Encryption is the most important process that is used in cyber security domain. There
are number of encryption methods that are using in recent world. There are lot of
drawbacks with the existing encryption methods. ...
The swift proliferation of operating system (OS) log data and the intricacy of modern cyber
threats have shown inadequacies in traditional forensic analysis methods. Current systems have
difficulties in processing large ...
In modern cyber world information security is paramount specifically when it comes to PII and Personal Data this has been a throbbing headache for not only Sri Lankas BFSI sector but this has been a problem for almost every ...
Personal data protection has become one of the hot topics in countries which process European Union citizen data after enacting General Data Protection Regulation (GDPR) from 2018 May 25. In Sri Lankan context, there are ...
"This research paper proposes, Anon-Sec-Net, a network layer anonymous communication
system. Which provides strong anonymity with low performance requirements. Additionally,
Anon-Sec-Net has able to overcome some of ...
"The research addresses vulnerabilities in email authentication protocols such as the Sender Policy
Framework, DomainKeys Identified Mail, and Domain-based Message Authentication,
Reporting, and Conformance, which are ...
"Online data privacy and ownership has been two of the most debated and regulated topics in the past decade. Some of the service providers that offer online data storage and sharing have acted in bad faith towards end-users ...
The increasing volume and complexity of digital evidence in cybercrime investigations place huge
pressure on digital forensic tools to perform efficient and scalable analysis. Autopsy, a widely
adopted open-source ...
The advent of sophisticated mobile technology has led to the ubiquitous presence of mobile devices in society. These portable and versatile gadgets have become essential items for individuals due to their convenience and ...
"The development of automated systems has revolutionized numerous sectors, including the financial industry, where such systems are increasingly employed in loan approval processes. However, the integration of technology ...
Land is a valuable asset of Sri Lankan people as the land ownership is considered a property
right for a very long period of time, enacted through the land registration procedures. Every
year there has been an increase ...
"The survey and interviews among researchers revealed that they are not fully aware of potential threats, and most researchers are unaware of the security frameworks. The literature survey found several existing blockchain ...
Bring your own device (BYOD) has become a trend in the present day due to the pandemic
situations as people are working from home. Most organizations allow employees the
freedom to bring their personal mobile devices ...
"Cybercrime has become one of the major concerns in today business world. Today most of the business systems are looking forward to work with the use of cloud base solutions where due to the business systems available ...
Information Technology is growing exponentially and in this fast-growing technology and faster Internet of things (IOT), data processing devices are being introduced. Data has become an indispensable part of our daily lives ...
"As per the present day valuation Information is considered as one of the most valuable
assets. Due to that fact it is un-avoidable that it would create a market for information
which are obtained illegal manner. Many ...
"Teleworking has become one of the most important topics in the year 2020 with the Covid-19 pandemic situation. There was a sudden requirement for companies to allow employees to work from home and companies had to do it ...
"
Malware attacks can be identified as common threat in cybersecurity which execute actions on a system or on a network without the permission of the user. Most of the existing malware detecting techniques have been relied ...
"It has become very difficult for organizations to properly defend their crown jewel assets with the increase in targeted and complex security threats by both external attackers and malicious insiders. The defending task ...
"Network access control is one of the most important topics in defending against cyberattacks
in order to keep business operations running and data safe. SMEs in Sri Lanka can be found in a variety of industries, including ...