Cybersecurity in the COVID-19 Pandemic
As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy. Despite their effectiveness for remote work and online interactions, cyberspac...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Boca Raton, FL :
CRC Press
2021.
|
Edición: | First edition |
Colección: | CRC focus
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009634693006719 |
Tabla de Contenidos:
- Cover
- Half Title
- Title Page
- Copyright Page
- Dedication
- Contents
- Preface
- Foreword
- Acknowledgements
- About the Author
- List of Tables
- List of Figures
- List of Acronyms
- 1. Introduction: COVID-19 Pandemic, the Game Changer
- 1.1. Covid-19 Pandemic, the Game Changer
- 1.2. Overview of Cybersecurity
- 1.3. Objectives of The Book
- 1.4. Structure of The Book
- References
- 2. COVID-19 Background
- 2.1. Nature
- 2.2. Origin
- 2.3. Spread
- 2.4. Global Response
- 2.5. Statistics
- 2.6. Link with Cybersecurity
- References
- 3. Cybersecurity Roles in a Pandemic
- 3.1. Preventive Roles
- 3.2. Detective Roles
- 3.3. Response Roles
- 3.4. Data Confidentiality
- 3.5. Data Integrity
- 3.6. Data Availability
- 3.7. Chapter Summary
- References
- 4. Cyberspace at Risk
- 4.1. Vulnerabilities and Exposures
- 4.1.1. Vulnerabilities
- 4.1.2. Exposures
- 4.1.3. Exposed Industries
- 4.2. Human Vulnerabilities
- 4.2.1. Human Factor of Security
- 4.2.2. Sympathy and Compassion
- 4.2.3. Urgency and Persuasion
- 4.2.4. Desperation and Confusion
- 4.2.5. Loyalty, Honesty, and Respect
- 4.2.6. Anger and Grief
- 4.2.7. Fear, Worry, and Anxiety
- 4.3. Technical and Operational Vulnerabilities
- 4.3.1. Expired Security Systems
- 4.3.2. Obsolete Operating Systems (OS) And Utilities
- 4.3.3. Capacity Gap
- 4.3.4. Misplaced Priorities
- 4.3.5. Disrupted Procedures
- 4.3.6. Administrative Loopholes
- 4.3.7. Network and Connectivity Exposures
- 4.4. Cyber Threats and Exploits
- 4.4.1. Cyber Threats
- 4.4.2. Perspective of the Digital Threat [27]
- 4.4.3. Threats to Healthcare Data
- 4.4.4. Cyber Exploits
- 4.4.5. Malware
- 4.4.6. Ransomware
- 4.4.7. Computer Virus
- 4.4.8. Adware and Spyware
- 4.4.9. Computer Worm
- 4.4.10. Trojan Horse
- 4.4.11. Logic Bomb
- 4.4.12. Spear Phishing.
- 4.4.13. Man-in-the-Middle Attack
- 4.4.14. Cyber Espionage
- 4.4.15. Cyber Bullying
- 4.4.16. Social Engineering
- 4.4.16.1. Lessons from the Twitter incident
- 4.4.17. Password Abuse
- 4.4.18. DDoS Attack
- 4.4.19. Fake Website
- 4.4.20. Website Hijack
- 4.4.21. Insider Collusion
- 4.5. Cybersecurity Impacts Of COVID-19
- 4.5.1. Identity Theft
- 4.5.2. Privacy Issues
- 4.5.3. Data Accessibility Issues
- 4.5.4. Data Loss
- 4.5.5. Reputation Damage
- 4.5.6. Revenue Loss
- 4.5.7. Service Disruption for Organizations
- 4.5.8. Service Disruption for Individuals
- 4.5.9. Crime Escalation
- 4.5.10. Fatality
- 4.6. Chapter Summary
- References
- 5. Challenges of Managing Cybersecurity at COVID-19
- 5.1. Identity and Access Control Challenges
- 5.1.1. Authentication Challenges
- 5.1.2. Authorization Challenges
- 5.1.3. Accountability Challenges
- 5.2. Incident Management Challenges
- 5.2.1. Incident Response Challenges
- 5.2.2. Incident Handling Challenges
- 5.3. Remote Communications Challenges
- 5.3.1. Work from Home Challenges
- 5.3.2. Telecommuting and Video Conferencing Challenges
- 5.4. Healthcare Data Management Challenges
- 5.4.1. Value-Based Classification Of Healthcare Data
- 5.4.2. Confidentiality Challenges
- 5.4.3. Integrity Challenges
- 5.4.4. Availability Challenges
- 5.5. Chapter Summary
- References
- 6. Cyberattack Mitigations During the Pandemic
- 6.1. Scenario of Defense in-depth
- 6.2. Administrative Countermeasures
- 6.3. Physical Countermeasures
- 6.4. Technical Countermeasures
- 6.5. Control Knobs
- 6.5.1. Preventive Control
- 6.5.1.1. Zoom preventive intervention
- 6.5.1.2. Anti-malware preventive intervention
- 6.5.2. Detective Control
- 6.5.3. Responsive Control
- 6.5.4. Corrective Control
- 6.5.5. Deterrent Control
- 6.6. Chapter Summary.
- 7. Cybersecurity in Post COVID-19 Digital Era
- 7.1. Cybersecurity Projections After the Pandemic
- 7.1.1. Cybersecurity in Artificial Intelligence (AI)
- 7.1.2. Cybersecurity in Big Data
- 7.1.3. Cybersecurity in Telemedicine
- 7.1.4. Cybersecurity in Aviation
- 7.2. Chapter Summary
- References
- 8. Conclusion and Recommendations
- 8.1. Remote Work Comes to Stay
- 8.2. Cryptographic and Steganographic Remedies
- 8.3. New Concept of Monitoring
- 8.4. More Stringent Email Policies
- 8.4.1. Proposed Design Model for Email Security Re-engineering
- 8.4.2. Implementation Strategy for Email Security Re-engineering
- 8.5. Punishment for Malware-related Offences
- 8.6. Acculturation of Social Engineering
- 8.6.1. Proposed Implementation Model for Social Engineering Acculturation
- 8.7. Better Management of Digital Identity (DID)
- 8.7.1. Requirements for Better Digital Identity Management
- 8.8. Last Line
- References
- Caveat
- Glossary
- Index.