A Study on the Cybersecurity Campaigns for the Coronavirus Pandemic
DOI:
https://doi.org/10.32628/CSEIT206648Keywords:
Cyber security, Covid-19, Technology, Social awarenessAbstract
Few company functions shifted priorities most so quickly once the COVID-19 crisis affected as company cybersecurity operations and also the technology suppliers that support them did. As legions of workers suddenly found themselves in a very work-from-home model, chief information-security officers (CISOs) adjusted, pivoting from engaged on routine tasks and toward semi-permanent goals to establishing secure connections for freshly minted remote workforces. CISOs conjointly took steps to forestall new network threats that focus on remote employees and to bolster business-facing operations and e-commerce once a surge in on-line looking throughout pandemic lockdowns. The response to the crisis continues to press department budgets and limit resources for alternative, less essential functions—a state of affairs that we tend to believe can direct defrayal in yr 2021, that several departments area unit starting to set up for. in keeping with the analysis, overall defrayal ought to taper far from the sector’s recent ascent in industries that were hit arduous by the COVID-19 crisis whereas holding steady in industries that haven't been as affected. The challenges that cybersecurity organizations face have spilled over to technology suppliers. Those firms have done their own pivots to stay up with customers’ shifting wants and to institute new ways that of doing business. To reach the post-COVID-19 era, technology suppliers should rethink their methods and offerings to accommodate a replacement security landscape. and that they should still monitor customers’ wants and alter sales, service, and coaching consequently. This study reveals the cyber security techniques within the pandemic state of affairs.
References
- Furnell S, Shah JN. Home operating and cyber security–an happening of unpreparedness? Comput Fraud Secur. 2020;2020(8):6-12.
- Hakak S, Khan WZ, Imran M, Choo KKR, Shoaib M. have you ever been a victim of COVID-19-related cyber incidents? Survey, taxonomy, and mitigation methods. IEEE Access. 2020;8:124134-124144
- Aleroud A, Zhou L. Phishing environments, techniques, and countermeasures: a survey. Comput Secur. 2017;68:160-196
- Aleroud A, Zhou L. Phishing environments, techniques, and countermeasures: a survey. Comput Secur. 2017;68:160-196 Anti-Phishing working party. Accessed Gregorian calendar month nine, 2020.
- Sattler J. COVID-19 scams — a way to spot and stop coronavirus email attacks. https://blog.f-secure.com/re-covid-19-scams-how-to-spot-and-stop-coronavirus-email-attacks/. Accessed Midsummer Day, 2020.
- Alshamrani A, Myneni S, Chowdhary A, Huang D. A survey on advanced persistent threats: techniques, solutions, challenges, and analysis opportunities. IEEE Commun Surv Tutor. 2019;21(2):1851-1877.
- Xiao L, Xu D, Mandayam NB, Poor HV. Attacker-centric read of a detection game against advanced persistent threats. IEEE Trans Mobile Comput. 2018;17(11):2512-2523.
- Malwarebytes. APTs and COVID-19: however advanced persistent threats use the coronavirus as a lure. https://resources.malwarebytes.com/files/2020/04/200407-MWB-COVID-White-Paper_Final.pdf. Accessed August twenty seven, 2020.
- National Cyber Security Centre (NCSC) and Communications Security institution (CSE). Advisory: APT29 targets COVID-19 immunogen development. https://www.ncsc.gov.uk/files/Advisory- APT29-targets-COVID-19-vaccine-development.pdf.
- National Cyber Security Centre (NCSC) and Cybersecurity and Infrastructure S ecurity Agency (CISA). Advisory: COVID-19 exploited by malicious cyber actors. https://www.ncsc.gov.uk/news/covid-19-exploited-by-cyber-actors-advisory;. Accessed June four, 2020
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.