Fifteen Deadly Cybersecurity Threats Aimed Covid-19

被引:0
作者
Alaboudi, Abdulellah A. [1 ]
机构
[1] Shaqra Univ, Comp Sci, Shaqraa, Saudi Arabia
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2021年 / 21卷 / 12期
关键词
Cybersecurity; Attacks; Security Threats; Covid-19; Mitigation recommendations; IOT; CHALLENGES; FRAMEWORK; SECURE; INTERNET; SCHEME; ATTACK;
D O I
10.22937/IJCSNS.2021.21.12.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cybersecurity has been vital for decades and will remain vital with upcoming ages with new technological developments. Every new day brings advancement in technology, which leads to new horizons, and at the same time, it brings new security challenges. Numerous researchers around the globe are continuously striving hard to provide better solutions for the daily basis of new arising security issues. However, the challenges are always there. These challenges become new norms during the current Covid pandemic, where most industries, small industrial enterprises, education, finance, public sectors, etc. were under several attacks and threats globally. The hacker has more opportunities during the pandemic period by shifting most of the operations live. This research enlightened the several cybersecurity attacks and threats during this pandemic time globally. It provided the best possible recommendations to avoid them using the cyber awareness and with appropriately linked training. This research can provide a guideline to the above stated sector by identifying the related attacks.
引用
收藏
页码:123 / 130
页数:8
相关论文
共 77 条
[1]   The Phishing Funnel Model: A Design Artifact to Predict User Susceptibility to Phishing Websites [J].
Abbasi, Ahmed ;
Dobolyi, David ;
Vance, Anthony ;
Zahedi, Fatemeh Mariam .
INFORMATION SYSTEMS RESEARCH, 2021, 32 (02) :410-436
[2]  
Alferidah Dhuha Khalid, 2020, 2020 International Conference on Computational Intelligence (ICCI), P103, DOI 10.1109/ICCI51257.2020.9247722
[3]   Towards Pattern-Based Change Verification Framework for Cloud-Enabled Healthcare Component-Based [J].
Ali, Sadia ;
Hafeez, Yaser ;
Jhanjhi, N. Z. ;
Humayun, Mamoona ;
Imran, Muhammad ;
Nayyar, Anand ;
Singh, Saurabh ;
Ra, In-Ho .
IEEE ACCESS, 2020, 8 :148007-148020
[4]  
Almulhim M, 2019, INT J COMPUT SCI NET, V19, P107
[5]  
Almusaylim ZA, 2018, 2018 4 INT C COMPUTE, P1, DOI DOI 10.1109/ICCOINS.2018.8510588
[6]   Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP [J].
Almusaylim, Zahrah A. ;
Jhanjhi, N. Z. ;
Alhumam, Abdulaziz .
SENSORS, 2020, 20 (21) :1-25
[7]   A review on smart home present state and challenges: linked to context-awareness internet of things (IoT) [J].
Almusaylim, Zahrah A. ;
Zaman, Noor .
WIRELESS NETWORKS, 2019, 25 (06) :3193-3204
[8]   A Multi-Perspective malware detection approach through behavioral fusion of API call sequence [J].
Amer, Eslam ;
Zelinka, Ivan ;
El-Sappagh, Shaker .
COMPUTERS & SECURITY, 2021, 110
[9]  
[Anonymous], GUY CAMPOS
[10]  
[Anonymous], SENSOR TOWER BLOG