1.
Introduction
COVID-19 is a worldwide public health emergency. The Cybersecurity and Infrastructure Security Agency of the US Department of Homeland Security (DHS) announced an advisory memorandum regarding essential critical infrastructure workers March 28, 2020 [1]. Leadership for dealing with COVID-19 needs to break information silos and coordinate efforts for stopping or containing the new coronavirus that causes COVID-19. Sustainable human security is significant. A broader health system emphasizes security in healthcare, environmental pollution, foods, economy, and preparedness for future possible pandemics. South Korea has realized the importance of tracking infected individuals' movements and persons who had contacted with them [2,3].
Many people had to work at home, choose telemedicine, and perform distance learning and online schooling due to the COVID-19 pandemic. Requirements for these people include computers, the Internet, firewall software, cameras, etc. Meetings can be conducted via video conferencing. Although calls can be encrypted for security, COVID19 generated new challenges in cybersecurity [3,4]. Work and study at home due to COVID-19 causes increased Internet uses, entices more people to spend much time online, and provides more opportunities for cybercrime [5]. Deadly cyber security threats include malware, spam email, malicious websites, ransomware, malicious domains, DDoS attacks, business email compromise, malicious social media messaging, etc. [6,7]. The development of ICT usage is submitted to security requirements. Factors related to the security include staff's awareness in ICT security, activities related to ICT security, policies regarding ICT security, etc. [8].
During the COVID-19 pandemic, it is important to avoid close contact with many people in daily life. Radio frequency identification (RFID) is helpful for shopping systems, supply chain management, and security. RFID utilizes radio waves and RFID tags with microchips for storing data and antennas for receiving and transmitting radio frequency signals. RFID can provide an extra anti-theft mechanism. Many RFID tags can be read at the same time and from a long distance. Therefore, RFID helps improve the efficiency, safety, and security of various systems during the COVID-19 pandemic [9] due to its simultaneously multiple readings and the capability of remote identification.
The purpose of this paper is to introduce cyber risks and cyber security during the COVID-19 pandemic. The subsequent sections of the paper are organized as follows: the second section introduces major technologies in fighting COVID-19, the third section presents cyber-attacks and cyber risks due to COVID-19, the fourth section introduces cyber security for telework, the fifth section presents cyber security of IoT and telemedicine, the sixth section deals with cyber security based on blockchain technology, and the seventh section is a conclusion.
2.
Major technologies in fighting COVID-19
Tactile edge technology focusing on 5G or beyond 5G (B5G) helps control COVID-19 and is more powerful than 4G-enabled technology. The use of edge computation based on 5G wireless network facilitates the control process of the novel disease. A hierarchical system of edge computing has advantages, e.g., scalability, low latency, protecting training model data. Pervasive edge computing can be utilized to achieve better security. A B5G-based healthcare framework was developed to fight pandemics like COVID-19. The framework covers a cloud layer, an edge layer, and a stakeholder layer. It can be integrated with a surveillance system (for mask-wearing, social distancing, body temperature testing). The developed COVID-19 diagnostic method can help to identify patients without COVID-19 infection, avoid overcrowding in a hospital, and process sensitive personal data [10]. More technologies and their main applications in fighting against COVID-19 are summarized in Table 1.
An authentication scheme for cloud-assisted vehicular ad hoc networks (VANETs) was developed [12]. Passengers' physical status can be measured timely and without any contact based on vehicular cloud (VC). A vehicle recording mechanism based on blockchain was fulfilled using edge units and the VC. Requirements for COVID-19 control can be met [12]. Table 2 shows main security features for a VANET security scheme.
3.
Cyber-attacks and cyber risks during the COVID-19 pandemic
The disruption due to COVID-19 has disclosed the weaknesses of existing institutions in protecting human health and well-being. A lack of timely and accurate data and widespread misinformation have caused ever-increasing harms and growing tension between public health concerns and data privacy. In the absence of accurate data and reliable information, the suffering due to COVID-19 has been worse. The COVID-19 crisis is an information crisis as well as a trust crisis. It has underlined failures of existing systems in trust and data sharing. During the crisis, main supply chain failures have been noticed, especially for personal protective equipment (PPE) and lifesaving ventilators in clinics and hospitals [13].
