A deeper look into cybersecurity issues in the wake of Covid-19: A survey
This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime, highlighting the wide spectrum of cyberattacks that occurred around the world. The modus operandi of cyberattack campaigns was revealed by analyzing and considering cyberattacks in the context of major world events....
Gespeichert in:
| Veröffentlicht in: | Journal of King Saud University. Computer and information sciences Jg. 34; H. 10; S. 8176 |
|---|---|
| Hauptverfasser: | , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Saudi Arabia
01.11.2022
|
| Schlagworte: | |
| ISSN: | 2213-1248, 2213-1248 |
| Online-Zugang: | Weitere Angaben |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime, highlighting the wide spectrum of cyberattacks that occurred around the world. The modus operandi of cyberattack campaigns was revealed by analyzing and considering cyberattacks in the context of major world events. Following what appeared to be substantial gaps between the initial breakout of the virus and the first COVID-19-related cyber-attack, the investigation indicates how attacks became significantly more frequent over time, to the point where three or four different cyber-attacks were reported on certain days. This study contributes in the direction of fifteen types of cyber-attacks which were identified as the most common pattern and its ensuing devastating events during the global COVID-19 crisis. The paper is unique because it covered the main types of cyber-attacks that most organizations are currently facing and how to address them. An intense look into the recent advances that cybercriminals leverage, the dynamism, calculated measures to tackle it, and never-explored perspectives are some of the integral parts which make this review different from other present reviewed papers on the COVID-19 pandemic. A qualitative methodology was used to provide a robust response to the objective used for the study. Using a multi-criteria decision-making problem-solving technique, many facets of cybersecurity that have been affected during the pandemic were then quantitatively ranked in ascending order of severity. The data was generated between March 2020 and December 2021, from a global survey through online contact and responses, especially from different organizations and business executives. The result show differences in cyber-attack techniques; as hacking attacks was the most frequent with a record of 330 out of 895 attacks, accounting for 37%. Next was Spam emails attack with 13%; emails with 13%; followed by malicious domains with 9%. Mobile apps followed with 8%, Phishing was 7%, Malware 7%, Browsing apps with 6%, DDoS has 6%, Website apps with 6%, and MSMM with 6%. BEC frequency was 4%, Ransomware with 2%, Botnet scored 2% and APT recorded 1%. The study recommends that it will continue to be necessary for governments and organizations to be resilient and innovative in cybersecurity decisions to overcome the current and future effects of the pandemic or similar crisis, which could be long-lasting. Hence, this study's findings will guide the creation, development, and implementation of more secure systems to safeguard people from cyber-attacks. |
|---|---|
| AbstractList | This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime, highlighting the wide spectrum of cyberattacks that occurred around the world. The modus operandi of cyberattack campaigns was revealed by analyzing and considering cyberattacks in the context of major world events. Following what appeared to be substantial gaps between the initial breakout of the virus and the first COVID-19-related cyber-attack, the investigation indicates how attacks became significantly more frequent over time, to the point where three or four different cyber-attacks were reported on certain days. This study contributes in the direction of fifteen types of cyber-attacks which were identified as the most common pattern and its ensuing devastating events during the global COVID-19 crisis. The paper is unique because it covered the main types of cyber-attacks that most organizations are currently facing and how to address them. An intense look into the recent advances that cybercriminals leverage, the dynamism, calculated measures to tackle it, and never-explored perspectives are some of the integral parts which make this review different from other present reviewed papers on the COVID-19 pandemic. A qualitative methodology was used to provide a robust response to the objective used for the study. Using a multi-criteria decision-making problem-solving