"Distributer Denial of Services attacks remain a persistent and severe threats to internet and internet infrastructure and services, causing significant financial losses and disrupting critical online operations. This these ...
"With the recent pandemic more people are either working from home or working in a hybrid model and are exposed to newer cyber risk than before requiring these employees to receive security awareness training. However, the ...
"The escalating adoption of Internet of Things (IoT) devices has necessitated robust data encryption methods to safeguard sensitive information. An essential component of encryption is generating white noise to provide a ...
"The increasing reliance on virtual learning environments in higher education calls for robust cyber security measures to safeguard sensitive data, ensure uninterrupted learning experiences, and protect against cyber ...
"The survey and interviews among researchers revealed that they are not fully aware of potential threats, and most researchers are unaware of the security frameworks. The literature survey found several existing blockchain ...
Dharmarathne, Kathriachchi Pinnawalage Don Devin Indula(IIT, 2023)
"The evolvement of technology in the digital era has changed the complexity of the lifestyle of human. With this change, the traditional systems have been migrated to web environments where the consideration on user ...
"This research report addresses the critical issue of insider threat detection in small and medium-sized enterprises (SMEs) by introducing a comprehensive framework specifically designed for this context. The problem at ...
"Cyber security is an important aspect of any organization, regardless of the organizational size and structure. In today’s world, where the threat of cyber security exploitation increases daily, the importance of cyber ...
The ongoing patient privacy issue in hospitals continues to raise significant concerns within the healthcare community and among patients. Despite efforts to enhance data protection measures, instances of unauthorized ...
The thesis underscores the critical role of Identity Access Management (IAM) in Sri Lanka's rapidly advancing digital landscape. The surge in technological development and digital reliance necessitates a tailored IAM ...
The advent of sophisticated mobile technology has led to the ubiquitous presence of mobile devices in society. These portable and versatile gadgets have become essential items for individuals due to their convenience and ...
"When communication starts over the network, there are two parties involve. In order to start
communication they need to have a secure communication. In order to establish a
communication people use Diffie Hellman key ...
"
Malware attacks can be identified as common threat in cybersecurity which execute actions on a system or on a network without the permission of the user. Most of the existing malware detecting techniques have been relied ...
"TCP has been the main protocol contributed towards the evolution of internet for four decades. To start a TCP session, the three-way handshake between the client and the server happens in plain text. As per the literature ...
"The central issue at hand revolves around the pervasive problem of distrust and concerns surrounding Health Information in the Sri Lankan Health Sector. Presently, the data is stored within databases, and the transmission ...
"Cybercrime has become one of the major concerns in today business world. Today most of the business systems are looking forward to work with the use of cloud base solutions where due to the business systems available ...
"Online data privacy and ownership has been two of the most debated and regulated topics in the past decade. Some of the service providers that offer online data storage and sharing have acted in bad faith towards end-users ...
"The constantly evolving threat landscape has made it mandatory to implement security controls for any organization that relies on information technology for its operation. However, organizations could not assume by ...
"In today's fast-paced and technology-driven world, organizations heavily rely on Information Technology (IT) to meet their business needs. However, this increased dependence on IT and the exposure to the internet also ...
"Analyzing security incidents is a critical phase within the incident response process, wherein the required measures to alleviate the incident are determined. This undertaking is both time-intensive and necessitates ...