Image for post
Image for post
source:https://blog.getcomplied.com/10-ways-to-prevent-cyber-attacks-in-2020/

The Year 2020 is becoming one of the remarkable year due to COVID-19 and the exponential growth of cyber attacks. Due to the COVID-19 pandemic, most of the organizations have shifted their focus towards the health crisis. The work-from-home mechanism has opened up number of opportunities to the cyber criminals. According to the statistics of Security Boulevard, Number of data breaches in 2020 has almost doubled with 3,950 confirmed breaches against 2,103 recorded breaches in 2019. …


Image for post
Image for post
source: https://documentmedia.com/article-2785-DATAMATX-Meets-Requirements-for-Payment-Card-Industry-Standards.html

The payment card industry data security standard or PCI DSS was developed to encourage and enhance the data security of the cardholders and to facilitate the broad adoption of consistent data security measures globally. It applies to all merchants and service providers that process, transmit or store cardholder data. The PCI DSS was launched in 2004 as a result of collaboration between major credit card brands such as American Express, Discover, JCB, MasterCard and Visa.

All the organizations that accept credit/debit cards and store, process or transmit cardholder data need to be comply with this standard. The Compliance requirements for merchants and service providers may differ based on the size of the organization and the volume of transactions it undertakes. …


Demilitarized zone or in short terms DMZ is used to improve the security of an organization’s network by segregating devices such as computers and servers on the opposite sides of a firewall. It is sort of creating two separate networks. The question is why do we need a demilitarized zone and how does it improve the security?

Let’s take an example, we have a network that belongs to a company and this company has computers and servers behind their firewall. …


Image for post
Image for post
source: https://www.counterpointresearch.com/5g

5g is the latest generation of mobile network designed to connect virtually everyone and everything together such as smart devices, vehicles, and even industrial machinery.

With the 5g technology, users can experience fast download speeds and insanely fast response time referred as latency. Latency is the time it takes for devices to respond to each other over any wireless network. 3g networks have a response time around 100 milliseconds, 4g networks around 30 milliseconds and 5g networks predict the latency figures as low as 1 millisecond. This virtually instantaneous communication will open up a new world of possibilities for anything with an established network connection. …


Due to the exponential increment in cybercrimes, network security plays an important role in today’s organizations. Although there are number of techniques to protect the data from attacks, it is very important to identify correct technique based on the specific situation. Encryption is the conversion of data from a readable format into an encoded format that can only be read or processed after it’s been decrypted. Encryption is widely used by large organizations and individuals to secure the data sent between web browsers and a server. …


Image for post
Image for post
source : https://medium.com/apis-and-digital-transformation/defining-the-personas-that-drive-api-programs

Here I’m going to explain about some common personas used in the API management environment which is very essential to create a technically stable and economically viable API product.

What is a Persona in API Management context?

When it comes to API management environment, there are different user roles involving in different stages of the API Life-cycle; for example, there are API Designers who are responsible for the design of the API and there are technical writers who are responsible for writing the API documentation. These user roles are called as personas. …

About

Thidasala Demintha Rathnayake

Software Engineering Intern @ WSO2, Undergraduate of University of Kelaniya

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store