Complete Guidelines on AI Security Published
In recent times, artificial intelligence based tools like GPT are being used in businesses and industries as well as netizens in the country. This technology is used in household electronic devices like AC, fridge. However, many people are using AI without realizing it. Similarly, many people are sharing sensitive and personal information online without reading the conditions. As a result, the sector concerned is expressing fear of cyber attacks in the coming days.
Therefore, Bangladesh e-Government Computer Incident Response Team (BGD-CIRT) has published a comprehensive guide to the security of public and private information before unexpected losses. It has newly added three topics: AI Security Assessment, IoT Security Assessment and Industrial Control Systems (ICS) Cyber Security for AI use.
The guidelines published by the Bangladesh Computer Council cover cyber threats and their impact, role of BGD e-gov CIRT, purpose of guidelines, where to apply, policy evaluation, network and infrastructure security, data security, social media security, threat and patch management. etc., along with how AI and IoT security can be assessed and Cyber Security (ICS) for industrial enterprise control systems are presented through various charts and subsections. All in all, the guidelines also provide a roadmap for analyzing massive data, identifying patterns and taking immediate decisions to counter potential AI attacks.
In view of increasing digital connectivity in Bangladesh, the guidelines emphasize raising awareness, adopting strategies and promoting best practices to ensure a secure and resilient digital ecosystem to protect individuals, businesses and government agencies from cyber threats. For this purpose, Bangladesh Computer Emergency Response Team (BDG e-GOV CERT) focuses on various issues including threat assessment, risk mitigation, incident response, data protection and compliance with international standards. The agency has provided a roadmap for implementing the necessary controls and procedures to protect cyber infrastructure at the enterprise level.
It provides detailed recommendations on network segmentation, use of firewalls, intrusion detection systems, unrestricted access control to networks, secure coding practices, data backup policies, and disaster response procedures. The guidance similarly emphasizes the importance of user awareness and training, security of social media, vulnerability and patch management, and security monitoring. Emerging technologies such as Artificial Intelligence (AI) and Internet of Things (IoT) and their security implications are also addressed. As noted, this guidance will be updated to effectively address the dynamic and evolving threat landscape.