technique, many facets of cybersecurity that have been affected during the pandemic were then quantitatively ranked in ascending order of severity. The data was generated between March 2020 and December 2021, from a global survey through online contact and responses, especially from different organizations and business executives. The result show differences in cyber-attack techniques; as hacking attacks was the most frequent with a record of 330 out of 895 attacks, accounting for 37%. Next was Spam emails attack with 13%; emails with 13%; followed by malicious domains with 9%. Mobile apps followed with 8%, Phishing was 7%, Malware 7%, Browsing apps with 6%, DDoS has 6%, Website apps with 6%, and MSMM with 6%. BEC frequency was 4%, Ransomware with 2%, Botnet scored 2% and APT recorded 1%. The study recommends that it will continue to be necessary for governments and organizations to be resilient and innovative in cybersecurity decisions to overcome the current and future effects of the pandemic or similar crisis, which could be long-lasting. Hence, this study's findings will guide the creation, development, and implementation of more secure systems to safeguard people from cyber-attacks.This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime, highlighting the wide spectrum of cyberattacks that occurred around the world. The modus operandi of cyberattack campaigns was revealed by analyzing and considering cyberattacks in the context of major world events. Following what appeared to be substantial gaps between the initial breakout of the virus and the first COVID-19-related cyber-attack, the investigation indicates how attacks became significantly more frequent over time, to the point where three or four different cyber-attacks were reported on certain days. This study contributes in the direction of fifteen types of cyber-attacks which were identified as the most common pattern and its ensuing devastating events during the global COVID-19 crisis. The paper is unique because it covered the main types of cyber-attacks that most organizations are currently facing and how to address them. An intense look into the recent advances that cybercriminals leverage, the dynamism, calculated measures to tackle it, and never-explored perspectives are some of the integral parts which make this review different from other present reviewed papers on the COVID-19 pandemic. A qualitative methodology was used to provide a robust response to the objective used for the study. Using a multi-criteria decision-making problem-solving technique, many facets of cybersecurity that have been affected during the pandemic were then quantitatively ranked in ascending order of severity. The data was generated between March 2020 and December 2021, from a global survey through online contact and responses, especially from different organizations and business executives. The result show differences in cyber-attack techniques; as hacking attacks was the most frequent with a record of 330 out of 895 attacks, accounting for 37%. Next was Spam emails attack with 13%; emails with 13%; followed by malicious domains with 9%. Mobile apps followed with 8%, Phishing was 7%, Malware 7%, Browsing apps with 6%, DDoS has 6%, Website apps with 6%, and MSMM with 6%. BEC frequency was 4%, Ransomware with 2%, Botnet scored 2% and APT recorded 1%. The study recommends that it will continue to be necessary for governments and organizations to be resilient and innovative in cybersecurity decisions to overcome the current and future effects of the pandemic or similar crisis, which could be long-lasting. Hence, this study's findings will guide the creation, development, and implementation of more secure systems to safeguard people from cyber-attacks. This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime, highlighting the wide spectrum of cyberattacks that occurred around the world. The modus operandi of cyberattack campaigns was revealed by analyzing and considering cyberattacks in the context of major world events. Following what appeared to be substantial gaps between the initial breakout of the virus and the first COVID-19-related cyber-attack, the investigation indicates how attacks became significantly more frequent over time, to the point where three or four different cyber-attacks were reported on certain days. This study contributes in the direction of fifteen types of cyber-attacks which were identified as the most common pattern and its ensuing devastating events during the global COVID-19 crisis. The paper is unique because it covered the main types of cyber-attacks that most organizations