SlideShare a Scribd company logo
1 of 4
Download to read offline
American Journal of Multidisciplinary Research & Development (AJMRD)
Volume 03, Issue 07 (July- 2021), PP 23-26
ISSN: 2360-821X
www.ajmrd.com
Multidisciplinary Journal www.ajmrd.com Page | 23
Research Paper Open Access
Information systems security in the age of pandemics: COVID-19
and beyond
Dismas Kitaria1
, David Kibara2
Stephen Mageto3
,Patrick Njuguna4
1,2,3,4
Computer Science Department, Meru University of Science and Technology, Kenya
*Corresponding Author: DismasKitaria
ABSTRACT: In the wake of the COVID-19, most organizations have had to invest in different information
systems to facilitate virtual working and meetings between organizations to ensure adherence to the COVID-19
prevention guidelines. This presented a new challenge of information systems security, which most organizations
may not have been ready to handle or manage. As a result, organizations have had to change how they view
information systems security. This new unfolding of events has presented an opportunity for cybercriminals to
exploit the crisis, which involves some laxity in security measures to accommodate the new working formula and
focus shifting to the pandemic. Due to the increased risks and challenges to information systems, organizations
have understood the need to invest in information systems security. To address human actions as a source of risk
to information systems, organizations have and should develop appropriate interventions such as cybersecurity
awareness campaigns, governance frameworks, and protocols. Even beyond the COVID-19 era, the policies,
protocols, and guidelines that organizations have developed to prevent attacks on information systems will
become operations guiding policies.
Keywords: cyberattacks,cybercriminals, COVID-19, information system security
I. Introduction
In the wake of the COVID-19, most organizations have had to invest in different information systems to
facilitate virtual working and meetings between organizations. While this move has helped organizations remain
operational in a manner that adheres to the COVID-19 prevention guidelines, it presents a new challenge of
information systems security, which most organizations may not have been ready to handle or manage. There have
been different technological innovations that have been developed, including information systems and technology
geared towards making a positive contribution to the global pandemic [1]. As the COVID-19 pandemic continues to
rage across the world, it affects all aspects of life as we previously understood but presents different perspectives
where information systems can positively contribute [2]. Organizations have had to change how they view
information systems security. Remote working during the COVID-19 pandemic has seen most people working from
their homes, using their own computers, routers, and virus protection. There is a need to consider cybersecurity
protection for people to invest in for protection against possible hacker attacks, which might expose an
organization's highly sensitive information [3]. The purpose of this research review paper is to provide a
comprehensive review of the literature on information systems security in the age of pandemic and even beyond the
pandemic.
II. Definition
It is important to understand the meaning of information systems and information systems. Several
definitions have been proposed to explain the term information system.In general terms, an information system
refers to "a system of people, data records and activities that process the data and information in an organization,
and it includes the organization’s manual and automated processes” [4].An information system may be considered
as “computer-based systems, which are combinations of hardware, software, and telecommunications networks that
people build and use to collect, create, and distribute useful information” [5]. One of the most relevant definitions of
an information system is one that considers it as a working system. An information system is "a work system whose
processes and activities are devoted to processing information, i.e., capturing, transmitting, storing, retrieving,
Information systems security in the age of pandemics: COVID-19 and beyond
Multidisciplinary Journal www.ajmrd.com Page | 24
manipulating, and displaying information” [6]. Information system as a working system involves human participants
and machines working on processes and activities with information technology assistance. Information system
security can be defined as the "application of any technical methods and managerial processes on the information
resources (hardware, software and data) in order to keep organizational assets and personal privacy protected” [7].
Another closely related but different term is information system management, which refers to "a set of activities
involved in configuring resources to meet an organization's information security needs” [8]. The purpose of
information system security is to secure information in the systems to ensure that the information within the
information systems is to retain its confidentiality, integrity, and availability [9]. This narrative review seeks to
examine how in the current age of the COVID-19 pandemic, information systems security is facing various
challenges and solutions implemented to protect the confidentially, integrity, and availability of the information in
information systems and assess whether such solutions would last beyond the pandemic era.
III. Risks and Challenges to Information Systems Security during the Pandemic Era
As a response to curb the spread of COVID-19, health guidelines on maintaining physical distance led to
national lockdowns, which made people and organizations dependent on technologies to carry on their business.
Therefore, it is apparent the pandemic has led to drastic changes to business models, contributing to the phenomena
