№2, 2020

Yadigar N. Imamverdiyev

The world is currently experiencing one of the worst pandemics of this century. During this period, cybersecurity becomes even more important, because during a pandemic, the cyber environment is very favorable for malevolent attackers, and society is facing a huge increase in cyberattacks. This article analyzes the general picture of cybersecurity threats during the COVID-19 pandemic, discusses the legislative and technological aspects of personal data security, highlights and briefly describes the new cyber threats that arise in digital pandemic monitoring systems. Measures to combat infodemia and the role of social media in this matter are being investigated. Finally, recommendations for users and organizations to ensure cybersecurity and proposals for modernization of cybersecurity infrastructure are being developed related to implementation of the concept of work from home. The article uses the methods of systematization, generalization, classification and comparative critical analysis. The obtained results are expected to be very useful for improving the cybersecurity systems in organizations in the context of the new increased requirements during the COVID-19 pandemic and post-pandemic period (pp.12-22).

Keywords:COVID-19, pandemic, coronavirus, cybersecurity, privacy, infodemics.
  • The World Health Organization (WHO). Coronavirus disease (COVID-2019) situation reports, https://www.who.int/emergencies/diseases/novel-coronavirus-2019/situation-reports
  • Sohrabi C., Alsafi Z., O’Neill N., Khan M., Kerwan A., Al-Jabir A., Iosifidis C. & Agha R. World Health Organization declares global emergency: A review of the 2019 novel coronavirus (COVID-19) // International Journal of Surgery, 2020, vol. 76, pp. 71-76.
  • Ahmad T. Corona virus (COVID-19) pandemic and work from home: Challenges of cybercrimes and cybersecurity, 2020, DOI: 10.2139/ssrn.3568830.
  • Lallie H. S., Shepherd L. A., Nurse J. R., Erola A., Epiphaniou G., Maple C., & Bellekens X. Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. arXiv preprint arXiv:2006.11929, 2020, 20 p.
  • Tyrrell D.A., Bynoe M.L. Cultivation of viruses from a high proportion of patients with colds // Lancet, 1966, Vol. 1 (7428), 76–77. 
  • Velavan T. P., Meyer C. G. The COVID-19 epidemic // Tropical medicine & international health, 2020, vol. 25, no. 3, pp. 278-280.
  • Wang L.S., Wang Y.R., Ye D.W., & Liu Q.Q. A review of the 2019 novel coronavirus (COVID-19) based on current evidence // International Journal of Antimicrobial Agents, 2020, vol. 55, no. 6, 105948, pp. 1-7, DOI: 10.1016/j.ijantimicag.2020.105948.
  • Fontanilla M.V. Cybercrime pandemic // Eubios Journal of Asian and International Bioethics, 2020, vol. 30, no. 4, pp. 161-165.
  • Krombholz K., Hobel H., Huber M., & Weippl E. Advanced social engineering attacks // Journal of Information Security and applications, 2015, vol. 22, pp. 113-122.
  • Khan N. A., Brohi S. N., & Zaman N. Ten deadly cyber security threats amid COVID-19 pandemic. TechRxiv. Preprint. 2020, 6 p. DOI: 10.36227/techrxiv.12278792.v1
  • Trend Micro, Developing Story: COVID-19 Used in Malicious Campaigns. 2020, https://www.trendmicro.com/vinfo/us/security/news/cybercrimeand-digital-threats/coronavirus-used-in-spam-malware-file-namesand-malicious-domains
  • Johns Hopkins University, Coronavirus COVID-19 Global Cases by the Center for Systems Science and Engineering (CSSE) at Johns Hopkins University (JHU), 2020, https://coronavirus.jhu.edu/map.html.
  • Stein S., and Jacobs J. Cyber-attack hits U.S. health agency amid Covid-19 outbreak, 2020, https://www.bloomberg.com/news/articles/2020-03-16/u-s-healthagency-suffers-cyber-attack-during-covid-19-response.
  • National Cyber Security Centre Advisory: APT groups target healthcare and essential services. 5 May, 2020, https://www.ncsc.gov.uk/les/Joint%20NCSC%20and%20CISA%20Advisory%20APT%20groups%20target%20healthcare%20and%20essential%20services.pdf
  • Bruno D. COVID-19 and cybercrime: How rogue nations and cyber criminals are exploiting a global crisis. Northern Policy Institute: Briefing Note No. 17, May 2020, 13 p.
  • Ienca M., and Vayena E. On the responsible use of digital data to tackle the COVID-19 pandemic // Nature Medicine, 2020, No. 26, pp. 463–464. DOI: 10.1038/s41591-020-0832-5.
  • Renda A., & Castro R. Towards stronger EU governance of health threats after the COVID-19 pandemic // European Journal of Risk Regulation, 2020, pp. 1-10.
  • Goniewicz K., Khorram-Manesh A., Hertelendy A.J., Goniewicz M., Naylor K., & Burkle F.M. Current response and management decisions of the European Union to the COVID-19 outbreak: a review // Sustainability, 2020, vol. 12(9), 3838.
  • Mouton F., de Coning A. COVID-19: Impact on the cyber security threat landscape (pre-print), March 2020, 18 p.
  • Remolina L.N., & Findlay M. Regulating personal data usage in COVID-19 control conditions. SMU Centre for AI & Data Governance Research Paper No 2020/04, 2020, 42 p.
  • Ahn N.Y., Park J.E., Lee D.H., & Hong P.C. Balancing personal privacy and public safety in COVID-19: Case of Korea and France. arXiv preprint arXiv:2004.14495. 2020, 9 p.
  • Daubenschuetz T., Kulyk O., Neumann S., Hinterleitner I., et al. SARS-CoV-2, a Threat to Privacy? arXiv preprint arXiv:2004.10305. 2020, 7 p.
  • EU: Statement on the processing of personal data in the context of the COVID-19 outbreak. 2020, https://edpb.europa.eu/our-work-tools/our-documents/other/statement-processing-personal-data-context-covid-19-outbreak_en
  • İmamverdiyev Y.N. E-səhiyyə: İnformasiya təhlükəsizliyinin aktual problemləri / “Elektron tibbin multidissiplinar problemləri” I respublika elmi-praktiki konfransı, 2016, pp. 32-38.
  • Garfinkel S.L. De-identification of personal information (NISTIR 8053). National Institute of Standards and Technology, 2015, DOI: 10.6028/NIST.IR.8053.
  • Rocher L., Hendrickx J.M., and Montjoye Y.D. Estimating the success of re-identifications in incomplete datasets using generative models // Nature Communications, vol. 10, no. 3069, 2019, DOI: 10.1038/s41467-019-10933-3.
  • İmamverdiyev Y.N. Konfidensiallığı qorumaqla fərdi məlumatların intellektual analizi üçün Deep Learning metodları / “İnformasiya təhlükəsizliyinin aktual multidissiplinar elmi-praktiki problemləri” V respublika konfransı, Bakı, 29 noyabr 2019-cu il, pp. 74-80.
  • Radanliev P., De Roure D., & Van Kleek M. Digitalization of COVID-19 pandemic management and cyber risk from connected systems. arXiv preprint arXiv:2005.12409. IEEE Internet of Things News, 2020, 8 p.
  • Bhate C., Ho C.H., & Brodell R.T. Time to revisit HIPAA? Accelerated telehealth adoption during the COVID-19 pandemic // Journal of the American Academy of Dermatology, 2020, DOI: 10.1016/j.jaad.2020.06.989.
  • Portnoy J., Waller M., Elliot T. Telemedicine in the era of COVID-19 // The Journal of Allergy and Clinical Immunology: In Practice, 2020, Vol. 8, No. 5, pp. 1489-91.
  • Gradon K. Crime in the time of the plague: Fake news pandemic and the challenges to law-enforcement and intelligence community // Society Register, 2020, vol. 4, no. 2, pp. 133-148.
  • Ferrara E. # covid-19 on twitter: Bots, conspiracies, and social media activism. arXiv preprint arXiv:2004.09531. 2020, 25 p.
  • Sukhankin S. COVID-19 as a tool of information confrontation: Russia’s approach // The School of Public Policy Publications, 2020, vol. 13, no. 3, 11 p.
  • Moore M. FBI to warn of Chinese hackers trying to steal coronavirus vaccine data. New York Post. 2020, May 11, https://www.nypost.com/2020/05/11/fbi-towarn-of-hackers-trying-to-steal-coronavirus-vaccine-data
  • Room S. COVID-19, adverse scrutiny and the journey to code: where next for biometric tech? Biometric Technology Today, 2020, No. 5, pp. 9-11.
  • Kindervag J. Build security into your network’s DNA: The zero trust network architecture. Forrester Research Inc.: Cambridge, MA, USA, 2010. pp. 1–26.
  • Rose S., Borchert O., Mitchell S., & Connelly S. Zero trust architecture. NIST Special Publication (SP) 800-207 (2nd Draft). National Institute of Standards and Technology. 2020, 58 p., DOI: 10.6028/NIST.SP.800-207-draft2.
  • Gilman E., & Barth D. Zero trust networks: Building trusted systems in untrusted networks. O'Reilly Media; 1 edition, 2017, 240 p.
  • Abukari A. M., & Bankas E. K. Some cyber security hygienic protocols for teleworkers in COVID-19 pandemic period and beyond // International Journal of Scientific & Engineering Research, 2020, vol. 11, Issue 4, pp.1401-1407.
  • Souppaya M., and Scarfone K. Guide to enterprise telework, remote access, and bring your own device (BYOD) security. NIST Special Publication (SP) 800-46 Rev. 2. National Institute of Standards and Technology, 2016, 53 p., DOI: 10.6028/NIST.SP.800-46r2
  • Chawla A. COVID-19 cyber insurance or cyber Liability: Do you have the coverage? 2020, DOI: 10.2139/ssrn.3610435.