Muutke küpsiste eelistusi

E-raamat: Cybersecurity in the COVID-19 Pandemic [Taylor & Francis e-raamat]

  • Formaat: 168 pages, 6 Tables, black and white; 10 Illustrations, black and white
  • Ilmumisaeg: 17-Mar-2021
  • Kirjastus: CRC Press
  • ISBN-13: 9781003104124
  • Taylor & Francis e-raamat
  • Hind: 68,31 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Tavahind: 97,59 €
  • Säästad 30%
  • Formaat: 168 pages, 6 Tables, black and white; 10 Illustrations, black and white
  • Ilmumisaeg: 17-Mar-2021
  • Kirjastus: CRC Press
  • ISBN-13: 9781003104124

As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy. Despite their effectiveness for remote work and online interactions, cyberspace alternatives ignited several Cybersecurity challenges. Malicious hackers capitalized on global anxiety and launched cyberattacks against unsuspecting victims. Internet fraudsters exploited human and system vulnerabilities and impacted data integrity, privacy, and digital behaviour.

Cybersecurity in the COVID-19 Pandemic

demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel, academic, and social networking data. The book simplifies the socio-technical aspects of Cybersecurity and draws valuable lessons from the impacts COVID-19 cyberattacks exerted on computer networks, online portals, and databases. The book also predicts the fusion of Cybersecurity into Artificial Intelligence and Big Data Analytics, the two emerging domains that will potentially dominate and redefine post-pandemic Cybersecurity research and innovations between 2021 and 2025.

The book’s primary audience is individual and corporate cyberspace consumers across all professions intending to update their Cybersecurity knowledge for detecting, preventing, responding to, and recovering from computer crimes. Cybersecurity in the COVID-19 Pandemic is ideal for information officers, data managers, business and risk administrators, technology scholars, Cybersecurity experts and researchers, and information technology practitioners. Readers will draw lessons for protecting their digital assets from email phishing fraud, social engineering scams, malware campaigns, and website hijacks.

