Your browser doesn't support javascript.
Show: 20 | 50 | 100
Results 1 - 8 de 8
Filter
1.
The New Advanced Society: Artificial Intelligence and Industrial Internet of Things Paradigm ; : 1-14, 2022.
Article in English | Scopus | ID: covidwho-2293897

ABSTRACT

The World Health Organization (WHO) declared the COVID-19 outbreak as a global public health emergency of international concern. The pandemic has increased the suffering of humanity enormously. Loss of income and employment opportunities is the massive adverse effect of the pandemic. Due care needs to be taken by the top-level management of every sector to understand the adverse effect and causes or problems and to build the measures to overcome from the pandemic. The researcher had attempted and discussed the themes viz., areas of management, financial institutions cyber-crime, economic notion, human depression, school and colleges closures, returning of migrant laborers to identify the constraints and to come up with the remedial measures to overcome those constraints and how to build a new advanced society of Post COVID-19 era. © 2022 Scrivener Publishing LLC.

2.
2nd IEEE International Symposium on Sustainable Energy, Signal Processing and Cyber Security, iSSSC 2022 ; 2022.
Article in English | Scopus | ID: covidwho-2277877

ABSTRACT

The world is recovering from Covid-19, and along with that it has brought the zeal to use the digital media, concepts like work from home, connecting the whole world using applications and social media. However, with good things follow bad and we observe a lot of people being affected by social engineering attack via multiple means be it as elementary as an unfamiliar person calling us to ask us about our day or complicated and puzzling as someone acting like the victim's senior. In some cases, people are aware of the process but are unaware of the terms they are victimized with others do not know many kinds of social engineering attacks. Therefore, it is imperative for an organization and an individual that they are aware of how Social Engineering is carried out. In this paper, we represent the survey filled by more than 100 people from diverse age groups and work profiles seeking their views on the attack and knowledge about social engineering. © 2022 IEEE.

3.
Advances in Information Security ; 101:7-25, 2023.
Article in English | Scopus | ID: covidwho-2173828

ABSTRACT

The COVID-19 Pandemic has accelerated the digital transformation of organisations and services across the United Kingdom (UK) providing numerous opportunities for economic and social development in the UK. However, these opportunities also bring about unprecedented challenges for law enforcement agencies (LEAs), and has led to the progression of serious and advanced cyber threats. This chapter aims to analyse different types of cyber threats, identify the risk they pose to national security, and provide a critical evaluation of cybersecurity policy in the UK. The chapter will examine how current UK Government policies and practices effectively mitigate the cyber threats to national security, and will explore how these responses can be further developed, with reference to the National Cyber Security Centre, the Active Cyber Defence programme, and the National Cyber Security Strategy 2022–2030. The methodological approach for this chapter utilises a literature-based review to further develop research on the criminological issue of cyber threats, cybersecurity and national security in the UK. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.

4.
i-Manager's Journal on Information Technology ; 11(1):35-47, 2022.
Article in English | ProQuest Central | ID: covidwho-2056928

ABSTRACT

The Internet has changed everyone's life. Social networks may have only been initiated with the help of the Internet. Today's generation is using the internet, which means social media like Snap-chat, Twitter, Facebook, etc., is increasing. Hence, the purpose of this paper is to understand the positive and negative outcomes of social media. In addition, this paper discusses the current situation, the previous situation, and the situation where people do not have social networks. Finally, the influence of social networks on different stages of a person's life is described.

5.
2021 Ieee International Conference on Intelligence and Security Informatics (Isi) ; : 73-78, 2021.
Article in English | Web of Science | ID: covidwho-2018908

ABSTRACT

Understanding the properties exhibited by Spatial-temporal evolution of cyber attacks improve cyber threat intelligence. In addition, better understanding on threats patterns is a key feature for cyber threats prevention, detection, and management and for enhancing defenses. In this work, we study different aspects of emerging threats in the wild shared by 160,000 global participants form all industries. First, we perform an exploratory data analysis of the collected cyber threats. We investigate the most targeted countries, most common malwares and the distribution of attacks frequency by localisation. Second, we extract attacks' spreading patterns at country level. We model these behaviors using transition graphs decorated with probabilities of switching from a country to another. Finally, we analyse the extent to which cyber threats have been affected by the COVID-19 outbreak and sanitary measures imposed by governments to prevent the virus from spreading.

