A deeper look into cybersecurity issues in the wake of Covid-19: A survey

This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime, highlighting the wide spectrum of cyberattacks that occurred around the world. The modus operandi of cyberattack campaigns was revealed by analyzing and considering cyberattacks in the context of major world events....

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of King Saud University. Computer and information sciences Jg. 34; H. 10; S. 8176
Hauptverfasser: Alawida, Moatsum, Omolara, Abiodun Esther, Abiodun, Oludare Isaac, Al-Rajab, Murad
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Saudi Arabia 01.11.2022
Schlagworte:
ISSN:2213-1248, 2213-1248
Online-Zugang:Weitere Angaben
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime, highlighting the wide spectrum of cyberattacks that occurred around the world. The modus operandi of cyberattack campaigns was revealed by analyzing and considering cyberattacks in the context of major world events. Following what appeared to be substantial gaps between the initial breakout of the virus and the first COVID-19-related cyber-attack, the investigation indicates how attacks became significantly more frequent over time, to the point where three or four different cyber-attacks were reported on certain days. This study contributes in the direction of fifteen types of cyber-attacks which were identified as the most common pattern and its ensuing devastating events during the global COVID-19 crisis. The paper is unique because it covered the main types of cyber-attacks that most organizations are currently facing and how to address them. An intense look into the recent advances that cybercriminals leverage, the dynamism, calculated measures to tackle it, and never-explored perspectives are some of the integral parts which make this review different from other present reviewed papers on the COVID-19 pandemic. A qualitative methodology was used to provide a robust response to the objective used for the study. Using a multi-criteria decision-making problem-solving technique, many facets of cybersecurity that have been affected during the pandemic were then quantitatively ranked in ascending order of severity. The data was generated between March 2020 and December 2021, from a global survey through online contact and responses, especially from different organizations and business executives. The result show differences in cyber-attack techniques; as hacking attacks was the most frequent with a record of 330 out of 895 attacks, accounting for 37%. Next was Spam emails attack with 13%; emails with 13%; followed by malicious domains with 9%. Mobile apps followed with 8%, Phishing was 7%, Malware 7%, Browsing apps with 6%, DDoS has 6%, Website apps with 6%, and MSMM with 6%. BEC frequency was 4%, Ransomware with 2%, Botnet scored 2% and APT recorded 1%. The study recommends that it will continue to be necessary for governments and organizations to be resilient and innovative in cybersecurity decisions to overcome the current and future effects of the pandemic or similar crisis, which could be long-lasting. Hence, this study's findings will guide the creation, development, and implementation of more secure systems to safeguard people from cyber-attacks.
AbstractList This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime, highlighting the wide spectrum of cyberattacks that occurred around the world. The modus operandi of cyberattack campaigns was revealed by analyzing and considering cyberattacks in the context of major world events. Following what appeared to be substantial gaps between the initial breakout of the virus and the first COVID-19-related cyber-attack, the investigation indicates how attacks became significantly more frequent over time, to the point where three or four different cyber-attacks were reported on certain days. This study contributes in the direction of fifteen types of cyber-attacks which were identified as the most common pattern and its ensuing devastating events during the global COVID-19 crisis. The paper is unique because it covered the main types of cyber-attacks that most organizations are currently facing and how to address them. An intense look into the recent advances that cybercriminals leverage, the dynamism, calculated measures to tackle it, and never-explored perspectives are some of the integral parts which make this review different from other present reviewed papers on the COVID-19 pandemic. A qualitative methodology was used to provide a robust response to the objective used for the study. Using a multi-criteria decision-making problem-solving technique, many facets of cybersecurity that have been affected during the pandemic were then quantitatively ranked in ascending order of severity. The data was generated between March 2020 and December 2021, from a global survey through online contact and responses, especially from different organizations and business executives. The result show differences in cyber-attack techniques; as hacking attacks was the most frequent with a record of 330 out of 895 attacks, accounting for 37%. Next was Spam emails attack with 13%; emails with 13%; followed by malicious domains with 9%. Mobile apps followed with 8%, Phishing was 7%, Malware 7%, Browsing apps with 6%, DDoS has 6%, Website apps with 6%, and MSMM with 6%. BEC frequency was 4%, Ransomware with 2%, Botnet scored 2% and APT recorded 1%. The study recommends that it will