scholarly journals Impact of Covid-19 on cyber Security

2022 ◽  
Author(s):  
Usman Akanbi

The Covid-19 pandemic is an unforeseen occurrence that took the world by storm. Governments and businesses were unprepared, hence the large-scale impact it continuously has on the planet. It has permanently revolutionised how we live, work and interact with technology. With this new way of living, businesses and governments had to adapt to a new form of survival, and so did cybercriminals; there was a surge in cyber threats due to our newfound dependence on technology. This paper emphasises the common types of cyber threats and the targeted industries. These attacks were more successful because people were uneasy and desperate, which gave the criminals more incentive to attack businesses. To avoid being a cyber target, I have provided recommendations against future threats.

1884 ◽  
Vol 16 (5) ◽  
pp. 81-89
Author(s):  
W. H. Edwards

I am asked to write for the Can. Ent. a paper on breeding butterflies, and on taking observations of the larval stages, and I comply with pleasure, hoping that what I shall say may be the means of inducing some collectors to cultivate this field. There are many local collections of butterflies in Canada and the United States, and a few general North American collections, more or less complete. But their owners are mostly satisfied with mere collecting and accumulating specimens of the imago. Very few know anything of the larval and other stages of the butterflies, unless of some of the common species. And where anything is known, very little is given to the world. Some collectors, however, have also been breeders of butterflies, sphinges and moths on a large scale. As for example, our friends, John Akhurst and Professor Julius E. Meyer, of Brooklyn, each of whom could fill a good-sized volume, if they would relate one half of what they know on these subjects. Such an one was the late William Newman, of Philadelphia, who lived to a good old age, and had spent his spare hours for many years in collecting and breeding lepidoptera. But none of these gentlemen have published a line that I am aware of, and the entomological world is not much the wiser for their private experience. So that practically here is a great field almost unworked.


2021 ◽  
pp. 19-27
Author(s):  
Nazar Demchyshak ◽  
Anastasiia Shkyria

Purpose. The aim of the article is substantiation of approaches of domestic and foreign scientists to risk management in the financial sector of Ukraine in the context of cyber threats and the need to ensure national security and post-pandemic economic recovery. Methodology of research. General scientific and special methods of scientific research are used in the article, in particular: induction, deduction, scientific abstraction - to reveal the essence of the concepts of "cyber threat", “cyber security" and "digitalization"; statistical and graphical methods - to assess the current situation in the field of cyber defence in the world and the national cyber security index; methods of analysis and synthesis - in substantiating the conclusions of the research. Finding. Definitions of cyber risk, approaches to its interpretation and classification were considered. The importance of cyber security in the digitalization of the national economy was argued. The Strategy of Ukrainian Financial Sector Development until 2025 is analysed. The world statistics of frequency and losses due to cyber-attacks are studied and the cyber threats that caused the greatest losses in Ukraine are identified. The analysis of Ukraine’s positions in the National Cyber Security Index 2020 is carried out. The directions of cyber threat prevention that can be useful for Ukrainian companies are substantiated. Originality. The author’s definition of the term "cyber risk" is proposed, in which special attention in focused on the effects of cyber threats. The importance of cyber risk management in the conditions of inevitability of digitalization in the financial sector of Ukraine is substantiated. Approaches to the prevention of cyber-attacks, the implementation of which is necessary for the successful digital transformation of Ukraine, are proposed. Practical value. The results of the research will contribute to the formation of an effective risk management system in the financial sector of Ukraine in terms of digitalization of the financial space and post-pandemic recovery of the national economy. Key words: national security, cyber risk, cyber threat, cyber defence, digitalization, post-pandemic recovery, fintech.


2021 ◽  
Vol 17 (3) ◽  
pp. 3-13
Author(s):  
Antonina Yerina ◽  
Ihor Honchar ◽  
Svitlana Zaiets

