Posts

Comprehensive Security Infrastructure Plan For the Leading Groups of Companies in Sri Lanka

Image
One of the leading groups of companies in Sri Lanka which is running businesses in different areas is hoping to automate the entire operations provided by the all companies in the group. The automation also targets to improve all the internal operations and the public services which provide online access to their customers and their remote employees. The group of companies have World-wide branch network. All the companies and branches are connected to the corporate office which is located in Colombo. They are running business such as Finance (private banks, etc.), Manufacturing and selling electrical and electronic appliances, Providing Cloud and Data Center facilities, and Transport and Logistic services. Most of their companies interact with customers, distributors, dealers, remote employees via internet. So Following key functionality and task to be consider in establishing the security infrastructure. 1. Customers, distributors, dealers, remote employees should be ab

Laws in Sri Lanka to prevent Cyber-Terrorism and analyse whether these laws are sufficient to prevent a Cyber-Warfare in the future

Image
“Iran’s Military Response May Be Concluded, But Cyber Warfare Threat Grows” (Kanno-Youngs & Nicole Perlroth, Jan. 8, 2020) , “Threat of Cyberattack by Iran still critical, Experts say” (The Wall Street Journal , Jan. 9, 2020) , these latest news headlines may conclude the major threat that 21 st century modern countries have to faced. “Cyber Security is the newest and most unique national security issue of the 21st century” (Malawer, November 18, 2010) .   Debate over Cyber Warfare is now affected to all over countries. As a developing nation, Sri Lanka is also vulnerable to this rising technological war to some extent. In this article, I addressed the existing Sri Lankan laws ( Intellectual Property Act (No.36 of 2003), Electronic Transaction Act (No.19 of 2006), Computer Crime Act (No.24 of 2007), Cyber Security Bill ) regarding Cyber Warfare and analyzed the loop holes and vulnerabilities of current security strategies.   I concluded the article by proposing relevant m