulatory
conducted for in-depth analysis. Finally, it can be said that there Commission (BTRC) announced that internet subscribers have
exists an urgency to implement a prototype for cybersecurity to reached 67.245 million in February, 2017 [5]. Cybercrimes are
combat with cyber threats. gradually increasing in the country but Bangladesh has no
mechanism yet to combat this thing. The Mahmudur Rahman
Keywords—Cybercrime, Cybersecurity, Communication case was one of the leading cases in terms of cybercrimes in
Technologies, Awareness, Internet, Threats, Survey, Bangladesh; Bangladesh and may be referred as the first cybercrime case in
Bangladesh. Charges were brought against M. Rahman under
I. INTRODUCTION sections 57 and 58 of Cyber Crime and ICT Act -2006. On
February 15, 2012, „Black Hat Hackers‟, a alleged hackers‟
With the extensive use of Information Technology (IT) group in Bangladesh hacked more than 25000 Indian sites
and internet technologies the world has become real-time including crucial websites such as the Border Security Forces
borderless. The earth has turn out to be to a global village. In (BSF). Propaganda activities are also considered as
parallel computer network crimes have emerged which is cybercrimes in some instances. Propaganda is biased and
known as cybercrime [1]. Constantly changing technology has misleading information that is used to publicize or promote a
put the traditional security models in under pressure. particular ideology or political cause. It creates agitation and
According to a report based on findings on nearly 300,000 panic among the public. For example, 2012 Ramu Violence in
complaints announced by the Federal Bureau of Cox‟s Bazar can be mentioned. Someone with a fake account
investigation‟s Internet Crime Compliant Center (IC3) gave a picture of desecration of the Sacred Quran on facebook
claimed that U.S. lost over $1.3 billion in 2016 from page. The fake account was under a Buddhist male name. This
cybercrime which is 24% higher than previous year. The post agitated the common Muslim people of that area and
common victims were senior citizens over 60 years old and they, without verifying the authenticity of the facebook
generally unaware of cybercrimes [2]. account, attacked innocent Buddhist dwellers of that area.
In 2014 the global economy annual cost was estimated Many Buddhist temples, monasteries and households were
$400 billion while the maximum could be as much as $575 destroyed [6]. One of the biggest cybercrimes in Bangladesh
billion. To measure the loss from cybercrime is not easy to was occurred in February 2016. This incident is known as

978-1-5386-2175-2/17/$31.00 ©2017 IEEE

788
2017 IEEE Region 10 Humanitarian Technology Conference (R10-HTC)
21 - 23 Dec 2017, Dhaka, Bangladesh