Preface xi
Foreword xiii
Acknowledgements xv
About the Author xvii
List of Tables
xix
List of Figures
xxi
List of Acronyms
xxiii
1 Introduction: COVID-19 Pandemic, the Game Changer
1(6)
1.1 COVID-19 Pandemic, the Game Changer
1(1)
1.2 Overview of Cybersecurity
2(2)
1.3 Objectives of the Book
4(1)
1.4 Structure of the Book
5(2)
References
6(1)
2 COVID-19 Background
7(10)
2.1 Nature
7(1)
2.2 Origin
8(1)
2.3 Spread
9(1)
2.4 Global Response
9(2)
2.5 Statistics
11(1)
2.6 Link with Cybersecurity
12(5)
References
13(4)
3 Cybersecurity Roles in a Pandemic
17(12)
3.1 Preventive Roles
18(1)
3.2 Detective Roles
19(1)
3.3 Response Roles
20(4)
3.4 Data Confidentiality
24(1)
3.5 Data Integrity
24(1)
3.6 Data Availability
25(1)
3.7
Chapter Summary
25(4)
References
26(3)
4 Cyberspace at Risk
29(74)
4.1 Vulnerabilities and Exposures
32(2)
4.1.1 Vulnerabilities
32(1)
4.1.2 Exposures
32(1)
4.1.3 Exposed Industries
33(1)
4.2 Human Vulnerabilities
34(3)
4.2.1 Human Factor of Security
34(1)
4.2.2 Sympathy and Compassion
35(1)
4.2.3 Urgency and Persuasion
36(1)
4.2.4 Desperation and Confusion
36(1)
4.2.5 Loyalty, Honesty, and Respect
36(1)
4.2.6 Anger and Grief
37(1)
4.2.7 Fear, Worry, and Anxiety
37(1)
4.3 Technical and Operational Vulnerabilities
37(3)
4.3.1 Expired Security Systems
37(1)
4.3.2 Obsolete Operating Systems (OS) and Utilities
38(1)
4.3.3 Capacity Gap
39(1)
4.3.4 Misplaced Priorities
39(1)
4.3.5 Disrupted Procedures
39(1)
4.3.6 Administrative Loopholes
40(1)
4.3.7 Network and Connectivity Exposures
40(1)
4.4 Cyber Threats and Exploits
40(37)
4.4.1 Cyber Threats
40(1)
4.4.2 Perspective of the Digital Threat [ 27]
41(1)
4.4.3 Threats to Healthcare Data
41(1)
4.4.4 Cyber Exploits
42(1)
4.4.5 Malware
42(1)
4.4.6 Ransomware
43(10)
4.4.7 Computer Virus
53(2)
4.4.8 Adware and Spyware
55(1)
4.4.9 Computer Worm
56(1)
4.4.10 Trojan Horse
56(3)
4.4.11 Logic Bomb
59(1)
4.4.12 Spear Phishing
59(4)
4.4.13 Man-in-the-Middle Attack
63(1)
4.4.14 Cyber Espionage
64(1)
4.4.15 Cyber Bullying
65(2)
4.4.16 Social Engineering
67(3)
4.4.16 I Lessons from the Twitter incident
70(1)
4.4.17 Password Abuse
71(1)
4.4.18 DDoS Attack
72(1)
4.4.19 Fake Website
73(1)
4.4.20 Website Hijack
74(2)
4.4.21 Insider Collusion
76(1)
4.5 Cybersecurity Impacts Of COVID-19
77(8)
4.5.1 Identity Theft
78(1)
4.5.2 Privacy Issues
79(1)
4.5.3 Data Accessibility Issues
80(1)
4.5.4 Data Loss
81(1)
4.5.5 Reputation Damage
82(1)
4.5.6 Revenue Loss
83(1)
4.5.7 Service Disruption for Organizations
84(1)
4.5.8 Service Disruption for Individuals
84(1)
4.5.9 Crime Escalation
84(1)
4.5.10 Fatality
85(1)
4.6
Chapter Summary
85(18)
References
86(17)
5 Challenges of Managing Cybersecurity at COVID-19
103(16)
5.1 Identity and Access Control Challenges
104(1)
5.1.1 Authentication Challenges
104(1)
5.1.2 Authorization Challenges
104(1)
5.1.3 Accountability Challenges
105(1)
5.2 Incident Management Challenges
105(1)
5.2.1 Incident Response Challenges
105(1)
5.2.2 Incident Handling Challenges
105(1)
5.3 Remote Communications Challenges
106(2)
5.3.1 Work from Home Challenges
106(2)
5.3.2 Telecommuting and Video Conferencing Challenges
108(1)
5.4 Healthcare Data Management Challenges
108(8)
5.4.1 Value-Based Classification of Healthcare Data
109(1)
5.4.2 Confidentiality Challenges
110(2)
5.4.3 Integrity Challenges
112(2)
5.4.4 Availability Challenges
114(2)
5.5
Chapter Summary
116(3)
References
116(3)
6 Cyberattack Mitigations During the Pandemic
119(6)
6.1 Scenario of defense in-depth
119(2)
6.2 Administrative Countermeasures
121(1)
6.3 Physical Countermeasures
121(1)
6.4 Technical Countermeasures
121(1)
6.5 Control Knobs
122(2)
6.5.1 Preventive Control
122(1)
6.5.1.1 Zoom preventive intervention
122(1)
6.5.1.2 Anti-malware preventive intervention
123(1)
6.5.2 Detective Control
123(1)
6.5.3 Responsive Control
123(1)
6.5.4 Corrective Control
123(1)
6.5.5 Deterrent Control
123(1)
6.6
Chapter Summary
124(1)
7 Cybersecurity in Post COVID-19 Digital Era
125(14)
7.1 Cybersecurity Projections After the Pandemic
126(8)
7.1.1 Cybersecurity in Artificial Intelligence (Al)
127(1)
7.1.2 Cybersecurity in Big Data
128(1)
7.1.3 Cybersecurity in Telemedicine
129(3)
7.1.4 Cybersecurity in Aviation
132(2)
7.2
Chapter Summary
134(5)
References
135(4)
8 Conclusion and Recommendations
139(12)
8.1 Remote Work Comes to Stay
139(1)
8.2 Cryptographic and Steganographic Remedies
140(1)
8.3 New Concept of Monitoring and Surveillance
141(1)
8.4 More Stringent Email Policies
141(1)
8.4.1 Proposed Design Model for Email Security Re-engineering
142(1)
8.4.2 Implementation Strategy for Email Security Re-engineering
142(1)
8.5 Punishment for Malware-Related Offences
142(1)
8.6 Acculturation of Social Engineering
143(2)
8.6.1 Proposed Implementation Model for Social Engineering Acculturation
144(1)
8.7 Better Management of Digital Identity (DID)
145(3)
8.7.1 Requirements for Better Digital Identity Management
147(1)
8.8 Last Line
148(3)
References
149(2)
Caveat 151(2)
Glossary 153(8)
Index 161
Kenneth Okereafor is Deputy General Manager responsible for Database Security at the National Health Insurance Scheme (NHIS), Nigeria. He is a United Nations trained Cybersecurity and Biometric expert with 24 years ICT experience spanning industry, government, and academia. He has specialized skills in Threat Mitigation Technologies for preventing, detecting, and responding to Cyberattacks. He is a member of the International Organization for Standardizations Technical Committee on Health Informatics (ISO-TC-215), and he chairs ISOs Security and Privacy Working Group-4 in Nigeria developing Cybersecurity standards for digital health. Kenneth was a key member in developing Nigerias eHealth Strategic Framework (2015-2020) in collaboration with the WHO and UN Foundation. Prior to joining NHIS in 2013, he had extensive data security work experience in telecoms, diplomatic relations, and public sector including the US Department of State where he supported the Biometric security rollout for personnel at the US Embassy in Nigeria. In addition to advanced Cybersecurity training by ITU, UNESCO, SANS Institute, EC Council, and ISACA, Kenneth holds a PhD in Cybersecurity from Azteca University Mexico, where his research in Biometric Security resulted in the Multi-Modal Random Trait Biometric Liveness Detection System (MMRTBLDS), a framework that improves biometric authentication by diminishing imposter predictability. He graduated cum laude and obtained an MSc in Network Security and BSc in Computer Information Systems from American Heritage University of Southern California, and has a first class background in Electronic and Telecommunications Engineering. His research interests centre on Global Cybersecurity, Incident Response, Cyberattack Prevention and Mitigation, Biometric Security, Threat Intelligence, eHealth Security, Telemedicine, and Digital Identities.