Digital methods have played a significant role during the COVID-19 pandemic. However, there are telemedicine challenges and other digital approaches in privacy and security for protected information [14]. Since the beginning of the COVID-19 pandemic, there has been remarkable increase in the number of cyber-attacks. During the pandemic, major cyber risks are caused by people's actions as well as failures of systems and technology. The source of operational risk includes people's actions, for example, deliberate (e.g., theft, sabotage, fraud, and vandalism), inadvertent (i.e., omissions, errors, and mistakes), and inaction (e.g., availability, knowledge, skills, and guidance). Failures of systems and technology lie in software (i.e., coding practices, testing, security settings, change control, configuration management, and compatibility), hardware (i.e., capacity, performance, maintenance, and obsolescence), and system (i.e., specifications, design, integration, and complexity) [15]. Table 3 lists part of malicious and non-malicious breaches. Some potential attack scenarios are shown in Table 4.
It is necessary for organizations to solve problems about the security and privacy of all stakeholders' personal data through creating applicable frameworks for data governance. From an ethical point of view, technical compliance with data and privacy laws is often insufficient to protect organizations from frustrated consumers. There should be adequate incorporated safeguards to handle ethical risks and possible risks in security and reputation of organizations. From a legal point of view, organizations should employ suitable processes to guarantee compliance with laws related to data capture, storage, utilization, and disclosure [18].
4.
Cyber security for telework
Working at home due to COVID-19 is the "new normal". Many individuals will not return to an office when the pandemic is over; most individuals in a "work from home" setting will continue in that mode, even after the vaccine has been fully distributed. Schools will most likely be returning from the 14-month hiatus this coming (i.e., 2021) fall. Security and risks in reputation, especially for businesses with sensitive data which have been a concern after regulations of self-isolation pushed people to work at home and organizations had to adapt their business models to accommodate a remarkable increase of network activities. Many hackers have consistently redirected their activities from attacking business toward activities that could reach consumers or employees at their homes through platforms, e.g., Netflix or Zoom [18]. Table 5 shows some items of risky cyber security behaviors.
During the COVID-19 pandemic, many organizations perform the teleworking model, causing insufficient cyber security for employees. A lot of employees' networks at home may consist of outdated PCs and insecure devices of IoT. The pandemic has caused technological and end-user vulnerabilities and cyber criminals are exploiting telework vulnerabilities [19]. Tables 6 shows technologies, targeted/impersonated technology brands, situational factors, and cybercrimes.
COVID-19 has caused a shift from ecosystems to a virtual workplace for employees, which brough up challenges in cyber security risks because there are more vulnerabilities on employee's personal computers and their home Internet [20]. Table 7 lists telework cyber security recommendations for remote employees.
5.
Cyber security of IoT and telemedicine
Cyber risks are one of main barriers to wide applications of IoT in healthcare. Patients' privacy needs to be protected, ensuring to prevent unauthorized tracking and verification. IoT may provide opportunities for cyber-attacks and for personal information to be captured improperly. Applications based on IoT are vulnerable to cyber-attacks for two reasons: 1) many communications are wireless, making eavesdropping relatively easy when high encryption is not used; 2) low energy is a feature of most IoT components; however, it is hard for them to perform schemes for a guarantee of security [21]. Realizing interoperability across IoT platforms helps deliver more accessible and safer services in healthcare. Data sharing across various countries is also a concern. Data security, confidentiality, and privacy should be federally implemented; however, international hosts or suppliers might not follow domestic laws or regulations [22].
A model for remote health monitoring that uses a lightweight block encryption approach to provisioning security for health in an IoT environment based on the cloud was developed. Data mining was used to analyze biological data generated from IoT devices and a patient's health status is obtained through the analysis. The patients' sensitive data are protected using the encryption approach [23]. IoT has been employed in the control of COVID-19, but there are security issues and privacy risks during data storage and transmission [17].
