A Comparative Analysis of the Cyber Security Strategy of Bangladesh

05/01/2019
by   Kaushik Sarker, et al.
0

Technology is an endless evolving expression in modern era, which increased security concerns and pushed us to create cyber environment. A National Cyber Security Strategy (NCSS) of a country reflects the state of that country's cyber strength which represents the aim and vision of the cyber security of a country. Formerly, researchers have worked on NCSS by comparing NCSS between different nations for international collaboration and harmonization and some researchers worked on policy framework for their respective governments. However very insignificant attempts had been made to assess the strategic strength of NCSS of Bangladesh by performing cross comparisons on NCSS of different Nations. Therefore, the motive of this research is to evaluate the robustness of the existing cyber security strategy of Bangladesh in comparison with some of the most technologically advanced countries in Asian continent and others like USA, Japan, Singapore, Malaysia and India in order to keep the NCSS of Bangladesh up-to-date.

READ FULL TEXT

page 16

page 21

research
11/14/2020

Do Cyber Capabilities and Cyber Power Incentivize International Cooperation?

This paper explores a research question about whether defensive and offe...
research
03/24/2023

A Comparative Study of National Cyber Security Strategies of ten nations

This study compares the National Cybersecurity Strategies (NCSSs) of pub...
research
05/23/2023

Understanding the Country-Level Security of Free Content Websites and their Hosting Infrastructure

This paper examines free content websites (FCWs) and premium content web...
research
11/27/2020

An authenticated and secure accounting system for international emissions trading

Expanding multi-country emissions trading system is considered as crucia...
research
10/11/2020

Improving Interdisciplinary Communication With Standardized Cyber Security Terminology: A Literature Review

The growing demand for computer security and the cyberization trend are ...
research
08/22/2021

Survey of Cyber Violence Against Women in Malawi

The purpose of this study was to investigate the prevalence of cyber vio...
research
01/02/2020

Key-dependent Security of Stream Ciphers

The control of the cryptography is more than ever a recurrent issue. As ...

Please sign up or login with your details

Forgot password? Click here to reset