Skip to main content

Impacts of COVID on Cybersecurity

  • Conference paper
  • First Online:
Critical Infrastructure Protection in the Light of the Armed Conflicts (HCC 2022)

Abstract

The COVID-19 pandemic has completely changed our daily lives, as we have become more dependent on digital services, including the Internet, than ever before due to confinement. Social distancing has been advised during the pandemic, so online infrastructure has become a central hub for communication, commerce, work and learning. The COVID-19 pandemic gave an unprecedented boost to the acceleration of digitization. Organizations were forced to quickly digitize their processes and business models, as well as create flexible and remote work environments, reach customers and manage employees primarily through digital channels. The new challenges created an opportunity for the cyber security sector to evolve and respond to the rapidly growing number of cyber security attacks and the growing number of cyber security attacks. Ignoring cyber-threats and cyber-attacks can have significant economic, reputational, operational, legal and compliance consequences, which is why dealing with the topic is justified. The publication examines and analyzes its impact on cyber risks during COVID-19, as well as mitigating measures that organizations can take.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ferreira A, Cruz-Correia R (2020) Cybersecurity in pandemic times: challenges and opportunities. In: 12th international conference on e-health. Croatia, 21–23 July, 2020, pp 135–142

    Google Scholar 

  2. Jiang JX, Bai G (2020) Types of information compromised in breaches of protected health information. Ann Intern Med 172(2):159–160. https://doi.org/10.7326/M19-1759

    Article  Google Scholar 

  3. Ronquillo JG, Erik JW, Cwikla K, Szymanski R, Levy C (2018) Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information. JAMIA Open 1(1):15–19

    Article  Google Scholar 

  4. Schmitt MN (ed) (2013) Tallinn manual on the international law applicable to cyber operations. Cambridge University Press, Rule 30, pp 1–255

    Google Scholar 

  5. World Economic Forum (2022) Global cybersecurity outlook 2022, insight report Jan 2022. Published: 18 Jan 2022, pp 1–35. https://www3.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2022.pdf

  6. Health Sector Cybersecurity Coordination Center (HC3) (2020) Analyst note. Published: 16 Nov 2020, pp 1–2. https://www.hhs.gov/sites/default/files/analyst-note-cl0p-tlp-white.pdf

  7. Cybersecurity Selected Cyberattacks (2012–2021) Published: 22 Nov 2021, pp 1–24. https://crsreports.congress.gov/product/pdf/R/R46974

  8. European Commission (2021) A cybersecure digital transformation in a complex threat environment—Brochure. Publication 28 Jan 2021, pp 1–9. https://digital-strategy.ec.europa.eu/en/node/332/printable/pdf

  9. Federal Bureau of Investigation (2021) Internet crime report 2021, pp 1–33. https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf

  10. National Fraud Intelligence Bureau (2020–2021) Cyber crime trends, p 1. https://data.actionfraud.police.uk/cms/wp-content/uploads/2021/07/CYBER-Dashboard-Assessment-20-21.pdf

  11. Regulation 2016/679 of the European Parliament and of the Council (2016) On the protection of natural persons with regard to the processing of personal data and on the free flow of such data, and on the repeal of Regulation 95/46/EC (general data-protection regulation, GDPR), Brussels. Off J Eur Union 119(1). https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679

  12. Beláz A (2018) Information security and the digital state: the role of the risk management principles in the strategic documents. Bánki Rep 1(3):56–60

    Google Scholar 

  13. Michelberger P, Lábodi C (2012) After information security—before a paradigm change: a complex enterprise security model. Acta Polytech Hung 9(4):101–116

    Google Scholar 

  14. Szabó Z (2017) The information security and IT security questions of pension payment. Key Eng Mater 755:322–327. ISSN: 1662-9795. https://doi.org/10.4028/www.scientific.net/KEM.755.322

  15. Jenei T (2016) Comparison of the most frequently used models of risk management, Int J Eng Manag Sci (IJEMS) 1(1):1–11. https://doi.org/10.21791/IJEMS.2016.1.22

  16. Europol (2020) Catching the virus cybercrime, disinformation and the COVID-19 pandemic. Published: 3 Apr 2020, pp 1–14. https://www.europol.europa.eu/sites/default/files/documents/catching_the_virus_cybercrime_disinformation_and_the_covid-19_pandemic_0.pdf

  17. Europol (2020) Pandemic profiteering how criminals exploit the COVID-19 crisis. Published: Mar 2020, pp 1–14. https://www.europol.europa.eu/sites/default/files/documents/pandemic_profiteering-how_criminals_exploit_the_covid-19_crisis.pdf

  18. Interpol (2020) COVID-19 cyberthreats. Published: Apr 2020, pp 1–2. https://www.interpol.int/Crimes/Cybercrime/COVID-19-cyberthreats

  19. Ienca M, Vayena E (2020) On the responsible use of digital data to tackle the COVID-19 pandemic. Nat Med 26(4):463–464. https://doi.org/10.1038/s41591-020-0832-5. http://europepmc.org/abstract/MED/32284619

  20. Bai G, Jiang JX, Flasher R (2017) Hospital risk of data breaches. JAMA Intern Med 177(6):878–880. https://doi.org/10.1001/jamainternmed.2017.0336

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zsolt Mihály Szabó .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Szabó, Z.M. (2024). Impacts of COVID on Cybersecurity. In: Kovács, T.A., Nyikes, Z., Berek, T., Daruka, N., Tóth, L. (eds) Critical Infrastructure Protection in the Light of the Armed Conflicts. HCC 2022. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-47990-8_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-47990-8_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-47989-2

  • Online ISBN: 978-3-031-47990-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics