You are here: Home Contents V17 N3 V17N3_Babu.html
Personal tools

Cyber Security and Its Reality in Bangladesh: An Analysis of Existing Legal Frameworks



Full text

Journal of Information System Security
Volume 17, Number 3 (2021)
Pages 145162
ISSN 1551-0123
Kudrat-E-Khuda Babu — Daffodil International University, Bangladesh
Information Institute Publishing, Washington DC, USA




With the rapid penetration of the Internet and other information and communication technology worldwide, cyber-crime is emerging as a threat to personal data stored in computers and is likely to affect the entire data systems. Even the United States, one of the most technologically advanced countries, is also subjected to such crimes. Bangladesh, being a less developed country, is also under the risk of cyber-crimes that could jeopardize the country’s national security. As the incumbent government aims to ensure Internet connectivity in all government institutions by 2021, upholding the motto of ‘Digital Bangladesh’, more and more national and multinational companies are offering online services for their services through the Internet as they follow the government’s agenda. From shopping to banking, all are just a click away with a higher rate of Internet penetration. However, criminals are also using the same online platform where they are committing various sorts of criminal activities, including phishing, hacking and stealing personal data. Hence both state-owned and private organizations could fall prey to cyber-attacks which can affect the lives of the entire population. Furthermore, 90% of the country’s software is unlicensed, which also intensifies the risk of cybercrimes due to their compromised security. In addition, the recent tug of war between Bangladeshi and Indian hackers has impacted the diplomatic relations between the two nations. More importantly, scores of media reports have been saying that terror groups use the online platforms for financing and maintaining intra-group communications. In this context, the existing laws and government measures against cyber-crimes are very weak to combat the burgeoning threat. This study attempts to shed light upon the threat posed by cyber-crimes in the context of the global village, with an emphasis on the perspective of Bangladesh.




Bangladesh, Cyber-crimes, Cyber-security, Globalization, the ICT Act 2006, the Digital Security Act 2018.




Alam, S.: Cyber Crime: a new challenge for law enforcers. City University Journal 2 (1), 75-84 (2019). Accessed 25 Apr 2020.

Barua, J.: Amendment Information Technology and Communication Act. The Daily Star (2019). Accessed 25 May 2019.

Bleyder, K.: Cyber Security: the emerging threat landscape. Bangladesh Institute of Peace and Security Studies, Dhaka (2012).

BNWLA: Survey on Psychological Health of Women. Bangladesh National Women Lawyers' Association, Dhaka (2014).

BTRC: Internet Subscribers. Bangladesh Telecommunication Regulatory Commission (2018). Accessed 12 May 2020.

Editorial: Draft ICT (Amendment) Ordinance-2013: a black law further Blackened. The Daily Star (2013). Accessed 25 Dec 2019.

Greenemeier, L.: China's Cyber Attacks Signal New Battlefield Is Online (2007). Accessed 12 Aug 2019.

The Information & Communication Technology Act: The Information & Communication Technology Act (2006). Accessed 11 Jul 2020.

International Commission of Jurists: Briefing Paper on the Amendments to the Bangladesh Information Communication Technology Act (2013). Accessed 10 May 2020.

Karaman, S.: Women support each other in the face of harassment online, but policy reform is needed. The LSE Women, Peace and Security blog. London: The London School of Economics and Political Science (2017). Accessed 1 Mar 2020.

Maruf, A. M., Islam, M. R., Ahamed, B.: Emerging Cyber Threats in Bangladesh: in quest of effective legal remedies. The Northern University Journal of Law 1 (2010), 112-124 (2014). Accessed 21 Aug 2020.

Elahi, S. M.: Porn Addicted Teenagers of Bangladesh. Manusher Jonno Foundation, Dhaka (2014).

Perlroth, N., Gellesaug, D.: Russian Hackers Amass Over a Billion Internet Passwords (2014). internet. Accessed 28 Jan 2019

Singer, P. W., Freidman, A.: Cybersecurity and Cyberwar: what everyone needs to know. Oxford University Press, Oxford (2014).

Tikk, E.: Ten Rules for Cyber Security-Survival: Global Politics and Strategy. Routledge, London (2011).

USSD: Country Report on Human Rights Practices for 2016. Washington DC: US Department of State (2017). Accessed 2 Aug 2020.

Williams, B.: Cyberspace: what is it, where is it and who cares? (2014). Accessed 15 Jul 2020.

Zaman, S., Gansheimer, L., Rolim, S. B., and Mridha, T.: Legal Action on Cyber Violence against Women. Bangladesh Legal Aid Services Trust (BLAST), Dhaka (2017).