Cybersecurity in the COVID 19 Pandemic 1st Edition by Kenneth Okereafor – Ebook PDF Instant Download/Delivery: 0367721430, 9780367721435
Full download Cybersecurity in the COVID 19 Pandemic 1st Edition after payment
Product details:
ISBN 10: 0367721430
ISBN 13: 9780367721435
Author: Kenneth Okereafor
As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy. Despite their effectiveness for remote work and online interactions, cyberspace alternatives ignited several Cybersecurity challenges. Malicious hackers capitalized on global anxiety and launched cyberattacks against unsuspecting victims. Internet fraudsters exploited human and system vulnerabilities and impacted data integrity, privacy, and digital behaviour. Cybersecurity in the COVID-19 Pandemic demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel, academic, and social networking data. The book simplifies the socio-technical aspects of Cybersecurity and draws valuable lessons from the impacts COVID-19 cyberattacks exerted on computer networks, online portals, and databases. The book also predicts the fusion of Cybersecurity into Artificial Intelligence and Big Data Analytics, the two emerging domains that will potentially dominate and redefine post-pandemic Cybersecurity research and innovations between 2021 and 2025. The book’s primary audience is individual and corporate cyberspace consumers across all professions intending to update their Cybersecurity knowledge for detecting, preventing, responding to, and recovering from computer crimes. Cybersecurity in the COVID-19 Pandemic is ideal for information officers, data managers, business and risk administrators, technology scholars, Cybersecurity experts and researchers, and information technology practitioners. Readers will draw lessons for protecting their digital assets from email phishing fraud, social engineering scams, malware campaigns, and website hijacks.
Cybersecurity in the COVID 19 Pandemic 1st Table of contents:
1 Introduction: COVID-19 Pandemic, the Game Changer
1.1 COVID-19 Pandemic, the Game Changer
1.2 Overview of Cybersecurity
1.3 Objectives of the Book
1.4 Structure of the Book
References
2 COVID-19 Background
2.1 Nature
2.2 Origin
2.3 Spread
2.4 Global Response
2.5 Statistics
2.6 Link with Cybersecurity
References
3 Cybersecurity Roles in a Pandemic
3.1 Preventive Roles
3.2 Detective Roles
3.3 Response Roles
3.4 Data Confidentiality
3.5 Data Integrity
3.6 Data Availability
3.7 Chapter Summary
References
4 Cyberspace at Risk
4.1 Vulnerabilities and Exposures
4.1.1 Vulnerabilities
4.1.2 Exposures
4.1.3 Exposed Industries
4.2 Human Vulnerabilities
4.2.1 Human Factor of Security
4.2.2 Sympathy and Compassion
4.2.3 Urgency and Persuasion
4.2.4 Desperation and Confusion
4.2.5 Loyalty, Honesty, and Respect
4.2.6 Anger and Grief
4.2.7 Fear, Worry, and Anxiety
4.3 Technical and Operational Vulnerabilities
4.3.1 Expired Security Systems
4.3.2 Obsolete Operating Systems (OS) and Utilities
4.3.3 Capacity Gap
4.3.4 Misplaced Priorities
4.3.5 Disrupted Procedures
4.3.6 Administrative Loopholes
4.3.7 Network and Connectivity Exposures
4.4 Cyber Threats and Exploits
4.4.1 Cyber Threats
4.4.2 Perspective of the Digital Threat [27]
4.4.3 Threats to Healthcare Data
4.4.4 Cyber Exploits
4.4.5 Malware
4.4.6 Ransomware
4.4.7 Computer Virus
4.4.8 Adware and Spyware
4.4.9 Computer Worm
4.4.10 Trojan Horse
4.4.11 Logic Bomb
4.4.12 Spear Phishing
4.4.13 Man-in-the-Middle Attack
4.4.14 Cyber Espionage
4.4.15 Cyber Bullying
4.4.16 Social Engineering
4.4.16.1 Lessons from the Twitter incident
4.4.17 Password Abuse
4.4.18 DDoS Attack
4.4.19 Fake Website
4.4.20 Website Hijack
4.4.21 Insider Collusion
4.5 Cybersecurity Impacts Of COVID-19
4.5.1 Identity Theft
4.5.2 Privacy Issues
4.5.3 Data Accessibility Issues
4.5.4 Data Loss
4.5.5 Reputation Damage
4.5.6 Revenue Loss
4.5.7 Service Disruption for Organizations
4.5.8 Service Disruption for Individuals
4.5.9 Crime Escalation
4.5.10 Fatality
4.6 Chapter Summary
References
5 Challenges of Managing Cybersecurity at COVID-19
5.1 Identity and Access Control Challenges
5.1.1 Authentication Challenges
5.1.2 Authorization Challenges
5.1.3 Accountability Challenges
5.2 Incident Management Challenges
5.2.1 Incident Response Challenges
5.2.2 Incident Handling Challenges
5.3 Remote Communications Challenges
5.3.1 Work from Home Challenges
5.3.2 Telecommuting and Video Conferencing Challenges
5.4 Healthcare Data Management Challenges
5.4.1 Value-Based Classification of Healthcare Data
5.4.2 Confidentiality Challenges
5.4.3 Integrity Challenges
5.4.4 Availability Challenges
5.5 Chapter Summary
References
6 Cyberattack Mitigations During the Pandemic
6.1 Scenario of defense in-depth
6.2 Administrative Countermeasures
6.3 Physical Countermeasures
6.4 Technical Countermeasures
6.5 Control Knobs
6.5.1 Preventive Control
6.5.1.1 Zoom preventive intervention
6.5.1.2 Anti-malware preventive intervention
6.5.2 Detective Control
6.5.3 Responsive Control
6.5.4 Corrective Control
6.5.5 Deterrent Control
6.6 Chapter Summary
7 Cybersecurity in Post COVID-19 Digital Era
7.1 Cybersecurity Projections After the Pandemic
7.1.1 Cybersecurity in Artificial Intelligence (AI)
7.1.2 Cybersecurity in Big Data
7.1.3 Cybersecurity in Telemedicine
7.1.4 Cybersecurity in Aviation
7.2 Chapter Summary
References
8 Conclusion and Recommendations
8.1 Remote Work Comes to Stay
8.2 Cryptographic and Steganographic Remedies
8.3 New Concept of Monitoring and Surveillance
8.4 More Stringent Email Policies
8.4.1 Proposed Design Model for Email Security Re-engineering
8.4.2 Implementation Strategy for Email Security Re-engineering
8.5 Punishment for Malware-Related Offences
8.6 Acculturation of Social Engineering
8.6.1 Proposed Implementation Model for Social Engineering Acculturation
8.7 Better Management of Digital Identity (DID)
8.7.1 Requirements for Better Digital Identity Management
8.8 Last Line
People also search for Cybersecurity in the COVID 19 Pandemic 1st:
cyber 9/12
cybersecurity 8-k
3 security
3 cyber threats
Tags:
Kenneth Okereafor,Cybersecurity,Pandemic,COVID