Cybersecurity Defined

We are in the era of advanced technology where computers and artificial intelligence rule the world. Along with technology, cyber-crimes are also increasing. Just like we protect our homes by locking doors when we leave, we need to protect networks and computers with cyber security.

What is cyber security?

Cyber-security means protecting data, networks, programs, and other information from unauthorized or unattended access, destruction, or change. It is a part of IT security, along with its counterparts, physical security and information security. Simply, it aims to reduce the risk of cyber-attacks and protect against the unauthorized exploitation of systems, networks, and technologies. The point is, not all IT security measures are cyber security, because cyber security has its own set of assets to protect.

“Focusing on protecting electronic assets – including internet, WAN and LAN resources – used to store and transmit that information.”

~James Stanger

Of course, the threat to these electronic assets is hackers who have malicious intent to steal proprietary data and information via data breaches. Thus, it’s necessary to consider how people, processes, and technology all play equally important roles in keeping information safe.

Why Cyber – Security?

Cybersecurity is important because it safeguards all types of data against theft and loss. Sensitive data, personally identifiable information , protected health information ,personal information, intellectual property, data, and governmental and industry information systems all fall under this category.

Most importantly, the costs of cyber security breaches are rising. Organizations that experience cyber security breaches may face large fines under privacy rules such as the General Data Protection Regulation and the Data Protection Act of 2018. There are other non-monetary expenses to consider, such as reputational harm. Cyber-attacks are becoming more sophisticated, with attackers employing a wider range of strategies. Social engineering, malware, and ransomware are examples of these.

Cyber security is a serious issue that should be addressed at the board level. Cyber security risk oversight is becoming more difficult due to new legislation and reporting requirements. Management must assure the board that its cyber risk policies will lower the risk of attacks while also limiting financial and operational consequences.

Nowadays, cybercrime is a multibillion-dollar industry. According to The hidden costs of cybercrime, a 2020 study carried out by McAfee and the Center for Strategic and International Studies, based on data collected by Vanson Bourne, the world economy loses more than $1 trillion each year. Political, ethical, and social incentives can also drive attackers. According to The Hidden Costs of Cybercrime, a 2020 study by McAfee and the Center for Strategic and International Studies based on data collected by Vanson Bourne, the global economy loses more than $1 trillion each year as a result of cybercrime. Attackers may be motivated by political, ethical, or societal factors.

Who needs cyber security?

It is a mistake to imagine that cybercriminals are not interested in you. Everyone who uses the Internet requires cyber security. This is because the majority of cyber-attacks are automated and are designed to target common flaws rather than specific websites or organizations.

But some critical sectors are in the limelight more often when it comes to cybersecurity. They are Government and Critical Infrastructure and Companies Under Compliance and Regulations. Cybersecurity is important for the government and other organizations that have a direct impact on the country’s – or the world’s – well-being and security. Cyberattacks on governments, military organizations, and defense suppliers are beginning to supplement or replace physical attacks, placing countries at risk. Local governments have also been devastated by recent ransomware attacks, leaving them unable to offer essential and routine services. Cyberattacks on critical infrastructure sectors can be catastrophic, causing physical harm or severe disruption in services.

Many businesses are governed by cybersecurity regulations imposed by the government or industry. These guidelines ensure that businesses take steps to protect consumer data, as well as sensitive government and military information, from cyber-attacks. And those are just a few instances; many firms are affected by compliance obligations in some way. Noncompliance can result in significant financial fines, as well as major reputational harm and possibly contract loss.

Most of us know about the Target data breach from 2014. Through a weakness in Target’s HVAC contractor, attackers were able to get access to the company’s network. Enterprise corporations, as well as increasingly cyber-savvy smaller businesses, are recognizing that the companies with which they do business represent a form of insider danger. As a result, they frequently require their vendors to perform third-party cybersecurity audits, and failing to do so might cost the company money.

Types of cyber threats

The first step of keeping information safe is getting to know about cyber threats. There’s a long list of threats that are the most common cyber-attacks. They are malware, form jacking, crypto jacking, backdoors, DNS Poisoning attacks, DDoS attacks, and more. All of them need immediate attention and resolution.

Malware is a general term for any file or program that is designed to harm or disturb a computer. Commonly known as a virus, spyware, and trojan which can cause harm simply by opening the wrong attachment or clicking on the wrong link.

Types of Cyber-Security

Types of cyber security include critical infrastructure security which consists of the cyber-physical systems that modern societies rely on, Application security that uses software and hardware methods to tackle external threats that can arise in the development stage of an application, network security that ensures that internal networks are secure by protecting the infrastructure and inhibiting access to it, Cloud security, a software-based security tool that protects and monitors the data in your cloud resources and Internet of things (IoT) security which refers to the protection of a wide variety of critical and non-critical cyber-physical systems, like appliances, sensors, televisions, WIFI routers, printers, and security cameras.

Overall, cyber security is necessary to regulate the conduct and manners of interacting with computer systems in order to protect against suspicious behavior. Cybercriminals have an endless opportunity to cause havoc in a world where even our kitchen appliances and cars are connected to the internet.

In today’s world, it’s a rare company that doesn’t have a compelling reason to take cybersecurity seriously. Cybersecurity is a shared responsibility that goes beyond business or compliance because your security practices may be about more than just your company. Each and every day, cybersecurity is moving from a “nice-to-have” to a “must-have” …for everyone.


Richard E. Merwin Student Scholarship


[vc_row][vc_column parallax=”content-moving”][vc_column_text]Apply for this Scholarship. Don’t miss this great opportunity!

