"The survey and interviews among researchers revealed that they are not fully aware of potential threats, and most researchers are unaware of the security frameworks. The literature survey found several existing blockchain ...
Dharmarathne, Kathriachchi Pinnawalage Don Devin Indula(IIT, 2023)
"The evolvement of technology in the digital era has changed the complexity of the lifestyle of human. With this change, the traditional systems have been migrated to web environments where the consideration on user ...
"This research report addresses the critical issue of insider threat detection in small and medium-sized enterprises (SMEs) by introducing a comprehensive framework specifically designed for this context. The problem at ...
"Cyber security is an important aspect of any organization, regardless of the organizational size and structure. In today’s world, where the threat of cyber security exploitation increases daily, the importance of cyber ...
The ongoing patient privacy issue in hospitals continues to raise significant concerns within the healthcare community and among patients. Despite efforts to enhance data protection measures, instances of unauthorized ...
The thesis underscores the critical role of Identity Access Management (IAM) in Sri Lanka's rapidly advancing digital landscape. The surge in technological development and digital reliance necessitates a tailored IAM ...
The advent of sophisticated mobile technology has led to the ubiquitous presence of mobile devices in society. These portable and versatile gadgets have become essential items for individuals due to their convenience and ...
"When communication starts over the network, there are two parties involve. In order to start
communication they need to have a secure communication. In order to establish a
communication people use Diffie Hellman key ...
"
Malware attacks can be identified as common threat in cybersecurity which execute actions on a system or on a network without the permission of the user. Most of the existing malware detecting techniques have been relied ...
"TCP has been the main protocol contributed towards the evolution of internet for four decades. To start a TCP session, the three-way handshake between the client and the server happens in plain text. As per the literature ...
"The central issue at hand revolves around the pervasive problem of distrust and concerns surrounding Health Information in the Sri Lankan Health Sector. Presently, the data is stored within databases, and the transmission ...
"Cybercrime has become one of the major concerns in today business world. Today most of the business systems are looking forward to work with the use of cloud base solutions where due to the business systems available ...
"Online data privacy and ownership has been two of the most debated and regulated topics in the past decade. Some of the service providers that offer online data storage and sharing have acted in bad faith towards end-users ...
"The constantly evolving threat landscape has made it mandatory to implement security controls for any organization that relies on information technology for its operation. However, organizations could not assume by ...
"In today's fast-paced and technology-driven world, organizations heavily rely on Information Technology (IT) to meet their business needs. However, this increased dependence on IT and the exposure to the internet also ...
"Analyzing security incidents is a critical phase within the incident response process, wherein the required measures to alleviate the incident are determined. This undertaking is both time-intensive and necessitates ...
"The research focuses on a problem in healthcare sectors regarding privacy and security issues.
Some of the identified problem include; insecurities such as unauthorized persons accessing the
patients’ room, data leakage ...
The transmission of the time or location-sensitive data is currently done through getting
restricted access. This method is not the best approach for this. The primary purpose of this
research is to implement a new way ...
Ransomware attacks has become one of the major cyber scams over the past few years to
hit businesses. Specially, attackers getting more advantages from this ongoing pandemic
situation for industries such as healthcare, ...
A competent cybersecurity workforce is vital in securing a country’s information
systems, critical infrastructure, digital infrastructure and citizen data. Cybersecurity
education has been a major priority in many ...