Module Topics

Module 1: Cybersecurity Fundamentals

Professional cybersecurity education platform for systematic threat mitigation and security protocol validation.

How hackers guess your password

Many people believe that hackers try to figure out passwords by typing random words, such as "password123," until they find the correct one.

This is incorrect. Hackers use special computer programs that automatically try many password combinations at very high speeds. These programs can test billions of possibilities every second. Research shows that 80% of passwords can be broken within a few minutes because many people choose simple and predictable passwords, such as birthdays, pet names, "123456," or "qwerty."

A password like "Summer2025!" may appear to be strong. However, it can still be broken in less than one day. If the same password is used for multiple accounts, such as social media, email, and banking, all of those accounts can be accessed once the password is discovered.

Hidden Dangers of Public WiFi

Many places provide free WiFi, such as coffee shops, airports, and buses. However, free WiFi can be unsafe. On open networks, hackers can use a method called a "man-in-the-middle attack." In this method, the hacker's computer acts as a bridge between the user and the internet. This allows the hacker to secretly view information such as messages, emails, and credit card details. Hackers may also create fake WiFi networks with names that seem trustworthy, such as Airport_FreeWiFi. When people connect to these fake networks, their data can be stolen.

Using public WiFi without protection is similar to giving away your private information where anyone can see it.

Phishing: Can You Spot the Fake?

Many online attacks begin with a single email or message. It may appear to come from a bank: "Your account is locked, click here to secure it." Or from a streaming service: "Payment failed, update your card details now." The logos may appear correct, and the links may look genuine, but clicking the wrong link can give attackers access to your login information.

Attackers use several techniques to make these messages appear real. They may include your name, use familiar wording, or make the sender's address appear legitimate. Sometimes, they create websites that look identical to the real ones. Always verify the sender, hover over links to check the actual web address, and never enter passwords from messages that seem suspicious. This is similar to a fake store: it appears real, but anything you give them is lost.

Phishing Quiz: Which one is fake?

Scenario 1

"Dear customer, your account has been temporarily suspended due to suspicious activity. To restore access immediately, please click here to verify your identity."

From: security@yourbank.com

Scenario 2

"Hello [Your Name], we noticed a login attempt from a new device in Chicago. If this was not you, please review your account activity by logging in directly at our website (www.yourbank.com)."

From: no-reply@yourbank-security.com

Your Digital Footprint

Every time a person likes a post, searches online, or shares content, small traces are left behind. Photos that are deleted may still be stored elsewhere. Even using "incognito mode" does not prevent internet providers, schools, or advertisers from seeing activity.

Companies gather and exchange this information. By examining a few social media interactions, artificial intelligence can predict personality traits more accurately than a close friend.

The Life of a Virus: How Malware Works

When a person downloads software from an unknown source, such as a free photo editor or cracked program, it may contain hidden malware. Once the program runs, the malware becomes active. First, it hides within the system to avoid detection. Next, it copies itself to other files and devices on the same network. Finally, it contacts the attacker, sending private information. Some malware spreads quickly, affecting thousands of devices in minutes, similar to how a biological virus spreads in humans. Certain malware can even change itself to avoid antivirus programs, making removal more difficult.

Some malware remains hidden while collecting information, monitoring activity, or allowing attackers to control the device without the user noticing. Even if no immediate issues are visible, sensitive files, passwords, and personal data may be stolen over time. In some cases, malware can create backdoors for further attacks or be used in large-scale cyberattacks.

The Art of Social Engineering

Hackers do not always rely on computer code. Frequently, they exploit human psychology. Social engineering is the practice of deceiving people into performing actions that benefit the hacker without their awareness. A hacker may call, posing as "technical support," to request your WiFi password. Alternatively, they may send a message: "Hello, I am your friend's cousin—can you help me reset your account?" In cybersecurity, the most vulnerable element is not the computer but the human mind.

Ninety percent of financial fraud in Bangladesh occurs because individuals are persuaded to share sensitive information such as OTPs, passwords, or account details.

Safe and Unsafe Apps and Links

Not all applications and links are as safe as they appear. For instance, a free flashlight app may request access to the microphone, contacts, or camera. These permissions are often unrelated to the app's stated function; the actual purpose may be data collection or surveillance. Research indicates that over fifty percent of free applications gather unnecessary information, and some may even install hidden trackers or malware.

Links shared online can also be dangerous. Messages claiming "Win a free iPhone" or "Claim your reward now" may direct users to adware, counterfeit websites, or attempts to steal personal information. The safest practices include reviewing app permissions carefully, installing apps only from trusted sources, and avoiding suspicious links. While free apps and offers may seem appealing, in many cases, the user becomes the product.

Purpose of Cybersecurity

Cybersecurity is the practice of protecting computers, devices, and digital information from unauthorized access, theft, damage, or misuse. It can be compared to securing a house by locking doors, setting alarms, and storing valuable items safely. Cybersecurity provides similar protection for the digital environment.

For example, when an individual makes purchases online, cybersecurity safeguards financial information such as credit card details. When an organization stores customer information, cybersecurity prevents unauthorized access. Even basic measures, such as using strong passwords and avoiding suspicious links, contribute to maintaining digital security.

Cybersecurity functions as a digital shield. Just as one would not leave a wallet unattended in a public place, personal information should not be left unprotected online. Cybersecurity ensures that digital activities remain private and secure.

Cybersecurity in Bangladesh

Bangladesh is experiencing rapid growth in digital technology, but its cybersecurity framework is still developing. As more businesses, government institutions, and educational organizations operate online, the risk of cyberattacks increases. A notable example occurred in 2016 when attackers exploited vulnerabilities in the SWIFT system to steal $81 million from Bangladesh Bank, illustrating the seriousness of cyber threats.

Banks and e-commerce platforms are enhancing security measures; however, phishing, malware, and online fraud remain prevalent. Bangladesh is currently ranked 66th globally in the National Cyber Security Index and has been recognized as a 'Role Model' in the 2024 Global Cybersecurity Index. These rankings indicate progress while highlighting the continued need for stronger regulations, professional training, and public awareness.

Bangladesh is strengthening its cyber defenses, but further improvements are required to meet the standards of more digitally advanced nations. Protecting digital information and developing skilled cybersecurity professionals are critical for ensuring a safer online environment.

What Will We Learn Through These Modules?

Module 2: Cyber Attacks → Step into the hacker's mind. See exactly how they break in.

Module 3: Cyber Defense → Build your armor—learn the tricks to protect yourself.

Module 4: Cybersecurity in Action → Real-life stories, hands-on cases, and a roadmap to turn knowledge into skill.

NEXT MODULE

SYSTEM AUTHENTICATION

SYSTEM ALERT

Alert message will appear here.