The Merwin Scholarship now has two application deadlines: 30 April and 30 September of each year (you may apply only once per year), with awards of $1,000 and up.

IEEE Computer Society is offering $40,000 in student scholarships, from $1,000 and up, to recognize and reward active student volunteer leaders in student branches or chapters who show promise in their academic and professional efforts.

This scholarship was created in honor of the late Richard E. Merwin, past president of the IEEE Computer Society, to recognize and reward student leadership.

The selected winners of this award will have the opportunity to serve as IEEE Computer Society Student Ambassadors for the particular IEEE region to which they belong. Duties as Student Ambassadors will include collecting and disseminating information to student branches or chapters in their region and serving as a liaison between the IEEE Computer Society Member and Geographic Activities Board (MGAB) and student members in their region. Over a dozen scholarships of $1,000 and up are available, for one academic year (approximately 9 months).

Who is Eligible?
Graduate students, and those in the final two years of an undergraduate program in electrical or computer engineering, computer science, or a well-defined computer related field of engineering who are active members of a student branch or chapter are eligible.

IEEE Computer Society membership for at least three (3) months prior to the application deadline is required. (Note: Students applying for the award should have a minimum one year in which to complete their degree, or be considering or enrolled to immediately start further study upon completion.)

Applicants are required to have a minimum grade point average of 2.5 / 4.0 (or exam marks of at least 60%), and be a full-time student as defined by his or her academic institution during the course of the award. Student winners of the Computer Society’s Richard Merwin or UPE/CS award for the previous year (13 months) are not eligible.

Evaluation criteria include participation in student IEEE branch/chapter activities (30%), academic achievement (30%), extracurricular activities (10%), letter of recommendation from student branch/chapter advisor (20%), and quality of Student Ambassador vision statement (10%).

For your transcripts, your minimum GPA requirement is 2.5 / 4.0. If your GPA is based on percentages and NOT a 4.0 grading scale, you must include mark sheets to notate how your GPA is calculated

Additionally, your transcripts should be of your entire current degree track (Juniors and Seniors should include first two years of grades; Masters and PhD should include current track)
Upon acceptance you will have to provide a Letter of Full-time Enrollment certificate for duration of Ambassador tenure with school seal on certificate.

Letter of Recommendation(s):

  • The IEEE Student Branch Adviser or
  • The CS Chapter Chair (i.e. the professional chapter)
  • You can also present a second LOR (this is optional)

Things Not to Include:

  • Examples of Flyers or Posters from chapter activities etc.
  • High School Transcripts
  • Your CV
  • Anything not related to the application requirements


Our Student Branch Women’s Day photo contest…


[vc_row][vc_column width=”1/2″][vc_column_text]The major contribution of women towards society making it a better place to live. Women are said to be the symbol of positivity, determination, strong-will-power, courage, and a lot more things.

We celebrated this spirit of women with utmost respect and dedication.
On International Women’s Day 2020 we, IEEE Student Branch of Rajarata University of Sri Lanka organized photography contest called ‘ICONIC WOMEN’.This an inter university competition. Students Capture a picture that portrays women’s abilities. We evaluated the results based on likes and the discussion with panel.
We had some rules for this contest. They are,

1. The image must be in jpeg format and preferably no longer than 1000px in width or height.
2. The image should be unframed.
3. Entries may not contain the following: alcohol, drugs or any kind of inappropriate behaviour.
Entries that contain any inappropriate materials will be disqualified.
4. You cant use other filter apps for the photo(Eg.B612, Youcam and etc.)
Students post their photo with the title of your photograph and the caption of  ‘Photography Contest RUSL #IEEE #IEEESBRUSL #ICONICWOMEN #PHOTOGRAPHYCONTEST’.
We completed our contest happily.[/vc_column_text][/vc_column][vc_column width=”1/2″][vc_empty_space height=”64px”][vc_images_carousel images=”688,687,686″ img_size=”medium”][/vc_column][/vc_row]

IEEE Sri Lanaka Section Congress 2019….


[vc_row][vc_column][vc_column_text]IEEE Sri Lanka Student section Young Professional Women in Engineering Congress 2019 


IEEE Sri Lanka Student section Young Professional Women in Engineering Congress 2019 was held on 20th to 22nd December at Wayamba University of Sri Lanka. As delegates, Rajarata University of Sri Lanka took a part of it. 

There were many sessions like Ice breaking sessions, IEEE Sabaya, Fun and Games, Awards night and etc. In IEEE Sabaya they gave a chance to all delegates from all over the country to show their talents between a huge crowd. That was a wonderful experience for those who participated in IEEE Sabaya. The Rajarata University of Sri Lanka took apart from this event. Here you can see the group picture of our participants. [/vc_column_text][vc_single_image image=”772″ img_size=”large” alignment=”center” onclick=”zoom”][vc_column_text]And also we had secretariat members from Rajarata University of Sri Lanka. They did their best for the event. We congratulate them for have a great future. [/vc_column_text][/vc_column][/vc_row]

IEEEXtreme Programming Competition


[vc_row][vc_column width=”1/3″][vc_single_image image=”783″ img_size=”large” add_caption=”yes”][vc_single_image image=”784″ img_size=”large”][/vc_column][vc_column width=”2/3″][ieee_heading text=”What is IEEEXtreme ?” heading=”h2″ type=”boxed”][vc_column_text]IEEEXtreme is a global challenge in which teams of IEEE Student members – advised and proctored by an IEEE member, and often supported by an IEEE Student Branch – compete in a 24-hour time span against each other to solve a set of programming problems.