Open Access Open Access  Restricted Access Subscription or Fee Access

How to Take Care During Covid 19 Situation Phishing Emails Scams

Makwana Utkarsh, Rathod Gopal, Dhaval Chudasama

Abstract


The worldwide spread of the COVID-19 pandemic and its remarkable effect on wellbeing and economy as well as practically on all parts of our lives, including how we work, meet, convey, team up, and so on Sadly, these progressions and the change to the virtual space in a brief time frame without legitimate arranging set out open doors for agitators in the internet. Over the most recent couple of months, we have seen new tracks and floods of digital assaults focusing on organizations, governments, wellbeing, and other basic administrations. Aggressors attempt to exploit individuals' dread of the infection, weaknesses related with information assortment sensors and IoT gadgets, and excitement to search for arrangements or securities. In this investigation, we will study the idea of cyber-attacks identified with the COVID-19 flare-up. Them, we will break down related information to phishing assaults utilizing Neural Networks. This examination is covering distinctive specialized and socio-conservative angles.
We will likewise assess states' countermeasures because of such assaults. We propose another IoT model. We characterize three layers, End User, Device or Sensors, and Cloud. We can consolidate the proposed model with the security and protection approaches to countermeasure the network safety dangers confronting each layer.


Full Text:

PDF

References


Zainab Alkhalil, Chaminda Hewage, et al. Phishing Attacks: A Recent Comprehensive Study and a New Anatomy. 2021. Available from https://www.frontiersin.org/ articles/10.3389/fcomp.2021.563060/full

Pashwa Dand and Dhaval Chudasama. Vulnerability. International Journal of Wireless Network Security. 2021; 7(1): 1–6p.

Joel Chigada and Rujeko Madzinga. Cyberattacks and threats during COVID-19: A systematic literature review. South African Journal of Information Management. 2021;23(1). Available from http://www.scielo.org.za/scielo.php?script=sci_arttext&pid=S1560-683X2021000100001

UCAL. Office of the Chief Information Security Officer. COVID-19 Cybersecurity: COVID-19 Scams: Phishing, Malware and Ransomware [Online]. Available from https://www.ociso.ucla.edu/tags/covid-19-cybersecurity

CIS Center for Internet Security. Top 4 COVID-19 Scams to Watch Out For. 2021;16(2). Available from https://www.cisecurity.org/newsletter/top-4-covid-19-scams-to-watch-out-for/

Chudasama D, Patel D, Shah A, et al. Research on Cybercrime and its Policing. American Journal of Computer Science and Engineering Survey. 20;8(3:14):1-3.

Dhaval Chudasama and Swapnil Gorasiya. Real world and cyber crime. Journal of Science. 2021; 1(31): 1–5.

Saqib Hakak, Wazir Zada Khan, et al. Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies. IEEE Access. 2020(8):124134-124144.

ENISA (May 06, 2020). Understanding and dealing with phishing during the COVID-19 pandemic [Online]. Available from https://www.enisa.europa.eu/news/enisa-news/understanding-and-dealing-with-phishing-during-the-covid-19-pandemic


Refbacks

  • There are currently no refbacks.