In the new world the most valuable trait to us is our stored data. We cannot bear the thought of losing our data and if it is a business stakes are even higher and hence we slowly embarked upon the importance of information security and now information security has become one of the top priorities of individuals and specially businesses. The corporate sector shows high interest in information security as their clientele is highly dependent on the credibility of their companies and a breach of information security can cause them unimaginable losses. Even the world’s largest tycoons have faced numerous information threats, to name a few, in 2008 US military fell victim to an information corruption that was triggered by connecting a flash drive that contained a malicious program by a foreign intelligence agency and it took the pentagon 14 months to clean all systems, even up to date this…

Read more

IFest 2k18 – the most awaited tech conference on information security and emerging trends proudly organized by the UCSC – ISACA Student Group will be held on 13th May 2018, from 9.00 am to 2.30 pm at the University of Colombo – New Arts Theater (NAT). IFest 2k18 will be organized in close partnership with the ISACA Sri Lanka Chapter and will be witnessed by over 400 undergraduates from both public and private higher education institutes from all parts of the island with a genuine interest in matters relating to information security, governance, etc.. The conference will be held focused on enhancing awareness in the fields of information security and governance with an emphasis on emerging technologies and trends including several sessions conducted by resource people with expertise in each area as well as interactive sessions with the participants. The event will include quizzes to interact with the participants as…

Read more

Is everything safe? It’s 2017, and the answer is clearly NO.

Making sure that your passwords are secure is one of the first lines of defense for your computer, email, and information against hacking attempts. Password managers are the one recommended by many security experts to keep all your passwords secure in one place. Password managers are the software that creates complex passwords, stores and organizes all your passwords for your computers, websites, applications, and networks, as well as remembers them on your behalf.

Read more

In this article, here I will try to give some basic ideas of threats. In modern telecommunication world, cyber security issues are so much important because of many reasons. But with the development of technology and IT field new types of threats are emerging that can compromise your business. Here are a quick guide and a simple introduction to some trends in IT security and a few ideas to safeguard yourself against them. So as to give the basic introduction, the basic types of attacks can be classified as active and passive. First, an important distinction to make is active attacks vs. passive attacks. These differ both in how they are accomplished and what they do once the unauthorized party gains access. This is a brief introduction about what a passive attack is. Passive attacks happen when a program is constantly searching for vulnerabilities, and when one is found, it gains entry.…

Read more

iFest 2k16, organized by ISACA UCSC student group; the only ISACA Student Group in the country, is a conference focused on enhancing awareness in the fields of information security and governance with emphasis on emerging technologies and trends which including internet of things, cloud computing and big data. The conference will include several sessions conducted by resource people with expertise in each area as well as interactive sessions with the participants. The participant profile will consist of self-motivated students from several government and private higher education institutes of the country. The event will also include the launch of the official UCSC ISG Application which will serve as a continued source of knowledge with periodic digests of trending field related information. The events will be organized in close partnership with the ISACA Sri Lanka Chapter. 29th May 2016 9.00am – 1.30pm University of Colombo – New Arts Theater ucscisg.info/events/ifest2k16 For more…

Read more

iHACK 2015; a 24 hour Software Development Competition organized by the University of Colombo School of Computing – ISACA Student Group in partnership with Millennium Information Technologies, was successfully completed on Sunday with the enthusiastic participation of a number of teams of aspiring software developers from the University of Colombo. Intended to provide students with an opportunity to demonstrate and improve their software development and problem solving skills as well as their ability to pitch their end product in a competitive manner, the competition was widely accepted for its breadth of focus. The event was held at the UCSC on the 5th and 6th of September 2015 under the theme “One Team, One Dream..” which was also reflected in the competition task.

Read more

By Kavinda Keshan Rasnayake

Definition of myth:- A widely held but false belief or ideas.

Myths can occur in various places or situations, and can be related to many situations. Be it in engineering or arts, there can be various myths about various subjects. But when it comes to information security, clinging on to a myth can mean a spell of disaster.

Read more

The openness of Android has enabled it to open doors to many developers allowing businesses to reach a large customer base as well as supporting many custom third party applications for a breadth of purposes. This has enabled Android to become one of world’s most popular mobile operating systems. However, this openness tends to increase security

Read more

8/8