are currently facing and how to address them. An intense look into the recent advances that cybercriminals leverage, the dynamism, calculated measures to tackle it, and never-explored perspectives are some of the integral parts which make this review different from other present reviewed papers on the COVID-19 pandemic. A qualitative methodology was used to provide a robust response to the objective used for the study. Using a multi-criteria decision-making problem-solving technique, many facets of cybersecurity that have been affected during the pandemic were then quantitatively ranked in ascending order of severity. The data was generated between March 2020 and December 2021, from a global survey through online contact and responses, especially from different organizations and business executives. The result show differences in cyber-attack techniques; as hacking attacks was the most frequent with a record of 330 out of 895 attacks, accounting for 37%. Next was Spam emails attack with 13%; emails with 13%; followed by malicious domains with 9%. Mobile apps followed with 8%, Phishing was 7%, Malware 7%, Browsing apps with 6%, DDoS has 6%, Website apps with 6%, and MSMM with 6%. BEC frequency was 4%, Ransomware with 2%, Botnet scored 2% and APT recorded 1%. The study recommends that it will continue to be necessary for governments and organizations to be resilient and innovative in cybersecurity decisions to overcome the current and future effects of the pandemic or similar crisis, which could be long-lasting. Hence, this study's findings will guide the creation, development, and implementation of more secure systems to safeguard people from cyber-attacks. |
| Author | Omolara, Abiodun Esther Abiodun, Oludare Isaac Alawida, Moatsum Al-Rajab, Murad |
| Author_xml | – sequence: 1 givenname: Moatsum surname: Alawida fullname: Alawida, Moatsum organization: Department of Computer Sciences, Abu Dhabi University, Abu Dhabi 59911, United Arab Emirates – sequence: 2 givenname: Abiodun Esther surname: Omolara fullname: Omolara, Abiodun Esther organization: Department of Computer Science, University of Abuja, Gwagwalada, Nigeria – sequence: 3 givenname: Oludare Isaac surname: Abiodun fullname: Abiodun, Oludare Isaac organization: Department of Computer Science, University of Abuja, Gwagwalada, Nigeria – sequence: 4 givenname: Murad surname: Al-Rajab fullname: Al-Rajab, Murad organization: Department of Computer Sciences, Abu Dhabi University, Abu Dhabi 59911, United Arab Emirates |
| BackLink | https://www.ncbi.nlm.nih.gov/pubmed/37521180$$D View this record in MEDLINE/PubMed |
| BookMark | eNpNj01Lw0AYhBep2Fr7D0T26CXx3Y9sdr2V4keh4EXPYbP7BtOm2ZpNKvn3FqzgaQbmYZi5JpM2tEjILYOUAVMP23S7i4OrUw6cp6BTAHFBZpwzkTAu9eSfn5JFjFsAYLnKpFBXZCryjDOmYUbWS-oRD9jRJoQdrds-UDeW2EV0Q1f3I61jHDCeEtp_Iv22O6ShoqtwrH3CzCNd0jh0RxxvyGVlm4iLs87Jx_PT--o12by9rFfLTeKkEn3irLfGGOmsQsMrnjuwWGnhZW68USAATFYybq1Q3olclJktdYmg0GpfZXxO7n97D134Oi3ri30dHTaNbTEMseBaStCS5XBC787oUO7RF4eu3ttuLP7u8x_1xl_b |
| CitedBy_id | crossref_primary_10_1080_10919392_2023_2244386 crossref_primary_10_1108_MF_09_2024_0716 crossref_primary_10_1016_j_cose_2025_104317 crossref_primary_10_1038_s41598_025_00199_9 crossref_primary_10_1177_00195561241257388 crossref_primary_10_21202_2782_2923_2024_4_936_953 crossref_primary_10_7759_cureus_83614 crossref_primary_10_7759_cureus_53664 crossref_primary_10_1007_s40692_024_00346_7 crossref_primary_10_4018_IJIIT_359181 crossref_primary_10_1049_tje2_70110 crossref_primary_10_1108_BIJ_05_2023_0310 crossref_primary_10_1186_s13677_024_00609_9 crossref_primary_10_1016_j_jksuci_2022_10_018 crossref_primary_10_1016_j_eswa_2023_122223 crossref_primary_10_1109_MITP_2023_3297085 crossref_primary_10_2196_48824 crossref_primary_10_1016_j_cose_2025_104645 crossref_primary_10_1177_02666669251325455 crossref_primary_10_1108_JFRA_12_2023_0774 crossref_primary_10_1007_s11277_023_10523_z crossref_primary_10_1016_j_future_2025_108107 crossref_primary_10_1007_s12083_024_01899_1 crossref_primary_10_1007_s11227_025_07271_1 crossref_primary_10_1080_08874417_2024_2371428 crossref_primary_10_1016_j_procs_2023_09_013 crossref_primary_10_1177_20438869251337096 crossref_primary_10_3390_e24111551 crossref_primary_10_1108_ICS_05_2022_0085 crossref_primary_10_1109_ACCESS_2024_3467996 crossref_primary_10_1109_ACCESS_2024_3361752 crossref_primary_10_1007_s10791_025_09523_3 crossref_primary_10_1007_s10207_023_00729_4 crossref_primary_10_1007_s44187_023_00071_7 crossref_primary_10_1016_j_ecmx_2025_101254 crossref_primary_10_1371_journal_pone_0331574 |
| ContentType | Journal Article |
| Copyright | 2022 The Author(s). |
