Limit search to available items
Book Cover
E-book
Author Okereafor, Kenneth

Title Cybersecurity in the COVID-19 Pandemic
Published Milton : Taylor & Francis Group, 2021

Copies

Description 1 online resource (192 p.)
Contents Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Foreword -- Acknowledgements -- About the Author -- List of Tables -- List of Figures -- List of Acronyms -- 1. Introduction: COVID-19 Pandemic, the Game Changer -- 1.1. Covid-19 Pandemic, the Game Changer -- 1.2. Overview of Cybersecurity -- 1.3. Objectives of The Book -- 1.4. Structure of The Book -- References -- 2. COVID-19 Background -- 2.1. Nature -- 2.2. Origin -- 2.3. Spread -- 2.4. Global Response -- 2.5. Statistics -- 2.6. Link with Cybersecurity -- References
3. Cybersecurity Roles in a Pandemic -- 3.1. Preventive Roles -- 3.2. Detective Roles -- 3.3. Response Roles -- 3.4. Data Confidentiality -- 3.5. Data Integrity -- 3.6. Data Availability -- 3.7. Chapter Summary -- References -- 4. Cyberspace at Risk -- 4.1. Vulnerabilities and Exposures -- 4.1.1. Vulnerabilities -- 4.1.2. Exposures -- 4.1.3. Exposed Industries -- 4.2. Human Vulnerabilities -- 4.2.1. Human Factor of Security -- 4.2.2. Sympathy and Compassion -- 4.2.3. Urgency and Persuasion -- 4.2.4. Desperation and Confusion -- 4.2.5. Loyalty, Honesty, and Respect -- 4.2.6. Anger and Grief
4.2.7. Fear, Worry, and Anxiety -- 4.3. Technical and Operational Vulnerabilities -- 4.3.1. Expired Security Systems -- 4.3.2. Obsolete Operating Systems (OS) And Utilities -- 4.3.3. Capacity Gap -- 4.3.4. Misplaced Priorities -- 4.3.5. Disrupted Procedures -- 4.3.6. Administrative Loopholes -- 4.3.7. Network and Connectivity Exposures -- 4.4. Cyber Threats and Exploits -- 4.4.1. Cyber Threats -- 4.4.2. Perspective of the Digital Threat [27] -- 4.4.3. Threats to Healthcare Data -- 4.4.4. Cyber Exploits -- 4.4.5. Malware -- 4.4.6. Ransomware -- 4.4.7. Computer Virus -- 4.4.8. Adware and Spyware
4.4.9. Computer Worm -- 4.4.10. Trojan Horse -- 4.4.11. Logic Bomb -- 4.4.12. Spear Phishing -- 4.4.13. Man-in-the-Middle Attack -- 4.4.14. Cyber Espionage -- 4.4.15. Cyber Bullying -- 4.4.16. Social Engineering -- 4.4.16.1. Lessons from the Twitter incident -- 4.4.17. Password Abuse -- 4.4.18. DDoS Attack -- 4.4.19. Fake Website -- 4.4.20. Website Hijack -- 4.4.21. Insider Collusion -- 4.5. Cybersecurity Impacts Of COVID-19 -- 4.5.1. Identity Theft -- 4.5.2. Privacy Issues -- 4.5.3. Data Accessibility Issues -- 4.5.4. Data Loss -- 4.5.5. Reputation Damage -- 4.5.6. Revenue Loss
4.5.7. Service Disruption for Organizations -- 4.5.8. Service Disruption for Individuals -- 4.5.9. Crime Escalation -- 4.5.10. Fatality -- 4.6. Chapter Summary -- References -- 5. Challenges of Managing Cybersecurity at COVID-19 -- 5.1. Identity and Access Control Challenges -- 5.1.1. Authentication Challenges -- 5.1.2. Authorization Challenges -- 5.1.3. Accountability Challenges -- 5.2. Incident Management Challenges -- 5.2.1. Incident Response Challenges -- 5.2.2. Incident Handling Challenges -- 5.3. Remote Communications Challenges -- 5.3.1. Work from Home Challenges
Notes Description based upon print version of record
5.3.2. Telecommuting and Video Conferencing Challenges
Form Electronic book
ISBN 9781000357653
1000357651