Bangladesh Bank robbery (Bangladesh Bank heist) where cybercrime incident which reflects how the users are aware
hackers used Dridex malware. Hackers tried to withdraw about the present rules for cybercrime reporting.
US$951 million from Bangladesh Bank but partially
succeeded. These culprits issued five transactions (each worth B. Selection of Respondents
of $101 million) and withdrawn from a Bangladesh Bank The questionnaire was distributed amongst the people of
account at the Federal Reserve Bank of New York. Later $20 different sectors. Help from individuals and social networking
million was discovered in Sri Lanka and restored and $81 platforms were taken to reach the audience. A nonprobability
million in the Philippines where only about $18 million Snowball sampling technique (also known as chain sampling,
restored. The New York Fed blocked the rest of the thirty chain-referral sampling, referral sampling) was also used to
transactions ($850 million) as per request of Bangladesh Bank reach the audiences. Audiences were cordially requested to
[7-9]. It is obvious that cybercrime is growing up and if not circulate the survey (printed copy/web-link) to their family
controlled it might be the cause of greater harm in near future. members, friends and colleagues. In this way, the Snowball
To control the cybercrime, cybersecurity awareness is sampling technique was acquired to increase the study
mandatory amongst the users. Moreover, different participants. A total of 802 questionnaires (644 online and 158
cybersecurity awareness programs are widely conducted in the offline versions) were collected and analyzed to find out
developed countries. This study conducts a survey about
results. The survey was targeted to the audiences who are at
cybersecurity awareness amongst the users in Bangladesh.
least 18 years old and have minimal schooling education with
This study reflects the awareness level of the users and the
programs that can be taken to improve the awareness. computer literacy as this research was targeted on the level of
cybersecurity awareness among users.
II. METHODOLOGY
III. CYBERSECURITY ANALYSIS AND FINDINGS
This research strategy is based on survey questions named
as “Security, awareness and incident reporting – A Survey of This survey was mainly divided into four sections, analysis
Users knowledge, Attitudes and prevention” to explore and and findings were also kept into four different sections as well.
find out the cybersecurity awareness level among the people All the floating data were approximated to the closest number.
of Bangladesh. All answers are treated confidentially and Afterward correlation studies had been conducted between
respondents were anonymous during the collection, storage different sections for in-depth investigation.
and publication of research material. A. Analysis of Participants Demographics
A. Settings of the Survey and Tools Out of 802 surveys male participants are the majority 67%
In this research, a questionnaire [10] was used as a method with compared to female participants 33% which is expected.
for gathering data to get the results for users‟ awareness level. According to World Bank report [11] male working force is
This survey was created on online and stored on a secure 64% whereas female working force is 36%. Thus male
database for data collection and analysis. But both online (web participants are more accessible than female participants. Also
URL) and offline (printed) version were distributed to the studies by Grameenphone, in collaboration with Brac [12]
users for data collection. Later offline (printed) version data found that male and young generations dominate the internet
were uploaded on online by the authors for analysis. An usage. This study also reflected the above findings. Out of 802
enormously useful data analysis package SPSS was used in participants age-group 18-29 is the majority 49%. The rest of
analysis plans and to produce results in this study. The the participants are in the age-groups: 30-39 (36%), 40-49
descriptive statistics were computed which includes (12%) and 50+ (3%). The participants of this survey are well-
frequencies and percentage. Each of the section used in the educated. 54% had either been pursuing Bachelor or Diploma
questionnaire contains two or more questions and Degree and 45% had higher Degree (Master‟s or PhD). People
consequently a data reduction technique (factor analysis) from versatile professions had participated in this survey. The
employed for each of the section to produce a single factor major participants groups are undergraduate students 30%.
score (continuous score with zero mean and unite variance). This younger generation was willing to participate in the
These score for cybersecurity practices, cyber awareness, survey and easy to access. The rest of the populations (per
experienced cybercrime, concerned about cybercrime and sector population<10%) are from different sectors like
responsible bodies are such that higher values indicate more Engineering, Education, Business Management, Lawyer,
activities. Finally Chi-square test for association among the Communication and Journalism, Architecture, Biological and
cybercrime activities were employed. Biomedical Science, Computer Sciences, Legal, Liberal Arts
and Humanities, Medical and Health Professions, Agriculture,
The survey is divided into four sections as A. Participant Physical Science, Visual and Performing Art. This study was
Demographics (9 inquiries) B. Cybersecurity Practices (6 tried to reach every possible sector which increased the
inquiries) C. Cybercrime Awareness (7 inquiries) and D. reliability by providing true outcome. Usage of internet and
Incident Reporting (2 inquiries). The section A asked about related services (E.g. email, whatsapp, viber, news, youtube,
the basic demographics and internet usage policy of the users. facebook, tweeter) is quite impressive. 73% participants are
The section B asked the users about the usages of software, using it on frequent basis throughout the day. 23% participants
devices, antivirus and general security practices. The section C use it once or twice in a day. The rest of participants are
asked about users‟ thinking and opinions which reflected infrequent users, use internet in weekly or monthly basis.
awareness level about cybercrime. The section D asked the Approximately half of the participants (48%) feel that they
users about their reaction and taken measures when they faced have Intermediate technology skill (e.g. able to install and run

789
2017 IEEE Region 10 Humanitarian Technology Conference (R10-HTC)
21 - 23 Dec 2017, Dhaka, Bangladesh