of "working from home,” where employees are remotely connected to the organization’s corporate information
systems infrastructure [10]. This new unfolding of events has presented an opportunity for cybercriminals to exploit
the crisis, which involves some laxity in security measures to accommodate the new working formula and focus
shifting to the pandemic. This leads to a challenge where the global economy has to deal with both the COVID-19
pandemic and cybersecurity warfare, where there are increased risks for the occurrence of cybercrimes [10]. A
notable challenge of the "working from home" phenomenon is that most personal information technology devices
tend to be poorly configured relative to the work-based information systems, making the home devices more prone
to cyberattacks [11]. A report by Delloite observed that even with the increase in technology need, most
organizations filed to avail a cyber-safe remote-working environment, which has contributed to increased exposure
to cyber risk. Cybersecurity experts have estimated that the incidents of cybercrimes and attacks have almost
doubled in the wake of the COVID-19 pandemic [12]. The cybercriminals have exploited the opportunity presented
by the unprecedented havoc due to the COVID-19 pandemic to carry out attacks on information systems and steal or
distort sensitive information.
Different industries face different challenges and risks to information systems security. The health sector is
one of the industries whose information cybercriminal attacks have often compromised systems security. It has been
identified that COVID-19 has challenges in the health care information system [13]. It has been observed that cyber
attackers have sought to exploit the crisis of the COVID-19 pandemic and carried out attacks against health care
organization's information systems [14]. The World Health Organization has identified that during the COVID-19
pandemic period, the number of cyber-attacks has increased five-fold, with the increased cyber risks arising from the
actions of people and systems and technology failures [15]. It has been observed that “the main changes to health
services caused by the COVID-19 pandemic include decreased mobility, border closures, and the increasing reliance
on remote work, often carried out with little previous experience and planning” [13]. Another sector affected by the
COVID-19 pandemic is the e-Commerce sector. Most small and medium-sized commercial stores have shifted to
the digital platform to sustain their business following the pandemic. It has been reported that the financial sector
has been affected by hackers relatively more than other sectors during the COVID era but are also has a leading
edge in their response to the cyber risk [16]. The extent of information systems security exposure to the risk of
attacks is evident from the increased attacks on organizations. These attacks have affected even the large
organization such as "World Health Organization (WHO), World Bank, US Centers for Disease Control and
Prevention (CDC), the Gates Foundations, the US National Institutes of Health (NIH), the Wuhan Institute of
Virology” [17]. Organizations from different sectors have been compelled to shift to holding online meetings using
different platforms such as zoom during the pandemic. The online meeting platforms have presented a major weak
point for attacks, which hackers have exploited to pose a threat referred to as "Zoom bombing” [17]. Therefore, it is
apparent that different industries have been affected by the increased risks and challenges to information systems
security.
Information systems security in the age of pandemics: COVID-19 and beyond
Multidisciplinary Journal www.ajmrd.com Page | 25
IV. Solutions to Risks and Challenges to Information Systems Security during the Pandemic
Era
Due to the increased risks and challenges to information systems, organizations have understood the need
to invest in information systems security. Organizations have had to invest in their capacity to counteract
cyberattacks in an effort to protect their information system. Among the notable solutions to prevent attacks on
information systems is remote working security assurance. With remote working being an integral part of many
business models, including the healthcare services delivery model, employees have been prompted to utilize
enterprise remote desktop protocols and virtual private networks (VPN) to access corporate networks [13]. Other
security features have been added to support the "working from home" phenomena, such as the use of a firewall,
whitelist, and multifactor authentication. In addition, organizations offering video conferencing platforms have taken
initiatives to improve the security of their platforms to improve the security of information systems. For example,
Zoom has been forced to evaluate and improve its security measures, such as improvement in end-to-end encryption.
It is noted that Zoom Video Communications initiated end-to-end encryption with the aim of protecting conversation
during the meeting even from insiders in Zoom company itself [18].
Among the factors contributing to increased risks to information systems security is human factors. To
address human actions as a source of risk to information systems, organizations have and should develop appropriate
interventions such as cybersecurity awareness campaigns, governance frameworks, and protocols. Cybersecurity
awareness campaigns and educational programs would be an essential intervention to address threats to information
system security. Such training and awareness campaigns would equip the employees with skills to identify possible
threats and urge them to be vigilant and collaborate to combat cybercrime, especially in the COVID-19 era [10]. In
addition, organizations have been urged to implement a cybersecurity governance framework addressing issues such
as good cyber hygiene, verify sources, and get official updates [19]. Information system security protocols provide
