2021
DOI: 10.1155/2021/3187205
|View full text |Cite
|
Sign up to set email alerts
|

Analysis and Classification of Mitigation Tools against Cyberattacks in COVID-19 Era

Abstract: The COVID-19 outbreak has forced businesses to shift to an unprecedented “work from home” company environment. While this provides advantages for employees and businesses, it also leads to a multitude of shortcomings, most prevalent of which is the emergence of additional security risks. Previous to the outbreak, company computer networks were mainly confined within its facilities. The pandemic has now caused this network to “spread thin,” as the majority of employees work remotely. This has opened up a variet… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…For the authors Iakovakis & Xarhoulacos [81], the types of computer crimes produced during Covid-19, are: Phishing with 59%, Malware -Ransomware with 36%, Malicious Domains with 22% and new falsehoods with 14%. According to the results the study agrees that both Phishing and Malware are the most used computer crimes.…”
Section: Based On the Results Shown Inmentioning
confidence: 99%
“…For the authors Iakovakis & Xarhoulacos [81], the types of computer crimes produced during Covid-19, are: Phishing with 59%, Malware -Ransomware with 36%, Malicious Domains with 22% and new falsehoods with 14%. According to the results the study agrees that both Phishing and Malware are the most used computer crimes.…”
Section: Based On the Results Shown Inmentioning
confidence: 99%
“…George Iakovakis et al [25] Explore how dispersed corporate networks have expanded the attack surface, making businesses more vulnerable to cyber threats. The study categorizes and evaluates an array of cybersecurity tools-including vulnerability scanners, monitoring and logging tools, and antivirus software-highlighting their advantages, limitations, and applicability for businesses seeking to enhance their cybersecurity posture.…”
Section: Literature Reviewmentioning
confidence: 99%
“…(Chinnici, M., & Iqbal, 2021). The introduction of commercial network monitoring solutions such as SolarWinds and Nagios also significantly revolutionized the field of computer network and monitoring by providing large-scale capabilities in addition to graphical user interfaces, automated alerts and customizable dashboards, which allowed for more comprehensive monitoring of complicated network infrastructure, achieving fuller perspective on the health and performance of our networks (Iakovakis et al, 2021;Kannadhasan et al, 2024).…”
Section: Historical Development and Evolution Of Network Monitoring T...mentioning
confidence: 99%