continue to be necessary for governments and organizations to be resilient and innovative in cybersecurity decisions to overcome the current and future effects of the pandemic or similar crisis, which could be long-lasting. Hence, this study's findings will guide the creation, development, and implementation of more secure systems to safeguard people from cyber-attacks.This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime, highlighting the wide spectrum of cyberattacks that occurred around the world. The modus operandi of cyberattack campaigns was revealed by analyzing and considering cyberattacks in the context of major world events. Following what appeared to be substantial gaps between the initial breakout of the virus and the first COVID-19-related cyber-attack, the investigation indicates how attacks became significantly more frequent over time, to the point where three or four different cyber-attacks were reported on certain days. This study contributes in the direction of fifteen types of cyber-attacks which were identified as the most common pattern and its ensuing devastating events during the global COVID-19 crisis. The paper is unique because it covered the main types of cyber-attacks that most organizations are currently facing and how to address them. An intense look into the recent advances that cybercriminals leverage, the dynamism, calculated measures to tackle it, and never-explored perspectives are some of the integral parts which make this review different from other present reviewed papers on the COVID-19 pandemic. A qualitative methodology was used to provide a robust response to the objective used for the study. Using a multi-criteria decision-making problem-solving technique, many facets of cybersecurity that have been affected during the pandemic were then quantitatively ranked in ascending order of severity. The data was generated between March 2020 and December 2021, from a global survey through online contact and responses, especially from different organizations and business executives. The result show differences in cyber-attack techniques; as hacking attacks was the most frequent with a record of 330 out of 895 attacks, accounting for 37%. Next was Spam emails attack with 13%; emails with 13%; followed by malicious domains with 9%. Mobile apps followed with 8%, Phishing was 7%, Malware 7%, Browsing apps with 6%, DDoS has 6%, Website apps with 6%, and MSMM with 6%. BEC frequency was 4%, Ransomware with 2%, Botnet scored 2% and APT recorded 1%. The study recommends that it will continue to be necessary for governments and organizations to be resilient and innovative in cybersecurity decisions to overcome the current and future effects of the pandemic or similar crisis, which could be long-lasting. Hence, this study's findings will guide the creation, development, and implementation of more secure systems to safeguard people from cyber-attacks.
This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime, highlighting the wide spectrum of cyberattacks that occurred around the world. The modus operandi of cyberattack campaigns was revealed by analyzing and considering cyberattacks in the context of major world events. Following what appeared to be substantial gaps between the initial breakout of the virus and the first COVID-19-related cyber-attack, the investigation indicates how attacks became significantly more frequent over time, to the point where three or four different cyber-attacks were reported on certain days. This study contributes in the direction of fifteen types of cyber-attacks which were identified as the most common pattern and its ensuing devastating events during the global COVID-19 crisis. The paper is unique because it covered the main types of cyber-attacks that most organizations are currently facing and how to address them. An intense look into the recent advances that cybercriminals leverage, the dynamism, calculated measures to tackle it, and never-explored perspectives are some of the integral parts which make this review different from other present reviewed papers on the COVID-19 pandemic. A qualitative methodology was used to provide a robust response to the objective used for the study. Using a multi-criteria decision-making problem-solving technique, many facets of cybersecurity that have been affected during the pandemic were then quantitatively ranked in ascending order of severity. The data was generated between March 2020 and December 2021, from a global survey through online contact and responses, especially from different organizations and business executives. The result show differences in cyber-attack techniques; as hacking attacks was the most frequent with a record of 330 out of 895 attacks, accounting for 37%. Next was Spam emails attack with 13%; emails with 13%; followed by malicious domains with 9%. Mobile apps followed with 8%, Phishing was 7%, Malware 7%, Browsing apps with 6%, DDoS has 6%, Website apps with 6%, and MSMM with 6%. BEC frequency was 4%, Ransomware with 2%, Botnet scored 2% and APT recorded 1%. The study recommends that it will continue to be necessary for governments and organizations to be resilient and innovative in cybersecurity decisions to overcome the current and future effects of the pandemic or similar crisis, which could be long-lasting. Hence, this study's findings will guide the creation, development, and implementation of more secure systems to safeguard people from cyber-attacks.