6.
Contributions to Management Science ; : 221-235, 2022.
Article in English | Scopus | ID: covidwho-1739262

ABSTRACT

The ongoing COVID-19 pandemic has caused numerous changes to our daily lives. One of these changes was our increased usage of the internet as a medium to purchase products and services or even manage our finances among others. Such overreliance caused numerous challenges to organisations and individuals alike circling around protection of information shared digitally. This is particularly evident since COVID-19 contributed to the increase in cybercrime. To facilitate their cybercrime, cybercriminals designed numerous cyber-attacks to steal sensitive information from organisations and users for financial gains. The advent of the pandemic and remote working brought the issue of jurisdiction in relation to cross-border crime to the forefront. With most of the financial sector working from home using online solutions and several employees not working from the country of employment rather from their country of origin or from other countries, the issue of cybersecurity and cybercrime becomes a matter of prime importance. Due to the pandemic, investigations and international collaborations on cross-border crime became more delicate and, by adding the issue of applicable law and jurisdiction, the picture becomes more problematic especially since pursuing criminal activity turned into a difficult task during the pandemic. With that in mind, the paper probes the issue of cross-border digital crime and the problem of conflict of laws applicable on cybercrime. It scrutinises the exterritoriality of laws through the territoriality principal and probes the role of the principal of jurisdiction over nationals to settle the debate about the governing law over digital financial crimes committed in cyberspace originating in another country. This is done while keeping in mind the need to establish sufficient links between the cybercrime and the applicable law. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.

7.
Lecture Notes in Networks and Systems ; 257:303-316, 2022.
Article in English | Scopus | ID: covidwho-1669708

ABSTRACT

The chapter describes cyber-attack at the Rudolph and Stephanie Regional Hospital in Benešov, authors’ analysis of the attack, situation in smaller hospitals, and calls for a minimal cyber security standard. The attack and its consequences are described, along with actions taken by the Czech National Cyber and Information Security Agency. The chapter provides a qualitative analysis of the attack and issued measures in smaller hospitals. The level of ICT throughout hospitals was found very uneven mostly because of their technology debt and also because there is no minimum ICT security level they must meet, unless they are part of the critical infrastructure. Authors propose to establish a minimal cyber security standard for all essential service sector organizations, be they part of the critical infrastructure or not. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.

8.
Comput Secur ; 105: 102248, 2021 Jun.
Article in English | MEDLINE | ID: covidwho-1116512

ABSTRACT

The COVID-19 pandemic was a remarkable, unprecedented event which altered the lives of billions of citizens globally resulting in what became commonly referred to as the new-normal in terms of societal norms and the way we live and work. Aside from the extraordinary impact on society and business as a whole, the pandemic generated a set of unique cyber-crime related circumstances which also affected society and business. The increased anxiety caused by the pandemic heightened the likelihood of cyber-attacks succeeding corresponding with an increase in the number and range of cyber-attacks. This paper analyses the COVID-19 pandemic from a cyber-crime perspective and highlights the range of cyber-attacks experienced globally during the pandemic. Cyber-attacks are analysed and considered within the context of key global events to reveal the modus-operandi of cyber-attack campaigns. The analysis shows how following what appeared to be large gaps between the initial outbreak of the pandemic in China and the first COVID-19 related cyber-attack, attacks steadily became much more prevalent to the point that on some days, three or four unique cyber-attacks were being reported. The analysis proceeds to utilise the UK as a case study to demonstrate how cyber-criminals leveraged salient events and governmental announcements to carefully craft and execute cyber-crime campaigns.

SELECTION OF CITATIONS
SEARCH DETAIL