Cargando…
Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies
Cybercriminals are constantly on the lookout for new attack vectors, and the recent COVID-19 pandemic is no exception. For example, social distancing measures have resulted in travel bans, lockdowns, and stay-at-home orders, consequently increasing the reliance on information and communications tech...
Formato: | Online Artículo Texto |
---|---|
Lenguaje: | English |
Publicado: |
IEEE
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8043498/ https://www.ncbi.nlm.nih.gov/pubmed/34192113 http://dx.doi.org/10.1109/ACCESS.2020.3006172 |
_version_ | 1783678316988858368 |
---|---|
collection | PubMed |
description | Cybercriminals are constantly on the lookout for new attack vectors, and the recent COVID-19 pandemic is no exception. For example, social distancing measures have resulted in travel bans, lockdowns, and stay-at-home orders, consequently increasing the reliance on information and communications technologies, such as Zoom. Cybercriminals have also attempted to exploit the pandemic to facilitate a broad range of malicious activities, such as attempting to take over videoconferencing platforms used in online meetings/educational activities, information theft, and other fraudulent activities. This study briefly reviews some of the malicious cyber activities associated with COVID-19 and the potential mitigation solutions. We also propose an attack taxonomy, which (optimistically) will help guide future risk management and mitigation responses. |
format | Online Article Text |
id | pubmed-8043498 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | IEEE |
record_format | MEDLINE/PubMed |
spelling | pubmed-80434982021-04-28 Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies IEEE Access Communications Technology Cybercriminals are constantly on the lookout for new attack vectors, and the recent COVID-19 pandemic is no exception. For example, social distancing measures have resulted in travel bans, lockdowns, and stay-at-home orders, consequently increasing the reliance on information and communications technologies, such as Zoom. Cybercriminals have also attempted to exploit the pandemic to facilitate a broad range of malicious activities, such as attempting to take over videoconferencing platforms used in online meetings/educational activities, information theft, and other fraudulent activities. This study briefly reviews some of the malicious cyber activities associated with COVID-19 and the potential mitigation solutions. We also propose an attack taxonomy, which (optimistically) will help guide future risk management and mitigation responses. IEEE 2020-06-30 /pmc/articles/PMC8043498/ /pubmed/34192113 http://dx.doi.org/10.1109/ACCESS.2020.3006172 Text en This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/ https://creativecommons.org/licenses/by/4.0/This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/ |
spellingShingle | Communications Technology Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies |
title | Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies |
title_full | Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies |
title_fullStr | Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies |
title_full_unstemmed | Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies |
title_short | Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies |
title_sort | have you been a victim of covid-19-related cyber incidents? survey, taxonomy, and mitigation strategies |
topic | Communications Technology |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8043498/ https://www.ncbi.nlm.nih.gov/pubmed/34192113 http://dx.doi.org/10.1109/ACCESS.2020.3006172 |
work_keys_str_mv | AT haveyoubeenavictimofcovid19relatedcyberincidentssurveytaxonomyandmitigationstrategies AT haveyoubeenavictimofcovid19relatedcyberincidentssurveytaxonomyandmitigationstrategies AT haveyoubeenavictimofcovid19relatedcyberincidentssurveytaxonomyandmitigationstrategies AT haveyoubeenavictimofcovid19relatedcyberincidentssurveytaxonomyandmitigationstrategies AT haveyoubeenavictimofcovid19relatedcyberincidentssurveytaxonomyandmitigationstrategies |