Filters








109 Hits in 7.8 sec

Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic [article]

Harjinder Singh Lallie, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier Bellekens
2020 arXiv   pre-print
This paper analyses the COVID-19 pandemic from a cyber-crime perspective and highlights the range of cyber-attacks experienced globally during the pandemic.  ...  The analysis shows how following what appeared to be large gaps between the initial outbreak of the pandemic in China and the first COVID-19 related cyber-attack, attacks steadily became much more prevalent  ...  TIMELINE OF COVID-19 RELATED CYBER-ATTACKS The cyber-crime incidents erupting from the COVID-19 pandemic pose serious threats to the safety and global economy of the world-wide population, hence understanding  ... 
arXiv:2006.11929v1 fatcat:hgmngnkemjfgxmi3t6hfxlvehm

Cyber Security in the Age of COVID-19: An Analysis of Cyber-Crime and Attacks

Aayad Al Hajj
2020 International Journal for Research in Applied Science and Engineering Technology  
The world has witnessed unprecedented change in all aspects of operations during this COVID-19 pandemic.  ...  The findings have revealed that since the pandemic outbreak, there has been an increased incidence of cyber-crimes and attacks.  ...  Block Diagram Connecting COVID-19 pandemic and cyber attacks or crime was based on timelines for the data breaches and the launching of attacks.  ... 
doi:10.22214/ijraset.2020.31216 fatcat:elze4iaehvagxevr6rfvit75ya

Cyber Security 2020 Front Matters

2020 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)  
• Software Security and Best Practices • Countering Crime & Fraud using Cyber Threat Intelligence • IT Security & Governance, Risk & Assurance in the Enterprise post-COVID-19 • DNS, Domains & COVID-19  ...  Siôn's work is currently focused on understanding the ways in which bad actors are making use of the global COVID-19 pandemic to promote their campaigns; specifically, around the misuse of the Domain Name  ... 
doi:10.1109/cybersecurity49315.2020.9138868 fatcat:ag3ewuo7hvenlhm2we2pba5aea

Pembangunan Pusat Pengendalian Operasional Keamanan Informasi (Pusdalops Kami) guna Meningkatkan Pelayanan E-Gov dari Ancaman Kejahatan Siber

Andrie Yuswanto, Budi Wibowo
2021 Format : Jurnal Ilmiah Teknik Informatika  
Isu strategis pengelolaan keamanan informasi pada layanan e-Government di Pemprov DKI Jakarta saat ini merupakan hal terpenting seiring dengan kejahatan siber/cyber crime yang semakin meningkat, oleh karena  ...  Tujuan dari inovasi ini adalah membangun web layanan informasi melalui SIJAKI, IT Security Operation Centre (SOC) atau Pusat Pengendalian Operasi Keamanan Informasi (PUSDALOPS KAMI) dan Live Chat/open  ...  Cyber Security Operation Center[3] User centric machine learning system Detects threats and analyzes user risk identification 2 Cyber Security in the Age of covid-19: A Timeline and Analysis  ... 
doi:10.22441/format.2020.v9.i2.003 fatcat:4q55nti3c5gnvhdjauhmzy77o4

The Visual Design of Network Data to Enhance Cyber Security Awareness of the Everyday Internet User

Fiona Carroll, Phil Legg, Bastian Bonkel
2020 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)  
Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy Martin Fejrskov, Jens Myrup Pedersen and Emmanouil Vasilomanolakis  ...  Siôn's work is currently focused on understanding the ways in which bad actors are making use of the global COVID-19 pandemic to promote their campaigns; specifically, around the misuse of the Domain Name  ...  In the age of Digitalisation, Cyber Security and Networks are the core pillars to deliver this evolution.  ... 
doi:10.1109/cybersa49311.2020.9139668 dblp:conf/cybersa/CarrollLB20 fatcat:mtrvk2uvknadrosalvit4xz67i

Factors Affecting Reputational Damage to Organisations Due to Cyberattacks

Srinath Perera, Xiaohua Jin, Alana Maurushat, De-Graft Joe Opoku
2022 Informatics  
The COVID-19 pandemic has brought massive online activities and increased cybersecurity incidents and cybercrime.  ...  Practically, this research is expected to aid organisations to properly position themselves to meet cyber incidents and become more competitive in the post-COVID-19 era.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/informatics9010028 fatcat:qw6yzk5nubdlnpmfdnu77pgxe4

Down the Cyber Rabbit Hole: Whistleblowing as a Means to Fulfilling Moral Obligations in Cyber Space

Hazlina Shaik Md Noor Alam
2020 Jurnal Undang-Undang dan Masyarakat  
Cyber whistleblowing can provide the basic framework for combating misdeeds online, as it forms a central part of cyber security.  ...  The act of blowing the whistle, all share common traits, to call attention too, and to punish any and all wrongdoings.  ...  ., Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic, https://arxiv.org/ pdf/2006.11929.pdf, (accessed on 21/10/2020).  ... 
doi:10.17576/juum-2020-27-02 fatcat:ivlzqcziy5h2xbnuwrtnchfibm

