Preface |
|
xi | |
Foreword |
|
xiii | |
Acknowledgements |
|
xv | |
About the Author |
|
xvii | |
|
|
xix | |
|
|
xxi | |
|
|
xxiii | |
|
1 Introduction: COVID-19 Pandemic, the Game Changer |
|
|
1 | (6) |
|
1.1 COVID-19 Pandemic, the Game Changer |
|
|
1 | (1) |
|
1.2 Overview of Cybersecurity |
|
|
2 | (2) |
|
1.3 Objectives of the Book |
|
|
4 | (1) |
|
1.4 Structure of the Book |
|
|
5 | (2) |
|
|
6 | (1) |
|
|
7 | (10) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
9 | (2) |
|
|
11 | (1) |
|
2.6 Link with Cybersecurity |
|
|
12 | (5) |
|
|
13 | (4) |
|
3 Cybersecurity Roles in a Pandemic |
|
|
17 | (12) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
20 | (4) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
25 | (4) |
|
|
26 | (3) |
|
|
29 | (74) |
|
4.1 Vulnerabilities and Exposures |
|
|
32 | (2) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
4.2 Human Vulnerabilities |
|
|
34 | (3) |
|
4.2.1 Human Factor of Security |
|
|
34 | (1) |
|
4.2.2 Sympathy and Compassion |
|
|
35 | (1) |
|
4.2.3 Urgency and Persuasion |
|
|
36 | (1) |
|
4.2.4 Desperation and Confusion |
|
|
36 | (1) |
|
4.2.5 Loyalty, Honesty, and Respect |
|
|
36 | (1) |
|
|
37 | (1) |
|
4.2.7 Fear, Worry, and Anxiety |
|
|
37 | (1) |
|
4.3 Technical and Operational Vulnerabilities |
|
|
37 | (3) |
|
4.3.1 Expired Security Systems |
|
|
37 | (1) |
|
4.3.2 Obsolete Operating Systems (OS) and Utilities |
|
|
38 | (1) |
|
|
39 | (1) |
|
4.3.4 Misplaced Priorities |
|
|
39 | (1) |
|
4.3.5 Disrupted Procedures |
|
|
39 | (1) |
|
4.3.6 Administrative Loopholes |
|
|
40 | (1) |
|
4.3.7 Network and Connectivity Exposures |
|
|
40 | (1) |
|
4.4 Cyber Threats and Exploits |
|
|
40 | (37) |
|
|
40 | (1) |
|
4.4.2 Perspective of the Digital Threat [ 27] |
|
|
41 | (1) |
|
4.4.3 Threats to Healthcare Data |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
43 | (10) |
|
|
53 | (2) |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
56 | (3) |
|
|
59 | (1) |
|
|
59 | (4) |
|
4.4.13 Man-in-the-Middle Attack |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
65 | (2) |
|
4.4.16 Social Engineering |
|
|
67 | (3) |
|
4.4.16 I Lessons from the Twitter incident |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
74 | (2) |
|
|
76 | (1) |
|
4.5 Cybersecurity Impacts Of COVID-19 |
|
|
77 | (8) |
|
|
78 | (1) |
|
|
79 | (1) |
|
4.5.3 Data Accessibility Issues |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
83 | (1) |
|
4.5.7 Service Disruption for Organizations |
|
|
84 | (1) |
|
4.5.8 Service Disruption for Individuals |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
85 | (18) |
|
|
86 | (17) |
|
5 Challenges of Managing Cybersecurity at COVID-19 |
|
|
103 | (16) |
|
5.1 Identity and Access Control Challenges |
|
|
104 | (1) |
|
5.1.1 Authentication Challenges |
|
|
104 | (1) |
|
5.1.2 Authorization Challenges |
|
|
104 | (1) |
|
5.1.3 Accountability Challenges |
|
|
105 | (1) |
|
5.2 Incident Management Challenges |
|
|
105 | (1) |
|
5.2.1 Incident Response Challenges |
|
|
105 | (1) |
|
5.2.2 Incident Handling Challenges |
|
|
105 | (1) |
|
5.3 Remote Communications Challenges |
|
|
106 | (2) |
|
5.3.1 Work from Home Challenges |
|
|
106 | (2) |
|
5.3.2 Telecommuting and Video Conferencing Challenges |
|
|
108 | (1) |
|
5.4 Healthcare Data Management Challenges |
|
|
108 | (8) |
|
5.4.1 Value-Based Classification of Healthcare Data |
|
|
109 | (1) |
|
5.4.2 Confidentiality Challenges |
|
|
110 | (2) |
|
5.4.3 Integrity Challenges |
|
|
112 | (2) |
|
5.4.4 Availability Challenges |
|
|
114 | (2) |
|
|
116 | (3) |
|
|
116 | (3) |
|
6 Cyberattack Mitigations During the Pandemic |
|
|
119 | (6) |
|
6.1 Scenario of defense in-depth |
|
|
119 | (2) |
|
6.2 Administrative Countermeasures |
|
|
121 | (1) |
|
6.3 Physical Countermeasures |
|
|
121 | (1) |
|
6.4 Technical Countermeasures |
|
|
121 | (1) |
|
|
122 | (2) |
|
|
122 | (1) |
|
6.5.1.1 Zoom preventive intervention |
|
|
122 | (1) |
|
6.5.1.2 Anti-malware preventive intervention |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
124 | (1) |
|
7 Cybersecurity in Post COVID-19 Digital Era |
|
|
125 | (14) |
|
7.1 Cybersecurity Projections After the Pandemic |
|
|
126 | (8) |
|
7.1.1 Cybersecurity in Artificial Intelligence (Al) |
|
|
127 | (1) |
|
7.1.2 Cybersecurity in Big Data |
|
|
128 | (1) |
|
7.1.3 Cybersecurity in Telemedicine |
|
|
129 | (3) |
|
7.1.4 Cybersecurity in Aviation |
|
|
132 | (2) |
|
|
134 | (5) |
|
|
135 | (4) |
|
8 Conclusion and Recommendations |
|
|
139 | (12) |
|
8.1 Remote Work Comes to Stay |
|
|
139 | (1) |
|
8.2 Cryptographic and Steganographic Remedies |
|
|
140 | (1) |
|
8.3 New Concept of Monitoring and Surveillance |
|
|
141 | (1) |
|
8.4 More Stringent Email Policies |
|
|
141 | (1) |
|
8.4.1 Proposed Design Model for Email Security Re-engineering |
|
|
142 | (1) |
|
8.4.2 Implementation Strategy for Email Security Re-engineering |
|
|
142 | (1) |
|
8.5 Punishment for Malware-Related Offences |
|
|
142 | (1) |
|
8.6 Acculturation of Social Engineering |
|
|
143 | (2) |
|
8.6.1 Proposed Implementation Model for Social Engineering Acculturation |
|
|
144 | (1) |
|
8.7 Better Management of Digital Identity (DID) |
|
|
145 | (3) |
|
8.7.1 Requirements for Better Digital Identity Management |
|
|
147 | (1) |
|
|
148 | (3) |
|
|
149 | (2) |
Caveat |
|
151 | (2) |
Glossary |
|
153 | (8) |
Index |
|
161 | |