Cargando…

Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies

Cybercriminals are constantly on the lookout for new attack vectors, and the recent COVID-19 pandemic is no exception. For example, social distancing measures have resulted in travel bans, lockdowns, and stay-at-home orders, consequently increasing the reliance on information and communications tech...

Descripción completa

Detalles Bibliográficos
Formato: Online Artículo Texto
Lenguaje:English
Publicado: IEEE 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8043498/
https://www.ncbi.nlm.nih.gov/pubmed/34192113
http://dx.doi.org/10.1109/ACCESS.2020.3006172
_version_ 1783678316988858368
collection PubMed
description Cybercriminals are constantly on the lookout for new attack vectors, and the recent COVID-19 pandemic is no exception. For example, social distancing measures have resulted in travel bans, lockdowns, and stay-at-home orders, consequently increasing the reliance on information and communications technologies, such as Zoom. Cybercriminals have also attempted to exploit the pandemic to facilitate a broad range of malicious activities, such as attempting to take over videoconferencing platforms used in online meetings/educational activities, information theft, and other fraudulent activities. This study briefly reviews some of the malicious cyber activities associated with COVID-19 and the potential mitigation solutions. We also propose an attack taxonomy, which (optimistically) will help guide future risk management and mitigation responses.
format Online
Article
Text
id pubmed-8043498
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher IEEE
record_format MEDLINE/PubMed
spelling pubmed-80434982021-04-28 Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies IEEE Access Communications Technology Cybercriminals are constantly on the lookout for new attack vectors, and the recent COVID-19 pandemic is no exception. For example, social distancing measures have resulted in travel bans, lockdowns, and stay-at-home orders, consequently increasing the reliance on information and communications technologies, such as Zoom. Cybercriminals have also attempted to exploit the pandemic to facilitate a broad range of malicious activities, such as attempting to take over videoconferencing platforms used in online meetings/educational activities, information theft, and other fraudulent activities. This study briefly reviews some of the malicious cyber activities associated with COVID-19 and the potential mitigation solutions. We also propose an attack taxonomy, which (optimistically) will help guide future risk management and mitigation responses. IEEE 2020-06-30 /pmc/articles/PMC8043498/ /pubmed/34192113 http://dx.doi.org/10.1109/ACCESS.2020.3006172 Text en This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/ https://creativecommons.org/licenses/by/4.0/This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
spellingShingle Communications Technology
Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies
title Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies
title_full Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies
title_fullStr Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies
title_full_unstemmed Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies
title_short Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies
title_sort have you been a victim of covid-19-related cyber incidents? survey, taxonomy, and mitigation strategies
topic Communications Technology
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8043498/
https://www.ncbi.nlm.nih.gov/pubmed/34192113
http://dx.doi.org/10.1109/ACCESS.2020.3006172
work_keys_str_mv AT haveyoubeenavictimofcovid19relatedcyberincidentssurveytaxonomyandmitigationstrategies
AT haveyoubeenavictimofcovid19relatedcyberincidentssurveytaxonomyandmitigationstrategies
AT haveyoubeenavictimofcovid19relatedcyberincidentssurveytaxonomyandmitigationstrategies
AT haveyoubeenavictimofcovid19relatedcyberincidentssurveytaxonomyandmitigationstrategies
AT haveyoubeenavictimofcovid19relatedcyberincidentssurveytaxonomyandmitigationstrategies