guidelines to employees engaged in remote working, which is a norm during this COVID era.
Among the solution proposed to improve information systems, security is the use of artificial intelligence.
This intervention involves using artificial intelligence to identify and prevent threats before there is an establishment
in the information system [17]. An artificial intelligence solution would involve a collective of data for service and
analyzing it to establish patterns or common attacks. Such a solution is expected to be effective during the COVID-
19 pandemic era, characterized by more frequent attacks, whereby speeding up the machine learning process and
preventing information system cyberattacks would be more effective [17].
V. Implications Beyond COVID-19 Era
While the COVID-19 has opened a window of opportunity to organizations to shift into the digital
platform, it has also exposed a laxity in their information systems security. The pandemic has made it clear that my
organizations should invest in information system security and have plans to minimize possible cyberattacks. Even
beyond the COVID-19 era, the policies, protocols, and guidelines that organizations have developed in response to
preventing attacks on information systems will become operations guiding policies. Organizations will continue
taking proactive measures to improve information system security. Industries will develop sector-wide guidelines to
govern information system security. Organizations offer remote work platforms has been made to realize
vulnerabilities in their systems, which will become keener addressing such threats even beyond the COVID-era.
VI. Conclusion
The ongoing COVID-19 has exposed the vulnerabilities of information system security. The COVID-19
has changed the business model in most industries, with the most notable change being the increased adoption of the
"working from home" arrangement. Another notable observation has been that there is an increase in attacks on
information systems. A key advantage of this research paper review is that it has reviewed different sources and
thereby provided a broader perspective on information systems security during COVID and beyond. However, one
of the limitations of this study is that since it uses secondary data, the research had no control over the quality of the
evidence. Nevertheless, the study findings can be applied by the management of any organization seeking to
improve its information systems security.
Information systems security in the age of pandemics: COVID-19 and beyond
Multidisciplinary Journal www.ajmrd.com Page | 26
References
[1] He, W., Zhang, Z. J., & Li, W. (2021). Information technology solutions, challenges, and suggestions for
tackling the COVID-19 pandemic. International journal of information management, 57, 102287.
https://doi.org/10.1016/j.ijinfomgt.2020.102287
[2] Ă…gerfalk, P. J., Conboy, K., & Myers, M. D. (2020). Information systems in the age of pandemics:
COVID-19 and beyond.
[3] Wang, L., & Alexander, C. A. (2021). Cybersecurity during the COVID-19 pandemic. AIMS Electronics
and Electrical Engineering, 5(2), 146-157.
[4] Paul, R. J. (2010). What an information system is, and why is it important to know this. Journal of
computing and information technology, 18(2), 95-99.
[5] Jessup, L. M., & Valacich, J. S. (2008). Information systems today: managing in the digital world (Vol. 3).
Upper Saddle River, NJ: Pearson Prentice Hall.
[6] Alter, S. (2008). Defining information systems as work systems: implications for the IS field. European
Journal of Information Systems, 17(5), 448-469.
[7] Hong, K. S., Chi, Y. P., Chao, L. R., & Tang, J. H. (2006). An empirical study of information security
policy on information security elevation in Taiwan. Information Management & Computer Security.
[8] Singh, A. N., & Gupta, M. P. (2019). Information security management practices: Case studies from
India. Global Business Review, 20(1), 253-271.
[9] Lundgren, B., & Möller, N. (2019). Defining information security. Science and engineering ethics, 25(2),
419-441.
[10] Chigada, J., & Madzinga, R. (2021). Cyberattacks and threats during COVID-19: A systematic literature
review. South African Journal of Information Management, 23(1), 1-11.
[11] BA, O., OM, O., Sobowale, A. A., Nnamdi, O., Adebimpe, E., & OO, A. (2020). Cyber Security Threats in
the Era of COVID-19 Pandemic: A Case Study of Nigeria System. International Journal of Advanced
Research in Engineering and Technology, 11(9).
[12] Omodunbi B. A., Odiase P. O., Olaniyan O. M., Esan A. O (2016):; Cybercrime in Nigeria:
Analysis, Detection and Prevention. InFUOYE Journal of Engineering and Technology Vol 1 Issue 1, Pp
37-42
[13] He, Y., Aliyu, A., Evans, M., & Luo, C. (2021). Health Care Cybersecurity Challenges and Solutions
Under the Climate of COVID-19: Scoping Review. Journal of medical Internet research, 23(4), e21747.
[14] Stein S, Jacobs J. Cyber-attack hits U.S. health agency amid Covid-19 Outbreak. Bloomberg. 2020 Mar 16.
URL: https://www.bloomberg.com/news/articles/2020-03-16/u-s-health-agency-suffers-cyber-attack-
during-covid-19-response
[15] Sardi, A., Rizzi, A., Sorano, E., & Guerrieri, A. (2020). Cyber Risk in Health Facilities: A Systematic
Literature Review. Sustainability, 12(17), 7002.
[16] Aldasoro, I., Frost, J., Gambacorta, L., & Whyte, D. (2021). Covid-19 and cyber risk in the financial
sector (No. 37). Bank for International Settlements.
[17] Eian, I. C., Yong, L. K., Li, M. Y. X., Qi, Y. H., & Fatima, Z. (2020). Cyber Attacks in the Era of COVID-
19 and Possible Solution Domains.
[18] Isobe, T., & Ito, R. (2021). Security Analysis of End-to-End Encryption for Zoom Meetings. IACR Cryptol.
ePrint Arch., 2021, 486.
[19] Abukari, A. M., & Bankas, E. K. (2020). Some cybersecurity hygienic protocols for teleworkers in
COVID-19 pandemic period and beyond. International Journal of Scientific & Engineering
Research, 11(4), 1401-1407.