Introduction. The scale and destructive consequences of the unlawful impact on cyberspace is a key problem of modern geopolitics, and cyber reliability is recognized as one of the most important security priorities by the subjects of international relations.Problem Statement. Monitoring of cyber incidents and anomalies in information and communication systems and prompt response to risks determined by cyber threats require the development of a system of indicators and criteria for cybersecurity assessment.Purpose. Summarize the international experience of assessing the cybersecurity, to position countries by their level of development in the global space, to identify strengths and weaknesses in cybersecurity management, and to ensure effective protection of cyberspace at the national level.Materials and Methods. Used the component indices of the international rankings characterizing the potential of the digital economy (ICT IDI, NRI, EGDI) and the participation of countries in the field of cybersecurity(GCI and NCSI).Results. It has been argued that cybersecurity ratings play the role of a kind of identifier of the relative advantages and vulnerabilities of the national cyber strategies, and indicate the need for their review in order tostrengthen protection against cyber-attacks and improve the cyber risk management system. In countries with a high level of economic development, which is largely based on the contribution of IT technologies to the national production, the cybersecurity potential is significantly higher, regardless of geolocation. The discovered correlation between GCI, information society development indices (IDI, NRI, EGDI) and GDPper capita confirms that the digital transformation of the economy and society acts as a key driver of economicdevelopment if the information- and cyber-security are assured only. The best practices are highlighted, andcritically weak segments of the national cybersecurity are identified.Conclusions. Using the NCSI indicators, the preparedness of Georgia and Ukraine to prevent the implementation of fundamental cyber threats and to manage cyber incidents and large-scale cyber crises is assessed.


2021 ◽  
Vol 8 (7) ◽  
pp. 202321
Author(s):  
Metod Jazbec ◽  
Barna Pàsztor ◽  
Felix Faltings ◽  
Nino Antulov-Fantulin ◽  
Petter N. Kolm

We quantify the propagation and absorption of large-scale publicly available news articles from the World Wide Web to financial markets. To extract publicly available information, we use the news archives from the Common Crawl, a non-profit organization that crawls a large part of the web. We develop a processing pipeline to identify news articles associated with the constituent companies in the S&P 500 index, an equity market index that measures the stock performance of US companies. Using machine learning techniques, we extract sentiment scores from the Common Crawl News data and employ tools from information theory to quantify the information transfer from public news articles to the US stock market. Furthermore, we analyse and quantify the economic significance of the news-based information with a simple sentiment-based portfolio trading strategy. Our findings provide support for that information in publicly available news on the World Wide Web has a statistically and economically significant impact on events in financial markets.


2021 ◽  
Vol 2 (2) ◽  
pp. 91-98
Author(s):  
Imam Pratama Rifky

The new variant of corona virus from Wuhan is indeed very infectious. The Covid-19 has shocked the world because it is so deadly and takes many lives. So this has a significant impact on each country. Indonesia, to tackle the spread of this virus, has also implemented several ways, namely by encouraging people to live clean and healthy lives, implementing the 5M (Wearing masks, Washing hands, Keeping a distance, Staying away from crowds, Limiting mobilisation and interaction) and imposing restrictions. The government's efforts are solely for the common good. However, it is undeniable the large-scale social restrictions or Pembatasan Sosial Berskala Besar (PSBB) implementation also has an unfavourable impact on the community because their movement is restricted. This indirectly also harms the people's economic movement. So there are still some people who violate this PSBB rule. This study was conducted to determine whether the ultimum remedium is applied in law enforcement for PSBB violations. The research will use qualitative research by collecting data and news analyzation. The study results show that the government applies criminal sanctions and fines as an alternative to deter people.


2021 ◽  
Vol 9 (2) ◽  
pp. 51-63 ◽  
Author(s):  
Joshua Long

Throughout the development sector there has been a pronounced call for new funding mechanisms to address the climate crisis, and much of this is focused on attracting private sources of capital to fund ‘bankable’ projects in climate-vulnerable cities throughout the world. Enacted amidst a 21st century landscape of interlocking financial, epidemiological, and ecological crises, this call features an urgent narrative of ‘resilience-amidst-crisis’ that promotes large-scale, profitable investments as a form of green growth through debt-financing. The political orchestration and administration of new funding mechanisms (particularly green bonds and sustainable bonds) requires a new form of climate governance focused on the channeling of enormous sums of private capital through an assemblage of intermediaries toward profitable climate projects. This article interrogates this trend in climate finance, revealing that the framing, monetization, and orchestration of climate projects is dependent on a narrative of crisis capitalism deeply rooted in a colonial mindset of exploitation and profit. A key aim of this article is to deconstruct the contemporary dominance of crisis-oriented development and suggest the goal of decolonizing and democratizing the climate finance system.


