Mitigation of Cyber Security Risk Threats During the Covid-19 Pandemic
DOI:
https://doi.org/10.34306/ijcitsm.v3i2.135Keywords:
Cybersecurity, Cyberattacks, Covid-19 Pandemic, Mitigation, TechnologyAbstract
Cyber security mitigation is becoming an increasingly urgent aspect in today's digital era, in response to the threat of theft and disruption to information systems, software and hardware. The Covid-19 pandemic has exacerbated this situation by increasing the chances of success of cyberattacks, as the number and scope of such attacks increases. The impact of increasing levels of cyberattacks is the wider disruption to various sectors. This study aims to investigate cybersecurity issues that arose during the Covid-19 pandemic. Researchers analyzed the current conditions as well as cybercrime acts and various types of cyberattacks carried out during this period. In addition, this research also proposes a practical approach to mitigating the risk of cyber attacks that can be implemented by organizations. It is important for organizations to strengthen the protection of their data and critical assets by implementing a comprehensive cybersecurity approach. The results of this study present various techniques for detecting and avoiding cybercrime threats, even after the pandemic is over. By implementing this approach, damage caused by cyber attacks can be minimized, maintaining the integrity of an organization's data and systems. For future research, it is necessary to carry out further development in the field of cyber security by integrating the latest technologies such as artificial intelligence, blockchain, Internet of Things, and other technologies. In this way, efforts to mitigate cyber attacks can continue to be improved, maintaining the integrity and security of information systems in this ever-growing digital era. This research makes an important contribution to understanding and addressing cyber security issues during the pandemic and provides a foundation for further development in the future.
References
I. Chakraborty and P. Maity, “COVID-19 outbreak: Migration, effects on society, global environment and prevention,” Sci. Total Environ., vol. 728, p. 138882, 2020.
L. Kuznetsova, “Covid-19: The world community expects the World Health Organization to play a stronger leadership and coordination role in pandemics control,” Front. Public Heal., vol. 8, p. 470, 2020.
F. Alfiana et al., “Apply the Search Engine Optimization (SEO) Method to determine Website Ranking on Search Engines,” Int. J. Cyber IT Serv. Manag., vol. 3, no. 1, pp. 65–73, 2023.
W. He, Z. J. Zhang, and W. Li, “Information technology solutions, challenges, and suggestions for tackling the COVID-19 pandemic,” Int. J. Inf. Manage., vol. 57, p. 102287, 2021.
K. Kano and E. Dolan, “Data Compression Analysis of Multimedia Video on Demand and DEMAND TV Broadcast Systems on the Network,” Int. J. Cyber IT Serv. Manag., vol. 3, no. 1, pp. 48–53, 2023.
S. W. Ross et al., “Maximizing the calm before the storm: tiered surgical response plan for novel coronavirus (COVID-19),” J. Am. Coll. Surg., vol. 230, no. 6, pp. 1080–1091, 2020.
N. Donthu and A. Gustafsson, “Effects of COVID-19 on business and research,” Journal of business research, vol. 117. Elsevier, pp. 284–289, 2020.
L. K. Choi, K. B. Rii, and H. W. Park, “K-Means and J48 Algorithms to Categorize Student Research Abstracts,” Int. J. Cyber IT Serv. Manag., vol. 3, no. 1, pp. 61–64, 2023.
R. Klint, “Cybersecurity in home-office environments: An examination of security best practices post Covid.” 2023.
A. Eiji and S. Mehta, “Simulation-Based 5G Femtocell Network System Performance Analysis,” Int. J. Cyber IT Serv. Manag., vol. 3, no. 1, pp. 74–78, 2023.
W. Iqbal, H. Abbas, M. Daneshmand, B. Rauf, and Y. A. Bangash, “An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security,” IEEE Internet Things J., vol. 7, no. 10, pp. 10250–10276, 2020.
D. Papatsaroucha, Y. Nikoloudakis, I. Kefaloukos, E. Pallis, and E. K. Markakis, “A survey on human and personality vulnerability assessment in cyber-security: Challenges, approaches, and open issues,” arXiv Prepr. arXiv2106.09986, 2021.