Author Omolara, Abiodun Esther
Abiodun, Oludare Isaac
Alawida, Moatsum
Al-Rajab, Murad
Author_xml – sequence: 1
  givenname: Moatsum
  surname: Alawida
  fullname: Alawida, Moatsum
  organization: Department of Computer Sciences, Abu Dhabi University, Abu Dhabi 59911, United Arab Emirates
– sequence: 2
  givenname: Abiodun Esther
  surname: Omolara
  fullname: Omolara, Abiodun Esther
  organization: Department of Computer Science, University of Abuja, Gwagwalada, Nigeria
– sequence: 3
  givenname: Oludare Isaac
  surname: Abiodun
  fullname: Abiodun, Oludare Isaac
  organization: Department of Computer Science, University of Abuja, Gwagwalada, Nigeria
– sequence: 4
  givenname: Murad
  surname: Al-Rajab
  fullname: Al-Rajab, Murad
  organization: Department of Computer Sciences, Abu Dhabi University, Abu Dhabi 59911, United Arab Emirates
BackLink https://www.ncbi.nlm.nih.gov/pubmed/37521180$$D View this record in MEDLINE/PubMed
BookMark eNpNj01Lw0AYhBep2Fr7D0T26CXx3Y9sdr2V4keh4EXPYbP7BtOm2ZpNKvn3FqzgaQbmYZi5JpM2tEjILYOUAVMP23S7i4OrUw6cp6BTAHFBZpwzkTAu9eSfn5JFjFsAYLnKpFBXZCryjDOmYUbWS-oRD9jRJoQdrds-UDeW2EV0Q1f3I61jHDCeEtp_Iv22O6ShoqtwrH3CzCNd0jh0RxxvyGVlm4iLs87Jx_PT--o12by9rFfLTeKkEn3irLfGGOmsQsMrnjuwWGnhZW68USAATFYybq1Q3olclJktdYmg0GpfZXxO7n97D134Oi3ri30dHTaNbTEMseBaStCS5XBC787oUO7RF4eu3ttuLP7u8x_1xl_b
CitedBy_id crossref_primary_10_1080_10919392_2023_2244386
crossref_primary_10_1108_MF_09_2024_0716
crossref_primary_10_1016_j_cose_2025_104317
crossref_primary_10_1038_s41598_025_00199_9
crossref_primary_10_1177_00195561241257388
crossref_primary_10_21202_2782_2923_2024_4_936_953
crossref_primary_10_7759_cureus_83614
crossref_primary_10_7759_cureus_53664
crossref_primary_10_1007_s40692_024_00346_7
crossref_primary_10_4018_IJIIT_359181
crossref_primary_10_1049_tje2_70110
crossref_primary_10_1108_BIJ_05_2023_0310
crossref_primary_10_1186_s13677_024_00609_9
crossref_primary_10_1016_j_jksuci_2022_10_018
crossref_primary_10_1016_j_eswa_2023_122223
crossref_primary_10_1109_MITP_2023_3297085
crossref_primary_10_2196_48824
crossref_primary_10_1016_j_cose_2025_104645
crossref_primary_10_1177_02666669251325455
crossref_primary_10_1108_JFRA_12_2023_0774
crossref_primary_10_1007_s11277_023_10523_z
crossref_primary_10_1016_j_future_2025_108107
crossref_primary_10_1007_s12083_024_01899_1
crossref_primary_10_1007_s11227_025_07271_1
crossref_primary_10_1080_08874417_2024_2371428
crossref_primary_10_1016_j_procs_2023_09_013
crossref_primary_10_1177_20438869251337096
crossref_primary_10_3390_e24111551
crossref_primary_10_1108_ICS_05_2022_0085
crossref_primary_10_1109_ACCESS_2024_3467996
crossref_primary_10_1109_ACCESS_2024_3361752
crossref_primary_10_1007_s10791_025_09523_3
crossref_primary_10_1007_s10207_023_00729_4
crossref_primary_10_1007_s44187_023_00071_7
crossref_primary_10_1016_j_ecmx_2025_101254
crossref_primary_10_1371_journal_pone_0331574
ContentType Journal Article
Copyright 2022 The Author(s).
Copyright_xml – notice: 2022 The Author(s).