| Copyright_xml | – notice: 2022 The Author(s). |
| DBID | NPM 7X8 |
| DOI | 10.1016/j.jksuci.2022.08.003 |
| DatabaseName | PubMed MEDLINE - Academic |
| DatabaseTitle | PubMed MEDLINE - Academic |
| DatabaseTitleList | MEDLINE - Academic PubMed |
| Database_xml | – sequence: 1 dbid: NPM name: PubMed url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 2 dbid: 7X8 name: MEDLINE - Academic url: https://search.proquest.com/medline sourceTypes: Aggregation Database |
| DeliveryMethod | no_fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2213-1248 |
| ExternalDocumentID | 37521180 |
| Genre | Journal Article Review |
| GroupedDBID | --K 0R~ 4.4 457 5VS AAEDT AAEDW AAIKJ AAJSJ AALRI AAQXK AASML AAXUO AAYWO ABEEZ ABMAC ABWVN ACGFS ACULB ADBBV ADEZE ADVLN AEXQZ AFGXO AFJKZ AFTJW AGHFR AGQPQ AITUG ALMA_UNASSIGNED_HOLDINGS AMRAJ APXCP ASPBG AVWKF AZFZN BCNDV C6C EBS EJD FDB FEDTE FGOYB GROUPED_DOAJ HVGLF HZ~ IPNFZ IXB KQ8 M41 NPM O-L O9- OK1 R2- RIG ROL SES SOJ SSZ XH2 7X8 |
| ID | FETCH-LOGICAL-c463t-cada9994ca6e92f27c0aef83d479d96030095b12aa36dc373b5ab8be06ea8df52 |
| IEDL.DBID | 7X8 |
| ISICitedReferencesCount | 61 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000916231700012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2213-1248 |
| IngestDate | Thu Jul 10 21:53:33 EDT 2025 Sat Jun 07 01:34:00 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 10 |
| Keywords | Economic disruption Internet security Cybersecurity Business security COVID-19 and organization cybersecurity challenges Trending insight of cyber-attack Cyberspace future |
| Language | English |
| License | 2022 The Author(s). |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c463t-cada9994ca6e92f27c0aef83d479d96030095b12aa36dc373b5ab8be06ea8df52 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 ObjectType-Review-3 content type line 23 |
| OpenAccessLink | https://pubmed.ncbi.nlm.nih.gov/PMC9367180 |
| PMID | 37521180 |
| PQID | 2844084170 |
| PQPubID | 23479 |
| ParticipantIDs | proquest_miscellaneous_2844084170 pubmed_primary_37521180 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-11-01 |
| PublicationDateYYYYMMDD | 2022-11-01 |
| PublicationDate_xml | – month: 11 year: 2022 text: 2022-11-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Saudi Arabia |
| PublicationPlace_xml | – name: Saudi Arabia |
| PublicationTitle | Journal of King Saud University. Computer and information sciences |
| PublicationTitleAlternate | J King Saud Univ Comput Inf Sci |
| PublicationYear | 2022 |
| SSID | ssj0001765436 |
| Score | 2.5491564 |
| SecondaryResourceType | review_article |
| Snippet | This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime, highlighting the wide spectrum of cyberattacks that occurred around the... This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime, highlighting the wide spectrum of cyberattacks that occurred around the... |
| SourceID | proquest pubmed |
| SourceType | Aggregation Database Index Database |
| StartPage | 8176 |
| Title | A deeper look into cybersecurity issues in the wake of Covid-19: A survey |
| URI | https://www.ncbi.nlm.nih.gov/pubmed/37521180 https://www.proquest.com/docview/2844084170 |
| Volume | 34 |
| WOSCitedRecordID | wos000916231700012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEA5qPXixvq0vIngN7ia7m6wXKcWiB0sPCr2VvBZqZbd220r_vZPsLj0Jgpc9ZAmEmcnMl0lmPoTuTJhYClCA2EBrEjEliYJAR1yfF54pS2WkPdkEHwzEaJQO64RbWT-rbHyid9Sm0C5Hfg9uNApEFPLgcfZFHGuUu12tKTS2UYsBlHFWzUdik2PhrnLS88vRkBEIZaKpnvNPvD6m5VJP4JBIqe_j6ZmzfsGZPt702_9d6QHar5Em7lamcYi2bH6E2g2LA6439TF66WJj7QyGPgFw40m-KLBeK4CFNbUd9rop4Q8GtIi_5dTiIsM9V8JHwvQBd3G5nK_s-gS995_ees-kJlggOkrYgmhpJADESMvEpjSjXAfSZoKZiKcGjjbMATAVUilZYjTjTMVSCWWDxEphspieop28yO05wlpYLkVEqTKxcwNO4WAD2sQyy1LDOui2EdYYDNjdSsjcFstyvBFXB51VEh_Pqk4bY8YBXYQiuPjD7Eu05xRZ1QleoVYG29deo129WkzK-Y23DPgOhq8_QErCMg |
| linkProvider | ProQuest |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+deeper+look+into+cybersecurity+issues+in+the+wake+of+Covid-19%3A+A+survey&rft.jtitle=Journal+of+King+Saud+University.+Computer+and+information+sciences&rft.au=Alawida%2C+Moatsum&rft.au=Omolara%2C+Abiodun+Esther&rft.au=Abiodun%2C+Oludare+Isaac&rft.au=Al-Rajab%2C+Murad&rft.date=2022-11-01&rft.eissn=2213-1248&rft.volume=34&rft.issue=10&rft.spage=8176&rft_id=info:doi/10.1016%2Fj.jksuci.2022.08.003&rft_id=info%3Apmid%2F37521180&rft_id=info%3Apmid%2F37521180&rft.externalDocID=37521180 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2213-1248&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2213-1248&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2213-1248&client=summon |