special software, make modifications to the settings of the C. Analysis on Cybercrime Awareness
computer, have a good understanding of hardware and People are informed and updated about cybercrime by both
software). 38% participants feel that they are novice users offline and online sources. Online sources are from internet
(e.g. start computer and phone, go to specified web page. Use (63%), electronic media (57%), ISPs (27%), government
Word. Use social media). 13.7% participants think that they (33%). Offline sources include Newspapers and magazines
have expertise in computer engineering, database (72%), conferences and meetings (41%). 7% participants feel
administration, network engineering. The people use mostly that there is no need to keep them updated about cybercrime.
smart phone (69%), laptop (56%), desktop computer (36%)
and tablet (15%) to access internet either in combined manner The participants have different opinions about cyber
or solely. In case of internet connectivity, 63% use Private Wi- awareness. The mainstream respondents (91%) acknowledge
Fi (e.g. in home), 48% use Mobile/cellular phone network that people must not disclose private information on the
(e.g. 3G/4G), 42% use Public Wi-Fi (e.g. in coffee shop, internet. Also there is a strong feeling of the participants
restaurant), 28% use Broadband (wired) connection. The (83%) that risk of cybercrime is increasing from the previous
common purposes of using internet are Education or years. (37%) participants feel that online personal information
information seeking (69%), Social networking (61%), is not secure enough. (83%) Participants agreed to accept
Communicating with email, skype, viber and others (52%), increased Internet surveillance from the government if it can
Entertaining e.g. playing games (51%), Professional reasons enhance Internet security. 65% participants feel that laws in
such as remote access VPNs (39%), Government services, effect are effective in managing the cybercrime problem. This
online banking, e-commerce, and others (22%). Above results is a primary matter and crucial discovery that should be put in
support the outcomes in [13,14] and which indicate that consider in instigating stakeholders to enhance security
findings are both valid and reliable. awareness in Bangladesh.
B. Analysis of Cybersecurity Practices 77% participants have experienced and fallen victim of
Participants varied in Cybersecurity Practices. Most of phishing emails (such as asking for money/personal
the people of Bangladesh rely on Windows Operating System information/bank account credentials). 71% participants
(OS) and run different version of OS at the same time. It is experienced identity theft (stealing and impersonating in
found that 47% people use Windows 10, 42% people use facebook/tweet accounts). 80% participants are infected by
Windows 8 and 48% people use Windows 7. Few people, 19% malware. 78% participants encountered hatred and religious
people use old version of Windows OS (XP) and 22% people extremism materials. 62% participants are encountered online
use free-open-source OS Linux. For mobile phone people extortion (a demand for money to avert or stop extortion or to
mostly use Android phone 80%, also a significant number was avert scandal by spreading video/audio files, harassment).
found for iOS as well as some other varieties. People use 79% participant are both concerned and worried about
mostly free antivirus which is a major security flaw. Also accidentally encountering material that promotes hatred,
people use paid antivirus, firewall, authentication, encryption identity theft, pornography, security about internet banking,
and others. In terms of cybersecurity practices, there are some religious extremism, human rights violation, privacy
good security practices. 61% people always aware, 29% infringement via online activities.
people are sometimes aware and 10% people are never aware
about the legitimacy of a website. 74% people are always Most of the participants (over 50%) strongly believe that
aware, 21% people are sometimes aware and 4% people are the government, media and education system are main
never aware about the danger when clicking on banners, responsible bodies to create cyber awareness program.
advertisements or pop-up screens that appear when surfing the Participants further believe that user himself is also
Internet. 76% people are always also very conscious about the responsible for cyber awareness. Participants have
privacy settings on social media while 21% people are expectations from the government. 60% participants expect
somewhat and 4% people are never conscious. There are some that government should impose stricter laws and punishments
bad practices are followed by the people. 69% people are for cybercrimes. 49% participants wanted the government to
always, 16% people are sometimes and 14% people are never work towards providing a global cybersecurity framework.
use personal information (e.g. last name, date of birth) for 38% participants also prefer that the government should create
passwords. 59% people are always, 29% people are sometimes monitor organizations for combating with misuse of consumer
and 11% people are never use USB devices/pendrives in information.
multiple devices. The result indicates that there is an D. Analysis on Incident Reporting
immediate need to create awareness program to increase good
cybersecurity practices. Around 40% of participants have been sufferer of cybercrime
from whom around 60% have reported. Participants mostly
reported to the police stations (around 80%). The rest of files
had been reported to the BDCERT (Bangladesh Computer
Emergency Response Team), BTRC (Bangladesh
Telecommunication Regulatory Commission) complaint
centre, BGD e-GOV CIRT. There are multiple reasons behind
the unreported reports (around 40%). The reasons include
participants did not know what the crime was (46%),
Fig. 1. Participants‟ opinion about future of cyber threat participants did not know who to write report (44%),