Telehealth offers opportunities in reducing visits to hospitals, which protects patients and others from the COVID-19 infection. However, telehealth creates cyber security and privacy risks because a patient's home may not have enough protections in place. Telehealth also provides new opportunities in the sharing of health information with security and privacy implications [24]. Telemedicine security threat areas are shown in Table 8 [25,26,27,28].
For many organizations, increased investments in compliance (privacy), information security (telework/business continuity), supply chain, and emergency management will help develop infrastructures. Telemedicine allows a greater number of patients to be examined by health care providers while following disease containment protocols of self-isolation regarding COVID-19. Patients receive education, monitoring, and consultation [29]. In the COVID-19 pandemic, tele-healthcare service is needed for the reduction of patient movement and thus the reduction of infection. A tele-medical laboratory service was proposed based on IoT and the cloud. Specifically, physicians, nurses, and other medical staff from various hospitals worked together using their federated hospital clouds, created a virtual health team, and completed a healthcare workflow with security [30].
6.
Cyber security based on blockchain technology
Blockchain technology offers immutable and distributed ledgers with auditable records, which is ideal for tracking every asset in supply chain management. It depends on a distributed, privacy-preserving, secure, and immutable record-keeping framework [13]. Governments and hospitals can identify COVID-19 suspected cases, locations related to reported cases, and infected areas with high risks using blockchain. Blockchain has also been utilized to guarantee healthcare data security [10]. During the COVID-19 pandemic, it is significant to track patients and analyze their symptoms or reactions to the disease. Blockchain is a helpful platform in many countries affected by COVID-19, particularly in healthcare [31].
Insufficient data for risk assessment for catching or transmitting COVID-19 caused the quick spread of COVID-19 in general. Many patients were asymptomatic and the transmission mechanism for COVID-19 was not well understood until around May 2020. When cyber-attacks lead to information block, a permissioned blockchain offers two advantages: 1) anybody in the medical consortium can check when and how transactions and information occur; 2) blocking the information will change the hash. Therefore, patients can transmit personal records without any tampering risks [32]. For SARSCoV-2 (causes COVID-19) sequences, a closed hub was created that controls access and prohibits redistribution. Commercial aspirations can delay data sharing because patent incentives hinder open dissemination. Blockchain enables proof of the existence of specific data objects and their content [33]. COVID-19 data from the Centers for Disease Control and Prevention (CDC) in the United States include data and metadata. Blockchain helps manage medical data, identify patterns of symptoms, track supply chains of medical supplies and medicines, and increase diagnostic accuracy and effectiveness of treatment [3].
'Social Internet of Things' (SIoT) integrates people and smart devices interacting within a social structure of IoT, which is often through IoT platforms. Cloud IoT ecosystems are disruptive, but with many issues regarding security and privacy. SIoT has the same risks. Malware aims at people working at home and healthcare organizations. Blockchain can enhance the security and privacy of digital health systems [34]. A system based on blockchain was proposed to offer the secure management of home quarantine [17].
A novel blockchain-based framework was proposed to integrate intercountry for COVID-19 and track infected or tested patients globally. The framework is being developed as a new system with two components: access point and a single decentralized Ethereum-enabled virtual machine [35]. Blockchain is utilized to bridge the supply chain visibility gap because of its security features such as tamper-resistant, hash proof, and immutability. COVID-19 has disrupted many global supply chains. Rapid Supplier Connect, an IBM blockchain-based network, has been developed to help strengthen medical supply chain during the COVID-19 pandemic [36].
The coupling of AI with blockchain for self-testing and tracking systems has been proposed for the surveillance of COVID-19. Not only can such a system of self-testing achieve a higher testing rate, but it also allows for risk stratification of suspect cases [37]. Blockchain is also effective in data sharing between groups [38]. The applications of blockchain and AI in healthcare can be summarized as follows: health data analytics, remote patient monitoring, drugs and pharmaceutical supply chain management, management of electronic medical records (EMRs), etc. [39].
