НАЦИОНАЛЬНАЯ АКАДЕМИЯ НАУК АЗЕРБАЙДЖАНА
АНАЛИЗ ПРОБЛЕМ КИБЕРБЕЗОПАСНОСТИ ВО ВРЕМЯ ПАНДЕМИИ COVID-19
Имамвердиев Ядигар Н.

Мир в настоящее время переживает одну из самых страшных пандемий этого столетия. Поэтому значение кибербезопасности еще более возрастает, поскольку общество сталкивается с огромным увеличением кибератак во время этой пандемии. В данной статье анализируется общая картина угроз кибербезопасности во время пандемии COVID-19, рассматриваются законодательные и технологические аспекты безопасности персональных данных, освещаются и кратко описываются новые киберугрозы, возникающие в системах цифрового мониторинга пандемии. Исследуются меры по борьбе с инфодемией и роль социальных медиа в этом вопросе. Наконец, разрабатываются рекомендации для пользователей и организаций по обеспечению кибербезопасности и предложения по модернизации инфраструктуры кибербезопасности, связанные с реализацией концепции работы из дома. В статье использованы методы систематизации, обобщения, классификации и сравнительного критического анализа. Ожидается, что результаты будут очень полезны для улучшения систем кибербезопасности в организациях в контексте новых повышенных требований во время пандемии COVID-19 и постпандемии (стр.12-22).

Ключевые слова:COVID-19, пандемия, коронавирус, кибербезопасность, приватность, инфодемия.
DOI : 10.25045/jpis.v11.i2.02
Литература
  • The World Health Organization (WHO). Coronavirus disease (COVID-2019) situation reports, https://www.who.int/emergencies/diseases/novel-coronavirus-2019/situation-reports
  • Sohrabi C., Alsafi Z., O’Neill N., Khan M., Kerwan A., Al-Jabir A., Iosifidis C. & Agha R. World Health Organization declares global emergency: A review of the 2019 novel coronavirus (COVID-19) // International Journal of Surgery, 2020, vol. 76, pp. 71-76.
  • Ahmad T. Corona virus (COVID-19) pandemic and work from home: Challenges of cybercrimes and cybersecurity, 2020, DOI: 10.2139/ssrn.3568830.
  • Lallie H. S., Shepherd L. A., Nurse J. R., Erola A., Epiphaniou G., Maple C., & Bellekens X. Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. arXiv preprint arXiv:2006.11929, 2020, 20 p.
  • Tyrrell D.A., Bynoe M.L. Cultivation of viruses from a high proportion of patients with colds // Lancet, 1966, Vol. 1 (7428), 76–77. 
  • Velavan T. P., Meyer C. G. The COVID-19 epidemic // Tropical medicine & international health, 2020, vol. 25, no. 3, pp. 278-280.
  • Wang L.S., Wang Y.R., Ye D.W., & Liu Q.Q. A review of the 2019 novel coronavirus (COVID-19) based on current evidence // International Journal of Antimicrobial Agents, 2020, vol. 55, no. 6, 105948, pp. 1-7, DOI: 10.1016/j.ijantimicag.2020.105948.
  • Fontanilla M.V. Cybercrime pandemic // Eubios Journal of Asian and International Bioethics, 2020, vol. 30, no. 4, pp. 161-165.
  • Krombholz K., Hobel H., Huber M., & Weippl E. Advanced social engineering attacks // Journal of Information Security and applications, 2015, vol. 22, pp. 113-122.
  • Khan N. A., Brohi S. N., & Zaman N. Ten deadly cyber security threats amid COVID-19 pandemic. TechRxiv. Preprint. 2020, 6 p. DOI: 10.36227/techrxiv.12278792.v1
  • Trend Micro, Developing Story: COVID-19 Used in Malicious Campaigns. 2020, https://www.trendmicro.com/vinfo/us/security/news/cybercrimeand-digital-threats/coronavirus-used-in-spam-malware-file-namesand-malicious-domains
  • Johns Hopkins University, Coronavirus COVID-19 Global Cases by the Center for Systems Science and Engineering (CSSE) at Johns Hopkins University (JHU), 2020, https://coronavirus.jhu.edu/map.html.
  • Stein S., and Jacobs J. Cyber-attack hits U.S. health agency amid Covid-19 outbreak, 2020, https://www.bloomberg.com/news/articles/2020-03-16/u-s-healthagency-suffers-cyber-attack-during-covid-19-response.
  • National Cyber Security Centre Advisory: APT groups target healthcare and essential services. 5 May, 2020, https://www.ncsc.gov.uk/les/Joint%20NCSC%20and%20CISA%20Advisory%20APT%20groups%20target%20healthcare%20and%20essential%20services.pdf
  • Bruno D. COVID-19 and cybercrime: How rogue nations and cyber criminals are exploiting a global crisis. Northern Policy Institute: Briefing Note No. 17, May 2020, 13 p.
  • Ienca M., and Vayena E. On the responsible use of digital data to tackle the COVID-19 pandemic // Nature Medicine, 2020, No. 26, pp. 463–464. DOI: 10.1038/s41591-020-0832-5.
  • Renda A., & Castro R. Towards stronger EU governance of health threats after the COVID-19 pandemic // European Journal of Risk Regulation, 2020, pp. 1-10.