DBID NPM
7X8
DOI 10.1016/j.jksuci.2022.08.003
DatabaseName PubMed
MEDLINE - Academic
DatabaseTitle PubMed
MEDLINE - Academic
DatabaseTitleList MEDLINE - Academic
PubMed
Database_xml – sequence: 1
  dbid: NPM
  name: PubMed
  url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 2
  dbid: 7X8
  name: MEDLINE - Academic
  url: https://search.proquest.com/medline
  sourceTypes: Aggregation Database
DeliveryMethod no_fulltext_linktorsrc
Discipline Computer Science
EISSN 2213-1248
ExternalDocumentID 37521180
Genre Journal Article
Review
GroupedDBID --K
0R~
4.4
457
5VS
AAEDT
AAEDW
AAIKJ
AAJSJ
AALRI
AAQXK
AASML
AAXUO
AAYWO
ABEEZ
ABMAC
ABWVN
ACGFS
ACULB
ADBBV
ADEZE
ADVLN
AEXQZ
AFGXO
AFJKZ
AFTJW
AGHFR
AGQPQ
AITUG
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
APXCP
ASPBG
AVWKF
AZFZN
BCNDV
C6C
EBS
EJD
FDB
FEDTE
FGOYB
GROUPED_DOAJ
HVGLF
HZ~
IPNFZ
IXB
KQ8
M41
NPM
O-L
O9-
OK1
R2-
RIG
ROL
SES
SOJ
SSZ
XH2
7X8
ID FETCH-LOGICAL-c463t-cada9994ca6e92f27c0aef83d479d96030095b12aa36dc373b5ab8be06ea8df52
IEDL.DBID 7X8
ISICitedReferencesCount 61
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000916231700012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2213-1248
IngestDate Thu Jul 10 21:53:33 EDT 2025
Sat Jun 07 01:34:00 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 10
Keywords Economic disruption
Internet security
Cybersecurity
Business security
COVID-19 and organization cybersecurity challenges
Trending insight of cyber-attack
Cyberspace future
Language English
License 2022 The Author(s).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c463t-cada9994ca6e92f27c0aef83d479d96030095b12aa36dc373b5ab8be06ea8df52
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
ObjectType-Review-3
content type line 23
OpenAccessLink https://pubmed.ncbi.nlm.nih.gov/PMC9367180
PMID 37521180
PQID 2844084170
PQPubID 23479
ParticipantIDs proquest_miscellaneous_2844084170
pubmed_primary_37521180
PublicationCentury 2000
PublicationDate 2022-11-01
PublicationDateYYYYMMDD 2022-11-01
PublicationDate_xml – month: 11
  year: 2022
  text: 2022-11-01
  day: 01
PublicationDecade 2020
PublicationPlace Saudi Arabia
PublicationPlace_xml – name: Saudi Arabia
PublicationTitle Journal of King Saud University. Computer and information sciences
PublicationTitleAlternate J King Saud Univ Comput Inf Sci
PublicationYear 2022
SSID ssj0001765436
Score 2.5491564
SecondaryResourceType review_article
Snippet This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime, highlighting the wide spectrum of cyberattacks that occurred around the...
This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime, highlighting the wide spectrum of cyberattacks that occurred around the...
SourceID proquest
pubmed
SourceType Aggregation Database
Index Database
StartPage 8176
Title A deeper look into cybersecurity issues in the wake of Covid-19: A survey
URI https://www.ncbi.nlm.nih.gov/pubmed/37521180
https://www.proquest.com/docview/2844084170
Volume 34
WOSCitedRecordID wos000916231700012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3dS8MwEA_qfPDF-e38IoKvwaZpmtQXGcOhD449KOxtJGkKc9LOdZvsv_eStuxJEHwptKVQ7i53v7vk7ofQnebcCqoNgdjFScTBD-oEbiNjmQoVhEBuPNmEGAzkaJQM64JbWR-rbHyid9RpYVyN_B7caBTIiIrgcfZFHGuU212tKTS2UYsBlHFWLUZyU2MRrnPS88uFlBEIZbLpnvNHvD6m5dJMIEkMQz_H0zNn_YIzfbzpt__7pwdov0aauFuZxiHasvkRajcsDrhe1MfopYtTa2fw6BMAN57kiwKbtQZYWFPbYa-bEt5gQIv4W00tLjLccy18hCYPuIvL5Xxl1yfovf_01nsmNcECMVHMFsSoVAFAjIyKbRJmoTCBsplkaSSSFFIb5gCYpqFSLE4NE0xzpaW2QWyVTDMenqKdvMjtOcKU2YArBsoGRMNM7GbKZEYxA-kYTZKsg24bYY3BgN2uhMptsSzHG3F10Fkl8fGsmrQxZgLQBZXBxR--vkR7TpFVn-AVamWwfO012jWrxaSc33jLgOtg-PoDXGnBRg
linkProvider ProQuest
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+deeper+look+into+cybersecurity+issues+in+the+wake+of+Covid-19%3A+A+survey&rft.jtitle=Journal+of+King+Saud+University.+Computer+and+information+sciences&rft.au=Alawida%2C+Moatsum&rft.au=Omolara%2C+Abiodun+Esther&rft.au=Abiodun%2C+Oludare+Isaac&rft.au=Al-Rajab%2C+Murad&rft.date=2022-11-01&rft.issn=2213-1248&rft.eissn=2213-1248&rft.volume=34&rft.issue=10&rft.spage=8176&rft_id=info:doi/10.1016%2Fj.jksuci.2022.08.003&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2213-1248&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2213-1248&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2213-1248&client=summon