The management of electronic health records (EHR) with blockchain can reduce clinical bias [40]. The problem of interoperability among various EHR systems may be fixed through utilizing separate blockchain systems [38]. Table 9 shows the SWOT analysis of the utilization of a blockchain-based model in healthcare.
7.
Discussion
During the COVID-19 pandemic, there have been many cyber security issues. However, because there were so many infections and deaths, the pandemic became more news than cyber security vents. Overall, more people are working at home now and using their own security systems and modems. While this adds some layers of protection against cyber security events, it is not generally strong enough to protect the work environment from cyber security casualties. Therefore, the extent of cyber security in the pandemic era means that more stringent levels are layers of cyber security are necessary and should be developed overall while working at home. There needs to be more cyber security options, for example, during the pandemic we should have had a better option for work at home individuals who needed that added layer of security and protection. Most people who worked from home during the pandemic did not have specific training in IT or cyber security; therefore, better training procedures and more efficient programs that provide that extra layer of protection needs to be developed by engineering so that in the future should we have another situation like the COVID-19 pandemic we can provide security for ourselves when we work at home.
Associated with the human conduct aspect of cybersecurity is the undertaking of risky behaviors. Cybersecurity breaches are relevant to both technical implementation and the routine processing of confidential electronic information. Many cybersecurity breaches result from human errors. There should be further research on cybersecurity in relation to human behaviors based on human error-related -related incidents [41]. The data protection and cybersecurity authorities of the European Union (EU) have identified encryption as a significant tool that can contribute to the confidentiality, privacy, data integrity, and data availability of communications and personal data. It has been agreed to enhance the ability of the EU in protecting itself against cyber threats and providing a secure communication environment, especially through quantum encryption [42].
Smartphones and their ability to keep track of their locations (e.g., via GPS and Wi-Fi), along with their built-in Bluetooth interfaces (permitting communication and proximity detection with nearby smartphones), make themselves useful devices for contact tracing. Smartphone contact tracing apps help trace all recent contacts of newly identified individuals with COVID-19 infection, but tracing apps face challenges, including proximity estimation, attack vulnerability, the management of user data, and the privacy and security of the apps [43]. For future research, contact tracing or tracing based on quantum computing [44] will be exponentially powerful. It may include artificial learning algorithms and advanced Monte-Carlo or particle filter type tracking solutions. Quantum sensing [45] utilizes hypersensitivity embedded in quantum entanglements as an approach to improved timing, network synchronization, location accuracy, and accelerometer accuracy. It is very useful in contact tracing and can maximize the efficacy and overall performance. Quantum communications [46] is one of advanced quantum applications. One of its major impacts on tracing applications will probably be improved cybersecurity in communications and enhanced privacy protection [43].
8.
Conclusion
During the COVID-19 pandemic, there are many cyber risks due to people's action as well as failures in systems and technology. Telework and IoT-based applications are vulnerable to cyber-attacks. Telehealth provides an opportunity to protect patients, physicians, nurses, etc. from the COVID-19 infection. However, telehealth creates cyber security and privacy risks. Blockchain helps pandemic management and improves the privacy and security of digital health systems. The combination of blockchain and AI facilitates health data analytics, remote patient monitoring, management of EMR, drugs and pharmaceutical supply chain management, etc.
COVID-19 has issued in a new age of cyber awareness as companies now send their employees to work from home with limited security. Virtual private networks (VPNs) and servers will play a significant role in cyber security of the future. Not only are many companies across the world going to work from home models, thousands of work-from-home companies are now springing up and are facing similar problems. Cyber criminals are all too aware of the limited security that individuals can provide at home. New challenges for the work-at-home individuals include finding simple yet secure solutions for cyber security.
Acknowledgments
Authors thank Technology & Healthcare Solutions, Mississippi, USA for support.
Conflict of interest
Authors declare no conflict of interest.