The National Cybersecurity Strategy of Bangladesh

This National Cybersecurity Strategy outlines a framework for organizing and prioritizing efforts to manage risks to our cyberspace or critical information infrastructure. To achieve the aforesaid goals above, this Strategy significantly raises the profile of cybersecurity within our governments and defines clear roles and responsibilities. 

Excerpt

This document is “The National Cybersecurity Strategy of Bangladesh”. It is one
of the long-term measures for protecting our cyber world against security threats,
risks and challenges to national security. The Strategy addresses the country’s
national security strategy. The purpose of this document is to create a coherent
vision for 2021 keeping Bangladesh secure and prosperous by coordinating
government, private sector, citizens and international cyberspace defense efforts. 

This National Cybersecurity Strategy outlines a framework for organizing and
prioritizing efforts to manage risks to our cyberspace or critical information
infrastructure. To achieve the aforesaid goals above, this Strategy significantly
raises the profile of cybersecurity within our governments and defines clear roles
and responsibilities. Cognizant of the shared nature of cyber vulnerabilities, this
Strategy also requires a public-private partnership to fix the potential vulnerability
of private sector-owned critical infrastructures in banking, utilities and
telecommunications sectors against cyber attacks. 

In addition, we recognize that cybersecurity is a global challenge that demands
truly international solutions. Therefore, we commit ourselves to joining regional
and international partnerships creating solutions for addressing the cybersecurity
challenge regardless of threat. We, therefore, present this Strategy in terms of
the Pillars of the International Telecommunication Union’s Global Cybersecurity
Agenda (GCA). The GCA contains five strategic pillars and seven goals for
building collaboration between relevant parties in the fight against cyber threats.
We aim to help the GCA become the key framework for creating a secure and
safe information society.

STRATEGIC CONTEXT

Bangladesh needs to build confidence and security in the use of ICTs because of
the growing sophistication, frequency and gravity of cyber threats. Cyber threats
are a concern because the disruption or destruction of critical information
infrastructure could potentially have severe economic, social and national
security impacts.

Our cyberspace faces a range of threats. Cyber threats range from espionage
directed towards obtaining political intelligence to phishing to facilitate credit card
fraud. In addition to Government information, espionage now targets the
intellectual property of commercial enterprises in areas such as communication
technologies, optics, electronics and genetics. The design of the Internet
infrastructure facilitates some of the cyber threats due to its borderless,
anonymous and cross-border nature. Yet, the same insecure Internet serves as a
basis for critical government and private sector services in Bangladesh.
We attach great value to the protection of all types of cyber threats. Indeed,
cyberspace is swiftly becoming critical to the control of cyber threat devices
linked to the energy and transportation sectors such as electronic transformers
and pipeline pumps. New smart grid technologies deliver intelligent monitoring,
control, communication and self-healing technologies. However, smart meters
are susceptible to unauthorized modification, distributed denial of service and
disruption during patching. We are also concerned about an increasing number
of cyber attacks. For example, a growing number of cyber attacks aim to steal
official government documents detailing negotiating positions. Disclosure of such
details would seriously harm our national security and interests. 

Document Details

Document Type: 
Doument Author (Entity): 
Authoring Country: 
Originating Country or Trade Block: 
Issue Status: 
Year of Document: 
2014
Date of Document: 
Monday, September 1, 2014
Language (This Document): 
English

Legal Disclaimer: The content appearing on this site is for general information purposes only and made available on an "AS-IS" basis. The law is subject to change and no representation or warranty is made with regard to accuracy or fitness for a particular purpose.