BGD e-GOV CIRT mission is to support government efforts to develop and amplify ICT programs by establishing incident management capabilities within Bangladesh, which will make these programs more efficient and reliable.
Main objectives of the BGD e-GOV CIRT are:
- Manage cyber security in Bangladesh government’s e-Government network and related infrastructure;
- Serve as a catalyst in organizing national cybersecurity resilience initiatives (education, workforce competence, regulation, cyber exercises) among various stakeholders;
- Make efforts to establish national cyber security incident management capabilities in Bangladesh.
To achieve this goal, BGD e-GOV CIRT during the first stage of its development will:
- Monitor the network for the events that affect security of the government network;
- Carry out investigations and containment measures for cyber security events in order to minimize data loss or service disruption in the government network and e-services;
- Help to solve security related issues in National Data Center (NDC) including provision of obligatory instructions for BCC personnel to secure NDC information resources;
- Carry out preventive measures in order to minimize disruptions of secure operations of the government network and e-services;
- Participate in international and national cyber security initiatives;
- Promote and strengthen cyber security environment by developing, collaborating and maintaining relationships with other CIRTs and organizations in the country and abroad;
- Support capacity building of the existing manpower of BCC to establish national CIRT.
- Constituency of BGD e-Gov CIRT are all governmental institutions of Bangladesh. Constituency sector is “government” and constituency type is “mixed” (internal and external). Part of the constituency is using National Data Center (NDC) located at BCC where host their IT resources and services. BGD e-Gov CIRT supervises the following Autonomous System numbers, IP address space and domain names associated with the NDC:
The constituency range and description will be continuously checked and updated to ensure that all ICT resources which should be protected are covered by the designed and implemented incident management services.
Frequently Asked Questions:
- 1. What can businesses do to protect themselves from cyber attack?
- Identify your vital assets
- Conduct a risk assessment and prepare practical and effective mitigation plan
- Approve risk mitigation plan and implement actions
- Do periodic awareness raising campaigns inside your company
For guidance on preparation of a practical and effective mitigation plan please look at Cyber Security Controls for Effective Cyber Defense provided by the Center of Internet Security.