Open Access Open Access  Restricted Access Subscription or Fee Access

Cybersecurity Challenges During the COVID-19 Pandemic: An Efficient Analysis of Modern Threats and Trends in India

Manish Choubisa, Manish Dubey

Abstract


The Pandemic situation in the COVID-19 Coronavirus has impelled large quantity of employees all around the world bound to work from home. The employer or user who worked from home, required knowledge and awareness cyber security issues like phishing scams, cybercrime, many of which are now on stage fears of the Coronavirus. In the idea of digital India scheme that is the increased the utilization of digital apps, the COVID-19 pandemic shapes cyber security problems and features the requirement for making a satisfactory move to protect information technology frameworks in critical organization. The expanded nervousness caused about by the pandemic amplified the chances of cyberattacks ensuing relating with an increment in the amount and possibility of cyber-attacks. In this paper we analyses the COVID-19 pandemic condition from a network attacks and cyber-crime point of view and features the scope of cyberattacks experienced worldwide during the pandemic. Cyberattacks are analyzed and considered within the context of key worldwide circumstances to uncover the usual methodology of cyberattack crusades. Organizations should actualize very much characterized programming overhaul methodology, should utilize secure network like VLAN (Virtual Local Area Network), and lead normal perception trial of their frameworks. By understanding basic factors that make people, associations, and businesses more helpless to cyberattacks, we can better prepare for the next pandemic.

Full Text:

PDF

References


WHO (World Health Organization), “novel coronavirus (2019-nCoV) Situation Report,” 2020. [Online]. Available from https://www.who.int/docs/default-source/coronaviruse/situation-reports/20200121-sitrep-1-2019-ncov.pdf [Accessed: 21-January-2021]

S. Burgess and H. H. Sievertsen. Schools, skills, and learning: The impact of COVID-19 on education. VoxEu CEPR. [2020, 1 Apr.]

Accenture. Outmaneuver uncertainty: Navigating the human and business impact of Covid-19 [Online]. Available from https://www.accenture.com/mu-en/about/company/coronavirus-business-economic-impact [Accessed: JULY 31, 2020].

Arthur Ganz. Video Conferencing Apps And COVID-19. 2020 [Online]. Available: https://8ms.com/blog/video-conferencing-apps-%20and-covid-19/ [Accessed: 18 January 2021]

Khan Navid Ali, Brohi Sarfraz Nawaz, et al. Ten Deadly Cyber Security Threats Amid COVID-19 Pandemic. TechRxiv Powered by IEEE -2020

S. P. Berman and J. W. Gately. COVID-19 and Its Impact on Data Privacy and Security. 2020. [Online]. Available from https://www.lexology.com/library/detail.aspx?g=dec8ccab-d74a-4bc1-9e4a-9b1e5626e936 [Accessed: 04-May-2020]

Government of India. MHA issues Advisory on Secure use of ZOOM Meeting Platform. April, 2020. Available from https://www.mha.gov.in/sites/default/files/PR_MHAAdvisoryonZOOM_https://www.mha.gov.in/sites/default/files/PR_MHAAdvisoryonZOOM_

pdf. [Accessed: 24 January, 2021]

Kaspersky. Kaspersky Security Bulletin 2020. Statistics. 2020. Available From https://go.kaspersky.com/rs/802-IJN- 240/images/KSB_statistics_2020_en.pdf. [Accessed: 24 January, 2021].

McAfee. McAfee Labs Threats Reports. Nov 2020. [Online] Available from https://www.mcafee.com/enterprise/en-in/threat-center/mcafee-labs/reports.html. [Accessed: 24 January, 2021].

Sejuti Das. Accenture Acquires Revolutionary Security To Expand Its Cybersecurity Practice. 2020. [Online]. Available From https://analyticsindiamag.com/accenture-acquires-revolutionary-security-to-expand-its-cybersecurity-practice/. [Accessed: 25 January, 2021].

Vishal Chawla. Why Has Microsoft Acquired This Israeli Cybersecurity Startup. 2020 [Online]. Available from https://analyticsindiamag.com/why-has-microsoft-acquired-this-israeli-cybersecu rity-startup/. [Accessed: 25 January, 2021].

ETGovernment. India, Australia signs pact on cyber and critical technology worth $12.7 million. 2020 [Online]. Available from https://government.economictimes.indiatimes.com/news/digital-india/india-australia-signs-pact-on-cyber-and-critical-technology-worth-12-7-million/76242561 [Accessed: 25 January, 2021]

Bimal Parmar, Faronics. Protecting against spear-phishing. Computer Fraud & Security [online]. Available from https://www.faronics.com/assets/Spearphishing_BP_EMEA.pdf 2012.

CyberPeace Foundation. Indian vaccine makers, healthcare institutions targeted by cyber attackers. 2020 [Online]. Available from https://www.cyberpeace.org/indian-vaccine-makers-healthcare-institutions-targeted-by-cyber-attackers-report/#:~:text=The%20new%20CyberPeace %20report%20comes,South%20Korea%2C%20and%20the%20US. [Accessed: 25 January, 2021]

Herley, Cormac E., et al. Spyware detection mechanism. U.S. Patent No. 9,021,590. Available from https://patents.google.com/patent/US9021590B2/en [28 Apr. 2015].

IANS. targeted country for ransomware after surge in attacks over the last three months. 2020 [Online]. Available from https://cio.economictimes.indiatimes.com/news/di gital-security/india-becomes-the-second-most-targeted-country-for-ransomware-after-surge-in-attacks-over-the-last-three-months/78526531. [Accessed: 25 January, 2021].

WHO. Beware of criminals pretending to be WHO. 2020. [Online]. Available from https://www.who.int/about/communications/cybersecurity [Accessed: 18 January, 2021]


Refbacks

  • There are currently no refbacks.