Cybersecurity in the COVID-19 Pandemic
Covid-19 Pandemic, the Game ChangerOverview of CybersecurityObjectives of The BookStructure of The BookReferencesCOVID-19 BackgroundOriginSpreadGlobal ResponseStatisticsLink with CybersecurityReferencesCybersecurity Roles in a PandemicPreventive RolesDetective RolesResponse RolesData ConfidentialityData IntegrityData AvailabilitySummaryReferencesCyberspace at RiskVulnerabilities and ExposuresVulnerabilitiesExposuresExposed IndustriesHuman VulnerabilitiesHuman Factor of SecuritySympathy and CompassionUrgency and PersuasionDesperation and ConfusionLoyalty, Honesty, and RespectAnger and GriefFear, Worry, and AnxietyTechnical and Operational VulnerabilitiesExpired Security SystemsObsolete Operating Systems (OS) And UtilitiesCapacity GapMisplaced PrioritiesDisrupted ProceduresAdministrative LoopholesNetwork and Connectivity ExposuresCyber Threats and ExploitsCyber ThreatsPerspective of the Digital Threat [27]Threats to Healthcare DataCyber ExploitsMalwareRansomwareComputer VirusAdware and SpywareComputer WormTrojan HorseLogic BombSpear PhishingMan-in-the-Middle AttackCyber EspionageCyber BullyingSocial EngineeringLessons from the Twitter incidentPassword AbuseDDoS AttackFake WebsiteWebsite HijackInsider CollusionCybersecurity Impacts Of COVID-19Identity TheftPrivacy IssuesData Accessibility IssuesData LossReputation DamageRevenue LossService Disruption for OrganizationsService Disruption for IndividualsCrime EscalationFatalitySummaryReferencesChallenges of Managing Cybersecurity at COVID-19Identity and Access Control ChallengesAuthentication ChallengesAuthorization ChallengesAccountability ChallengesIncident Management ChallengesIncident Response ChallengesIncident Handling ChallengesRemote Communications ChallengesWork from Home ChallengesTelecommuting and Video Conferencing ChallengesHealthcare Data Management ChallengesValue-Based Classification Of Healthcare DataConfidentiality ChallengesIntegrity ChallengesAvailability ChallengesSummaryReferencesCyberattack Mitigations During the PandemicScenario of Defense in-depthAdministrative CountermeasuresPhysical CountermeasuresTechnical CountermeasuresControl KnobsPreventive ControlZoom preventive interventionAnti-malware preventive interventionDetective ControlResponsive ControlCorrective ControlDeterrent ControlSummaryCybersecurity in Post COVID-19 Digital EraCybersecurity Projections After the PandemicCybersecurity in Artificial Intelligence (AI)Cybersecurity in Big DataCybersecurity in TelemedicineCybersecurity in AviationSummaryReferencesRemote Work Comes to StayCryptographic and Steganographic RemediesNew Concept of MonitoringMore Stringent Email PoliciesProposed Design Model for Email Security Re-engineeringImplementation Strategy for Email Security Re-engineeringPunishment for Malware-related OffencesAcculturation of Social EngineeringProposed Implementation Model for Social Engineering AcculturationBetter Management of Digital Identity (DID)Requirements for Better Digital Identity ManagementLast LineReferencesCaveatGlossary