J. Chigada and R. Madzinga, “Cyberattacks and threats during COVID-19: A systematic literature review,” South African J. Inf. Manag., vol. 23, no. 1, pp. 1–11, 2021.
C. Yegen, A. M. Kirik, and A. Çetinkaya, “Sustainability, Digital Security, and Cyber Hygiene During the Covid-19 Pandemic,” in New Normal in Digital Enterprises: Strategies for Sustainable Development, Springer, 2023, pp. 91–105.
B. Collier, R. Clayton, A. Hutchings, and D. Thomas, “Cybercrime is (often) boring: maintaining the infrastructure of cybercrime economies,” 2020.
H. S. Lallie et al., “Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic,” Comput. Secur., vol. 105, p. 102248, 2021.
S. R. Zahra, M. A. Chishti, A. I. Baba, and F. Wu, “Detecting Covid-19 chaos driven phishing/malicious URL attacks by a fuzzy logic and data mining based intelligence system,” Egypt. Informatics J., vol. 23, no. 2, pp. 197–214, 2022.
D. Mustajab, A. Bauw, A. Rasyid, A. Irawan, M. A. Akbar, and M. A. Hamid, “Working from home phenomenon as an effort to prevent COVID-19 attacks and its impacts on work productivity,” TIJAB (The Int. J. Appl. Business), vol. 4, no. 1, p. 13, 2020.
M. Jbair, B. Ahmad, C. Maple, and R. Harrison, “Threat modelling for industrial cyber physical systems in the era of smart manufacturing,” Comput. Ind., vol. 137, p. 103611, 2022.
B. Pranggono and A. Arabo, “COVID‐19 pandemic cybersecurity issues,” Internet Technol. Lett., vol. 4, no. 2, p. e247, 2021.
A. Minnaar, “‘Gone phishing’: the cynical and opportunistic exploitation of the Coronavirus pandemic by cybercriminals,” Acta Criminol. African J. Criminol. Vict., vol. 33, no. 3, pp. 28–53, 2020.
D. Gupta, S. Bhatt, M. Gupta, and A. S. Tosun, “Future smart connected communities to fight covid-19 outbreak,” Internet of Things, vol. 13, p. 100342, 2021.
S. Hakak, W. Z. Khan, M. Imran, K.-K. R. Choo, and M. Shoaib, “Have you been a victim of COVID-19-related cyber incidents? Survey, taxonomy, and mitigation strategies,” Ieee Access, vol. 8, pp. 124134–124144, 2020.
J. Kolouch, T. Zahradnický, and A. Kučínský, “Cyber Security: Lessons Learned From Cyber-Attacks on Hospitals in the COVID-19 Pandemic,” Masaryk Univ. J. Law Technol., vol. 15, no. 2, pp. 301–341, 2021.
R. Goenka, M. Chawla, and N. Tiwari, “A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy,” Int. J. Inf. Secur., pp. 1–30, 2023.
R. Alabdan, “Phishing attacks survey: Types, vectors, and technical approaches,” Futur. internet, vol. 12, no. 10, p. 168, 2020.
A. F. Al‐Qahtani and S. Cresci, “The COVID‐19 scamdemic: A survey of phishing attacks and their countermeasures during COVID‐19,” IET Inf. Secur., vol. 16, no. 5, pp. 324–345, 2022.
M. Bitaab et al., “Scam pandemic: How attackers exploit public fear through phishing,” in 2020 APWG Symposium on Electronic Crime Research (eCrime), IEEE, 2020, pp. 1–10.
P. Tulkarm, “A Survey of Social Engineering Attacks: Detection and Prevention Tools,” J. Theor. Appl. Inf. Technol., vol. 99, no. 18, 2021.
N. Katagiri, “Explaining Cyberspace Dynamics in the COVID Era,” Glob. Stud. Q., vol. 2, no. 3, p. ksac022, 2022.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Kemian Dai, Ichell Laurant Kawaki, Lintang Dwi Sakti

This work is licensed under a Creative Commons Attribution 4.0 International License.