2020 ◽  
pp. 203-215
Author(s):  
Valentyna KRASAVINA

Having spread around the world, the Covid-19 pandemic has caused an increase in the number of neologisms both in Ukrainian and in other languages. In the first place, it happened due to extralinguistic factors – specific features of the infectious disease itself as well as the unprecedented social practices which have become a new method of adaptation to the present day circumstances. Language has promptly reacted to large-scale changes in the world and the society: new words and word combinations denoting the phenomena, objects and notions unknown before have appeared; the modification of the semantics of certain common words has taken place; the sphere of usage of some specialized terms has broadened. Globalization processes and a tendency towards language unification have facilitated the spread of terms of international use, neolexemes, neomorphemes, which is indicative of the emergence of the common international vocabulary. English borrowings have been actively adopted due to the language practice of mass media (in particular, the electronic ones), which are dynamic and open to innovation, and, as is the case with social networks, enable the communication of a great number of people of various nationalities, ages and social status. Thus, neologisms are social markers of transformations, typical of the society in a globalized world. Renovation of the vocabulary is happening by means of adoption of foreignisms, predominantly of the English origin, international terms, which are replenishing terminology subsystems, in particular the ones of healthcare and administration, etc.; by means of word-formation using borrowed derivation tools; due to the activation of the processes of extending the semantics of already familiar words. A considerable amount of new words will not enter the general vocabulary as upon the conclusion of the Covid-19 pandemic they will be excluded from the active use and transferred to the corpus of historical words of the epoch which will become the evidence of the period of the quarantine measures and self-isolation of the citizens, and some words will be returned to a specialized sphere of use.


Author(s):  
Vaishnavi Ambalavanan ◽  
Shanthi Bala P.

Cyberspace plays a dominant role in the world of electronic communication. It is a virtual space where the interconnecting network has an independent technology infrastructure. The internet is the baseline for the cyberspace which can be openly accessible. Cyber-security is a set of techniques used to protect network integrity and data from vulnerability. The protection mechanism involves the identification of threats and taking precaution by predicting the vulnerabilities in the environment. The main cause of security violation will be threats, that are caused by the intruder who attacks the network or any electronic devices with the intention to cause damage in the communication network. These threats must be taken into consideration for the mitigation process to improve the system efficiency and performance. Machine learning helps to increase the accuracy level in the detection of threats and their mitigation process in an efficient way. This chapter describes the way in which threats can be detected and mitigated in cyberspace with certain strategies using machine learning.


2019 ◽  
Author(s):  
A Oruc ◽  
Fred Flinstone

Cyber security in the maritime industry became crucial due to both academic researches and incidents. There are academic studies that show vulnerabilities in various navigation equipments such as GPS, ECDIS, AIS and ARPA-Radar. Additionally, there are different cyber incidents around the world. Developments in technology, autonomous ship projects, academic studies and cyber incidents in the sector put in action IMO. As per ISM Code, all shipping companies are mandatory to add “Guidelines on Maritime Cyber Risk Management” manual to their SMS manuals until 1st January 2021. Both OCIMF and CDI failed to be indifferent to developments that are important for tanker operators as well as IMO. While OCIMF added cybersecurity-related questions to vetting programs called TMSA 3 and VIQ 7, CDI also added cybersecurity-related items in SIR 9.8.1 edition. On the other hand, RightShip provides significant vetting service for dry cargo ships. “Inspection and Assessment Report” is issued by RigthShip for dry cargo ships. Questions related with cybersecurity was added with Revision No: 11 dated on 11th May 2017 in “Inspection and Assessment Report”. In this study, cyber security related questions which are asked during TMSA, SIRE and CDI vettings which play a critical role for commercial life of tanker firms, were analyzed. Moreover, questions and efficiency of RightShip that offers vetting service for dry cargo ships, were assessed to maritime cyber security. Also, cybersecurity-related questions in vetting questionnaires were interpreted by the author. These comments rely on benchmarking meetings among tanker operators where the author personally attended, and interview with key persons. Noted observations during vettings may negatively impact both commercial life and reputation of the tanker operators. That’s why the firm names and interviewee names were kept confidential. In this study, it was seen that although IMO demanded verification of cyber security-related implementations for the ship operators until 1st January 2021, this process started earlier for tanker operators.


2019 ◽  
pp. 1189-1199
Author(s):  
David Gould

This article includes a perspective on cyber security through the lens of the World Economic Forum Resilience Framework. As cyber threats are a continual threat to organizations, it may be useful to consider resilience as a complementary approach to technological responses. The problem is that organizations cannot generate a sufficient number and types of responses to cyber security threats as the number of threats and associated costs continues to increase. The purpose of this article is to explore some possible practices and approaches to counter the ongoing and escalating cyber security threats, with the understanding and wisdom that not all threats will be possible to stop. Resilience is a complementary factor to directly countering threats by taking actions to backup information, having access to additional equipment as needed, by budgeting for failure, preparing for unexpected circumstances among other activities. Concepts from evolution and game theory are introduced within the resilience discussion.


Sign in / Sign up

Export Citation Format

Share Document