  • Goniewicz K., Khorram-Manesh A., Hertelendy A.J., Goniewicz M., Naylor K., & Burkle F.M. Current response and management decisions of the European Union to the COVID-19 outbreak: a review // Sustainability, 2020, vol. 12(9), 3838.
  • Mouton F., de Coning A. COVID-19: Impact on the cyber security threat landscape (pre-print), March 2020, 18 p.
  • Remolina L.N., & Findlay M. Regulating personal data usage in COVID-19 control conditions. SMU Centre for AI & Data Governance Research Paper No 2020/04, 2020, 42 p.
  • Ahn N.Y., Park J.E., Lee D.H., & Hong P.C. Balancing personal privacy and public safety in COVID-19: Case of Korea and France. arXiv preprint arXiv:2004.14495. 2020, 9 p.
  • Daubenschuetz T., Kulyk O., Neumann S., Hinterleitner I., et al. SARS-CoV-2, a Threat to Privacy? arXiv preprint arXiv:2004.10305. 2020, 7 p.
  • EU: Statement on the processing of personal data in the context of the COVID-19 outbreak. 2020, https://edpb.europa.eu/our-work-tools/our-documents/other/statement-processing-personal-data-context-covid-19-outbreak_en
  • İmamverdiyev Y.N. E-səhiyyə: İnformasiya təhlükəsizliyinin aktual problemləri / “Elektron tibbin multidissiplinar problemləri” I respublika elmi-praktiki konfransı, 2016, pp. 32-38.
  • Garfinkel S.L. De-identification of personal information (NISTIR 8053). National Institute of Standards and Technology, 2015, DOI: 10.6028/NIST.IR.8053.
  • Rocher L., Hendrickx J.M., and Montjoye Y.D. Estimating the success of re-identifications in incomplete datasets using generative models // Nature Communications, vol. 10, no. 3069, 2019, DOI: 10.1038/s41467-019-10933-3.
  • İmamverdiyev Y.N. Konfidensiallığı qorumaqla fərdi məlumatların intellektual analizi üçün Deep Learning metodları / “İnformasiya təhlükəsizliyinin aktual multidissiplinar elmi-praktiki problemləri” V respublika konfransı, Bakı, 29 noyabr 2019-cu il, pp. 74-80.
  • Radanliev P., De Roure D., & Van Kleek M. Digitalization of COVID-19 pandemic management and cyber risk from connected systems. arXiv preprint arXiv:2005.12409. IEEE Internet of Things News, 2020, 8 p.
  • Bhate C., Ho C.H., & Brodell R.T. Time to revisit HIPAA? Accelerated telehealth adoption during the COVID-19 pandemic // Journal of the American Academy of Dermatology, 2020, DOI: 10.1016/j.jaad.2020.06.989.
  • Portnoy J., Waller M., Elliot T. Telemedicine in the era of COVID-19 // The Journal of Allergy and Clinical Immunology: In Practice, 2020, Vol. 8, No. 5, pp. 1489-91.
  • Gradon K. Crime in the time of the plague: Fake news pandemic and the challenges to law-enforcement and intelligence community // Society Register, 2020, vol. 4, no. 2, pp. 133-148.
  • Ferrara E. # covid-19 on twitter: Bots, conspiracies, and social media activism. arXiv preprint arXiv:2004.09531. 2020, 25 p.
  • Sukhankin S. COVID-19 as a tool of information confrontation: Russia’s approach // The School of Public Policy Publications, 2020, vol. 13, no. 3, 11 p.
  • Moore M. FBI to warn of Chinese hackers trying to steal coronavirus vaccine data. New York Post. 2020, May 11, https://www.nypost.com/2020/05/11/fbi-towarn-of-hackers-trying-to-steal-coronavirus-vaccine-data
  • Room S. COVID-19, adverse scrutiny and the journey to code: where next for biometric tech? Biometric Technology Today, 2020, No. 5, pp. 9-11.
  • Kindervag J. Build security into your network’s DNA: The zero trust network architecture. Forrester Research Inc.: Cambridge, MA, USA, 2010. pp. 1–26.
  • Rose S., Borchert O., Mitchell S., & Connelly S. Zero trust architecture. NIST Special Publication (SP) 800-207 (2nd Draft). National Institute of Standards and Technology. 2020, 58 p., DOI: 10.6028/NIST.SP.800-207-draft2.
  • Gilman E., & Barth D. Zero trust networks: Building trusted systems in untrusted networks. O'Reilly Media; 1 edition, 2017, 240 p.
  • Abukari A. M., & Bankas E. K. Some cyber security hygienic protocols for teleworkers in COVID-19 pandemic period and beyond // International Journal of Scientific & Engineering Research, 2020, vol. 11, Issue 4, pp.1401-1407.
  • Souppaya M., and Scarfone K. Guide to enterprise telework, remote access, and bring your own device (BYOD) security. NIST Special Publication (SP) 800-46 Rev. 2. National Institute of Standards and Technology, 2016, 53 p., DOI: 10.6028/NIST.SP.800-46r2
  • Chawla A. COVID-19 cyber insurance or cyber Liability: Do you have the coverage? 2020, DOI: 10.2139/ssrn.3610435.