2020 IEEE 15th International Conference on Computer Sciences and Information Technologies (CSIT) 2020
DOI: 10.1109/csit49958.2020.9321897
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of the attack vectors used by threat actors during the pandemic

Abstract: this article describes attacks methods, vectors and technics used by threat actors during pandemic situations in the world. Identifies common targets of threat actors and cyber-attack tactics. The article analyzes cybersecurity challenges and specifies possible solutions and improvements in cybersecurity. Defines cybersecurity controls, which should be taken against analyzed attack vectors.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 1 publication
0
7
0
1
Order By: Relevance
“…Zoom is widely used for conferencing and is becoming more well-known all around the world. It offers online chat services through cloud-based peer-to-peer software that is largely used for video conferencing, social interactions, and remote meetings (Susukailo et al, 2020). However, Zoom has serious security and privacy concerns.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Zoom is widely used for conferencing and is becoming more well-known all around the world. It offers online chat services through cloud-based peer-to-peer software that is largely used for video conferencing, social interactions, and remote meetings (Susukailo et al, 2020). However, Zoom has serious security and privacy concerns.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Також було виявлено атаки, що використовують такі програми як Zoom, як частину вектору атаки спрямованої на отримання доступу до даних користувачів чи записів конференції [7].…”
Section: вступunclassified
“…While many organizations and government institutions are doing Vulnerability Management program across their enterprises, it is impossible and not cost-effective to patch all detected known vulnerabilities, therefore many of these organizations end up focusing on the high to critical severity vulnerabilities while in some cases the low to medium severity vulnerabilities are either accepted as a risk or ignored as benign security issue [39], [40]. Threat actors never stop searching for those unpatched vulnerabilities to exploit [41], [42]. There are other scenarios where the design of software systems may contain flaws that negatively affect quality and maintainability [43], thereby creating a vulnerability that if exploited may be disruptive to an organization [39], [40].…”
Section: ) Exploit Of Unpatched Vulnerabilitiesmentioning
confidence: 99%