Cybersecurity in the COVID-19 Pandemic

As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy. Despite their effectiveness for remote work and online interactions, cyberspac...

Descripción completa

Detalles Bibliográficos
Autor principal: Okereafor, Kenneth (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boca Raton, FL : CRC Press 2021.
Edición:First edition
Colección:CRC focus
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009634693006719
Tabla de Contenidos:
  • Cover
  • Half Title
  • Title Page
  • Copyright Page
  • Dedication
  • Contents
  • Preface
  • Foreword
  • Acknowledgements
  • About the Author
  • List of Tables
  • List of Figures
  • List of Acronyms
  • 1. Introduction: COVID-19 Pandemic, the Game Changer
  • 1.1. Covid-19 Pandemic, the Game Changer
  • 1.2. Overview of Cybersecurity
  • 1.3. Objectives of The Book
  • 1.4. Structure of The Book
  • References
  • 2. COVID-19 Background
  • 2.1. Nature
  • 2.2. Origin
  • 2.3. Spread
  • 2.4. Global Response
  • 2.5. Statistics
  • 2.6. Link with Cybersecurity
  • References
  • 3. Cybersecurity Roles in a Pandemic
  • 3.1. Preventive Roles
  • 3.2. Detective Roles
  • 3.3. Response Roles
  • 3.4. Data Confidentiality
  • 3.5. Data Integrity
  • 3.6. Data Availability
  • 3.7. Chapter Summary
  • References
  • 4. Cyberspace at Risk
  • 4.1. Vulnerabilities and Exposures
  • 4.1.1. Vulnerabilities
  • 4.1.2. Exposures
  • 4.1.3. Exposed Industries
  • 4.2. Human Vulnerabilities
  • 4.2.1. Human Factor of Security
  • 4.2.2. Sympathy and Compassion
  • 4.2.3. Urgency and Persuasion
  • 4.2.4. Desperation and Confusion
  • 4.2.5. Loyalty, Honesty, and Respect
  • 4.2.6. Anger and Grief
  • 4.2.7. Fear, Worry, and Anxiety
  • 4.3. Technical and Operational Vulnerabilities
  • 4.3.1. Expired Security Systems
  • 4.3.2. Obsolete Operating Systems (OS) And Utilities
  • 4.3.3. Capacity Gap
  • 4.3.4. Misplaced Priorities
  • 4.3.5. Disrupted Procedures
  • 4.3.6. Administrative Loopholes
  • 4.3.7. Network and Connectivity Exposures
  • 4.4. Cyber Threats and Exploits
  • 4.4.1. Cyber Threats
  • 4.4.2. Perspective of the Digital Threat [27]
  • 4.4.3. Threats to Healthcare Data
  • 4.4.4. Cyber Exploits
  • 4.4.5. Malware
  • 4.4.6. Ransomware
  • 4.4.7. Computer Virus
  • 4.4.8. Adware and Spyware
  • 4.4.9. Computer Worm
  • 4.4.10. Trojan Horse
  • 4.4.11. Logic Bomb
  • 4.4.12. Spear Phishing.
  • 4.4.13. Man-in-the-Middle Attack
  • 4.4.14. Cyber Espionage
  • 4.4.15. Cyber Bullying
  • 4.4.16. Social Engineering
  • 4.4.16.1. Lessons from the Twitter incident
  • 4.4.17. Password Abuse
  • 4.4.18. DDoS Attack
  • 4.4.19. Fake Website
  • 4.4.20. Website Hijack
  • 4.4.21. Insider Collusion
  • 4.5. Cybersecurity Impacts Of COVID-19
  • 4.5.1. Identity Theft
  • 4.5.2. Privacy Issues
  • 4.5.3. Data Accessibility Issues
  • 4.5.4. Data Loss
  • 4.5.5. Reputation Damage
  • 4.5.6. Revenue Loss
  • 4.5.7. Service Disruption for Organizations
  • 4.5.8. Service Disruption for Individuals
  • 4.5.9. Crime Escalation
  • 4.5.10. Fatality
  • 4.6. Chapter Summary
  • References
  • 5. Challenges of Managing Cybersecurity at COVID-19
  • 5.1. Identity and Access Control Challenges
  • 5.1.1. Authentication Challenges
  • 5.1.2. Authorization Challenges
  • 5.1.3. Accountability Challenges
  • 5.2. Incident Management Challenges
  • 5.2.1. Incident Response Challenges
  • 5.2.2. Incident Handling Challenges
  • 5.3. Remote Communications Challenges
  • 5.3.1. Work from Home Challenges
  • 5.3.2. Telecommuting and Video Conferencing Challenges
  • 5.4. Healthcare Data Management Challenges
  • 5.4.1. Value-Based Classification Of Healthcare Data
  • 5.4.2. Confidentiality Challenges
  • 5.4.3. Integrity Challenges
  • 5.4.4. Availability Challenges
  • 5.5. Chapter Summary
  • References
  • 6. Cyberattack Mitigations During the Pandemic
  • 6.1. Scenario of Defense in-depth
  • 6.2. Administrative Countermeasures
  • 6.3. Physical Countermeasures
  • 6.4. Technical Countermeasures
  • 6.5. Control Knobs
  • 6.5.1. Preventive Control
  • 6.5.1.1. Zoom preventive intervention
  • 6.5.1.2. Anti-malware preventive intervention
  • 6.5.2. Detective Control
  • 6.5.3. Responsive Control
  • 6.5.4. Corrective Control
  • 6.5.5. Deterrent Control
  • 6.6. Chapter Summary.
  • 7. Cybersecurity in Post COVID-19 Digital Era
  • 7.1. Cybersecurity Projections After the Pandemic
  • 7.1.1. Cybersecurity in Artificial Intelligence (AI)
  • 7.1.2. Cybersecurity in Big Data
  • 7.1.3. Cybersecurity in Telemedicine
  • 7.1.4. Cybersecurity in Aviation
  • 7.2. Chapter Summary
  • References
  • 8. Conclusion and Recommendations
  • 8.1. Remote Work Comes to Stay
  • 8.2. Cryptographic and Steganographic Remedies
  • 8.3. New Concept of Monitoring
  • 8.4. More Stringent Email Policies
  • 8.4.1. Proposed Design Model for Email Security Re-engineering
  • 8.4.2. Implementation Strategy for Email Security Re-engineering
  • 8.5. Punishment for Malware-related Offences
  • 8.6. Acculturation of Social Engineering
  • 8.6.1. Proposed Implementation Model for Social Engineering Acculturation
  • 8.7. Better Management of Digital Identity (DID)
  • 8.7.1. Requirements for Better Digital Identity Management
  • 8.8. Last Line
  • References
  • Caveat
  • Glossary
  • Index.