790
2017 IEEE Region 10 Humanitarian Technology Conference (R10-HTC)
21 - 23 Dec 2017, Dhaka, Bangladesh

participants were afraid of impact afterwards (27%), [2] Internet Crime Report: [Online]. [Cited 2016 April 12]. Available from:
https://www.scmagazine.com/loss-from-cybercrime-exceeded-13b-in-
participants did not know how to describe or write reports 2016-fbi-report/article/671047/.
(32%), participants feel it is waste of time (32%), I think that [3] Largest Economy: [Online]. [Cited 2016 April 20]. Available from:
there is no value of reporting (32%), participants did not trust https://www.weforum.org/agenda/2017/03/worlds-biggest-economies-
the third party (17%), participants independently fixed the in-2017/.
problem without outsiders‟ interference (25%). From the study [4] Global Cost of Cybercrime: [Online]. [Cited 2016 May 29]. Available
findings it can be realized that comparatively low number of from: https://www.mcafee.com/ca/resources/reports/rp-economic-
impact-cybercrime2.pdf.
participants have faced cybercrime yet those who suffered
[5] Bangladesh Internet Subscriber: [Online]. [Cited 2016 June 04].
very few reported about the incidents. This indicates lack of Available from: http://www.btrc.gov.bd/content/internet-subscribers-
awareness, familiarity about these organizations and complaint bangladesh-february-2017.
centers among the mass people and there are problems in the [6] CBC news: [Online]. [Cited 2016 June 08]. Available from:
incident reporting process which indicates proper initiatives http://www.cbc.ca/news/world/bangladeshi-buddhists-attacked-over-
are required by responsible organizations to create awareness. photo-of-burned-qur-an-1.1223650.
[7] Inquirer Net Report: [Online]. [Cited 2016 August 14]. Available from:
E. Analysis on Correlation Studies http://newsinfo.inquirer.net/807690/ex-rcbc-branch-manager-free-on-
bail.
The analysis of the coefficient of the correlation reveals
[8] New York Post Report: [Online]. [Cited 2016 August 14]. Available
that there exists positive correlation between all the from: http://nypost.com/2016/03/22/congresswoman-wants-probe-of-
cybersecurity practice activities. The degree of correlation is brazen-81m-theft-from-new-york-fed/.
high between cyber awareness with concern followed by [9] The Straits Times Report: [Online]. [Cited 2016 August 14]. Available
experienced cybercrime with concern and so on. It indicates from: http://www.straitstimes.com/business/dridex-malware-linked-to-
people with the cyber awareness are more concerned and bangladesh-heist.
worried about ongoing cyber threat. The association indicates [10] F. Alotaibi, S. Furelli, I. Stengeli and M. Papadakii, "A Survey of
people who already suffered from cybercrime have higher Cyber-Security Awareness in Saudi Arabia", The 11th International
Conference for Internet Technology and Secured Transactions (ICITST-
degree of concern and worriedness. 2016), 2016.
TABLE I. Correlation coefficient between cyber related activities [11] Women workforce: [Cited 2016 August 20]. Available from:
http://www.thedailystar.net/frontpage/women-workforce-growing-fast-
155149.
[12] Daily Star Report: [Cited 2016 August 22]. Available from:
http://www.thedailystar.net/business/students-drive-mobile-data-growth-
gp-study-179512.
[13] Alexa Report: [Cited 2016 October 25]. Available from:
https://www.alexa.com/topsites/countries/BD.
[14] Daily Star Report: [Cited 2016 October 25]. Available from:
http://www.pewinternet.org/2015/10/29/technology-device-ownership-
2015/.
Thus this study provided separate finding for each
combination which proves study findings are relevant and
reliable. Also Chi-Square test has given significant value
which also shows that survey respondents filled up the data
with care and time.
IV. CONCLUSION AND FUTURE WORK
Based on the survey results, this is obvious that measures
should be taken to escalate the cyber awareness level amongst
people of Bangladesh. If Bangladesh fails to combat with
cybercrime the goal and purpose of „Digital Bangladesh‟ will
also fail. Therefore, People‟s Republic of Bangladesh with the
help of all responsible bodies should take proper measures to
create effective cyber awareness amongst users. Therefore,
future research might consider developing a concrete model of
cyber awareness coupled with mobile technologies in this
country and analyze its usability, dynamicity, efficiency,
affordability and reliability.
V. REFERENCES
[1] H. Elkhannoubi and M. Belaissaoui, " Assess developing countries‟
cybersecurity capabilities through a Social Influence Strategy," 7th
International Conference on Sciences of Electronics, Technologies of
Information and Telecommunications (SETIT), 2016.

791

S-ar putea să vă placă și