Last Line

Post-pandemic digital era looks very promising, even as COVID-19 left a huge Cybersecurity impact on the digital behaviour [25] of digital consumers and internet users not only in the directly affected localities but across the globe. While counting the losses, a significant proportion of the lessons should be focused on preparedness on the side of global cyber response to such a major event. Secure management and user control of digital identities, for example, should become an indispensable global priority.

With the fresh lessons from the pandemic, and the proposals offered in this book, the equitable use of digital technology would be transformed for good, rather than wait for the next pandemic. A sanitized Cybersecurity outlook awaits in the horizon with plenty of benefits for internet users, online commerce operators, security vendors, governments, cyberspace consumers, Cybersecurity scholars, and consequential beneficiaries.

We must all play our roles as individuals, organizations, nations, and societies to be conscious of the risks we take on the internet, and to recognize and react promptly to the threats that we face on the cyberspace. Doing this will guarantee that Cybersecurity propagates a safer cyberspace for leisure, family, work, and business in the post COVID-19 digital era, an era that will witness a new version of Cybersecurity fully optimized to intuitively neutralize the sophistication of contemporary cyberattacks.


  • 1. R. Zhang, Y. Li. A. L. Zhang. Y. Wang and M. J. Molina. “Identifying airborne transmission as the dominant route for the spread of COVID-19,” Proceedings of the National Academy of Sciences (PNAS) of the United States of America, vol. 117. no. 26, pp. 14857-14863, 2020.
  • 2. H. S. Lallie, L. A. Shepherd. J. R. C. Nurse, A. Erola. G. Epiphaniou, C. Maple and X. Bellekens, “Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic,” arXiv:2006.11929vl [cs.CR], pp. 1-19, 2020.
  • 3. A. Russo. “Dramatic Rise of Cybersecurity Risks from COVID-19 Prompts Action Plan,” World Economic Forum. 26 May 2020. [Online]. Available: [Accessed 31 July 2020].
  • 4. Global Data Thematic Research, “Cybersecurity: Timeline." The Verdict, 6 July 2020. [Online]. Available: [Accessed 30 July 2020].
  • 5. C. Onwuegbuchi, “Expert Blames Fundamental Flaw in IP for Cyberattacks,” Nigeria Communications Week. 13 July 2020. [Online]. Available: https:// [Accessed 13 July 2020].
  • 6. K. Okereafor and O. Adelaiye, “Randomized cyber attack simulation model: A cybersecurity mitigation proposal for Post COVID-19 digital era.” International Journal of Recent Engineering Research and Development (IJRERD). vol. 05, no. 07. pp. 61-72, 2020.
  • 7. D. E. Denning, “Activism, hacktivism. and cyberterrorism: the internet as a tool for influencing foreign policy,” in Networks and Netwars: The Future of Terror, Crime, and Militancy, RAND. Santa Monica. CA, 2001. pp. 239-288.
  • 8. "Sophos 2020 Threat Report,” Sophos. Abingdon, UK. 2020.
  • 9. G. Kurtz, “Crowdstrike global threat report 2020," CrowdStrike, Sunnyvale, California. 2020.
  • 10. L. Irwin, “Avon’s UK website offline a week after suffering cyberattack," IT Governance, 17 June 2020. [Online], Available: https://www.itgovernance. [Accessed 3 August 2020].
  • 11. R. W. Wood. “Garmin Hack’s $10M Ransom Payment, S10M Tax Deduction,” Forbes, 27 July 2020. [Online]. Available: robert wood/2020/07/27/garm in-hacks-lOm-ransom-pay ment-lOm-tax-deduction/#2647948412c5 [Accessed 3 August 2020].
  • 12. D. Balaban. “Attacked by Ransomware? Here’s Why You Shouldn't Pay Up,” Hackernoon, 22 July 2019. [Online], Available: https://hackernoon. com/attacked-by-ransomware-heres-why-you-shouldnt-pay-up-ma9k3x3y [Accessed 3 August 2020].
  • 13. A. Torres-Corral. “The Future of Cybersecurity is Proactive. Predictive and Dynamic,” Forcepoint. 13 January 2020. [Online]. Available: https://www. [Accessed 30 August 2020].
  • 14. P. Meyer. “Norms of responsible state behaviour in cyberspace,” in The Ethics of Cybersecurity, Springer, Cham, vol 21.2020. pp. 347-360. [Online], Available: https://doi ,org/10.1007/978-3-030-29053-5_ 18
  • 15. UNODA. “Protecting People in Cyberspace: The Vital Role of the United Nations in 2020,” Microsoft. [Online]. Available: wp-content/uploads/2019/12/protecting-people-in-cyberspace-december-2019. pdf. 2020
  • 16. Viostreain. “UN Cyber Nonns-API391202 English Subtitles.” Australian Strategic Policy Institute (ASPI). 2020. [Online], Available: https://publish. [Accessed 2 September 2020].
  • 17. A.-H. Ajijola, Interviewee. UN Norms of Responsible State Behaviour in the Cyberspace. [Interview], 2020.
  • 18. “Developments in the Field of Information and Telecommunications in the Context of International Security,” United Nations Office for Disarmament Affiars (UNODA), December 2018. [Online]. Available: disarmament/ict-security [Accessed 2 September 2020].
  • 19. J. Fishenden. “Implementing a 21st Century Approach to Digital Identity.” 8 January 2020. [Online], Available: Implementing-a-21st-century-approach-to-digital-identity [Accessed 16 May 2020].
  • 20. DFI, “Digital Frontiers Institute Courses,” Digital Frontiers Institute. 2020. [Online], Available: [Accessed 12 August 2020].
  • 21. S. Perez, “Capital One Launches SwiftID. a Way to Bypass Security Questions with Just a Swipe.” Tech Crunch. 23 October 2015. [Online]. Available: https:// techcrunch, com/2015/10/23/capital-one-launches-swiftid-a-way-to-bypass-security-questions-with-just-a-swipe/ [Accessed 26 May 2020].
  • 22. Capital One. “International wire transfer guide,” Capital One. McLean, 2016.
  • 23. "Digital Identity: Restoring Trust in a Digital World." MasterCard. New York, 2019.
  • 24. Hyland. "Hyland Credentials," Hyland, 2020. [Online]. Available: https://www. [Accessed 26 May 2020].
  • 25. K. U. Okereafor and O. Adebola, “Tackling the cybersecurity impacts of the coronavirus outbreak as a challenge to internet safety," International Journal in IT and Engineering (IJITE), vol. 8, no. 2. pp. 1-14, 2020.
< Prev   CONTENTS   Source   Next >