Social Engineering Attacks on Facebook – A Case Study

Abdul Shareef Pallivalappil, N. Jagadeesha S., K. Krishna Prasad
2021 Zenodo  
Cyber Criminals use Facebook as the main target for social engineering attacks because of its high number of users and popularity.  ...  Using a false profile is one of the most frequent techniques to execute a large-scale data harvesting attack.  ...  To investigate how the COVID-19 pandemic impacted the rise in cyber-attacks. 5. Use SWOT analysis for Facebook's performance evaluation. 3.  ... 
doi:10.5281/zenodo.5765883 fatcat:bs5qkpt6avcx3phvlgrxdojevi

Psychological Defence and Cyber Security

Ivo Juurvee, Uku Arold
2021 La Revista Icono 14  
Analysis of evolvement of the strategic documents guides the recommendations for even deeper blend of the technical cybersecurity culture with value-centric psychological defence and internationalisation  ...  Disruptive developments in the field of information and communication technology have enabled malicious actors to turn elements of the digital ecosystem into information weapons in hybrid conflict.  ...  During the first wave of COVID-19 pandemic Estonians considered information-related threats among the most pressing to Estonia.  ... 
doi:10.7195/ri14.v19i1.1628 fatcat:jy3b44blzfehni45asnpjhimeq

Social Engineering Attacks on Facebook – A Case Study

Abdul Shareef Pallivalappil, Jagadeesha S. N., Krishna Prasad K.
2021 International journal of case studies in business, IT, and education  
Cyber Criminals use Facebook as the main target for social engineering attacks because of its high number of users and popularity.  ...  Originality/Value: This paper study gives a brief overview of Social Engineering Attacks on Facebook based on a variety of data collected. Paper Type: Case study-based Research Analysis  ...  To understand the impact made by social engineering attacks on Facebook. 4. To investigate how the COVID-19 pandemic impacted the rise in cyber-attacks. 5.  ... 
doi:10.47992/ijcsbe.2581.6942.0135 fatcat:vmfjosispvbsvddepu27xywpem

Research trends in cybercrime victimization during 2010–2020: a bibliometric analysis

Huong Thi Ngoc Ho, Hai Thanh Luong
2022 SN Social Sciences  
Cyberbullying was identified as the most concerned issue over the years and cyber interpersonal crimes had the large number of research comparing to cyber-dependent crimes.  ...  during the period of 2010-2020.  ...  Similarly, the population of children with distinctive attributes has become a suitable target for cybercriminals, particularly given the context of increasing online learning due to Covid-19 pandemic  ... 
doi:10.1007/s43545-021-00305-4 pmid:35013728 pmcid:PMC8732210 fatcat:67u2n2h5czhl3gb6zwdscmg6bu

Impact of COVID-19 Pandemic on the Human Behavior

Mirza Waseem Hussain, Dept. of School Education, Govt. of J&K, India, Tabasum Mirza, Malik Mubasher Hassan, Dept. of School Education, Govt. of J&K, India, Dept. of Information Technology and Engineering, BGSB University Rajouri (J&K)-India
2020 International Journal of Education and Management Engineering  
The world has witnessed a sudden change of horizon in the legacy, lifestyle of the human being due to the COVID-19 (Corona virus).  ...  We have conducted a study on the immediate effects and the unprecedented change in the world we live in due to the ongoing pandemic.  ...  Acknowledgements We express our sincere thanks to the correspondents, who spare some time and provided feedback to us.  ... 
doi:10.5815/ijeme.2020.05.05 fatcat:4bszjiemnngf7cnij6yal3wj5i

Convergence of the Kovid 19 and cyber crime pandemic: Context and scope

Čelik Petar, Komarčević Miodrag, Dimić Milovan
2020 Megatrend Revija  
In the concluding section, the conversational meaning and hybrid nature of cyber threats emphasize the importance and need to innovate existing public policies and security agendas in creating a combined  ...  and way of life and work and thus established a new context, radically changing the security configuration and landscape.  ...  Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic, str. 1-2 • Herbert, S. (2016).  ... 
doi:10.5937/megrev2004049c doaj:4d3c7a1c0d9545559af427ca91ea9f41 fatcat:ryhdopvuazhkzn6xm7p77klm54

The role of digital technologies in humanitarian law, policy and action: Charting a path forward

Saman Rejali, Yannick Heiniger
2020 International Review of the Red Cross  
In this respect, one group of contributors to this issue (with their pieces appearing under the headers "Humanitarian Action in the Digital Age" and "Business and Digital Technologies in Humanitarian Crises  ...  First, digitalization is a priority topic for humanitarian organizations like the International Committee of the Red Cross (ICRC) 1 because it is rapidly shaping how humanitarian operations and assistance  ...  Gazi and A. Gazis, above note 28. International Review of the Red Cross The use of such data to track infectious diseases has great potential, especially during the current age of COVID-19.  ... 
doi:10.1017/s1816383121000114 fatcat:tjwhmropyzdazjjmfh3tg7qri4

Use Cases Definition and Pilot Overview Document v3

Marco Manso
2021 Zenodo  
Based on a compound framework of critical assets, threat taxonomy and actors, attack vectors and impact, this document updates the previous two volumes with six new use cases (use cases 22 to 27) that  ...  In particular, this document provides an overview and the main outcomes of the work performed by the SPHINX Consortium on the SPHINX use cases, as part of Task 2.4 – Reference Scenarios and Pilot Operations  ...  of time due to the conditions determined by the COVID-19 pandemic.  ... 
doi:10.5281/zenodo.5052727 fatcat:5ikl6umlafftroplmkbspcbmse
« Previous Showing results 1 — 15 out of 109 results