More Related Content

Similar to D372326.pdf

8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docxpriestmanmable
 
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYIJNSA Journal
 
Cyber crime
Cyber crimeCyber crime
Cyber crimewindows21
 
A Systematic Literature Review On The Cyber Security
A Systematic Literature Review On The Cyber SecurityA Systematic Literature Review On The Cyber Security
A Systematic Literature Review On The Cyber SecurityAmy Cernava
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelCSCJournals
 
Information security threats encountered by Malaysian public sector data cen...
Information security threats encountered by Malaysian public  sector data cen...Information security threats encountered by Malaysian public  sector data cen...
Information security threats encountered by Malaysian public sector data cen...nooriasukmaningtyas
 
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...CSCJournals
 
CYBERCRIME AWARENESS ON SOCIAL MEDIA: A COMPARISON STUDY
CYBERCRIME AWARENESS ON SOCIAL MEDIA: A COMPARISON STUDYCYBERCRIME AWARENESS ON SOCIAL MEDIA: A COMPARISON STUDY
CYBERCRIME AWARENESS ON SOCIAL MEDIA: A COMPARISON STUDYIJNSA Journal
 
Abhishek kurre.pptx
Abhishek kurre.pptxAbhishek kurre.pptx
Abhishek kurre.pptxDolchandra
 
Post covid 19 era new age of cyber security
Post covid 19 era new age of cyber securityPost covid 19 era new age of cyber security
Post covid 19 era new age of cyber securityIgnitec Inc
 
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...SG Analytics
 
DIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxDIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxHateMe9
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfjasonuchiha2
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Securityijtsrd
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityIRJET Journal
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technologyijtsrd
 
What is Importance of Cyber Security
What is Importance of Cyber Security What is Importance of Cyber Security
What is Importance of Cyber Security Wee Tang
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challengesijtsrd
 

Similar to D372326.pdf (20)

8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
 
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
A Systematic Literature Review On The Cyber Security
A Systematic Literature Review On The Cyber SecurityA Systematic Literature Review On The Cyber Security
A Systematic Literature Review On The Cyber Security
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment Model
 
Information security threats encountered by Malaysian public sector data cen...
Information security threats encountered by Malaysian public  sector data cen...Information security threats encountered by Malaysian public  sector data cen...
Information security threats encountered by Malaysian public sector data cen...
 
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
 
CYBERCRIME AWARENESS ON SOCIAL MEDIA: A COMPARISON STUDY
CYBERCRIME AWARENESS ON SOCIAL MEDIA: A COMPARISON STUDYCYBERCRIME AWARENESS ON SOCIAL MEDIA: A COMPARISON STUDY
CYBERCRIME AWARENESS ON SOCIAL MEDIA: A COMPARISON STUDY
 
Abhishek kurre.pptx
Abhishek kurre.pptxAbhishek kurre.pptx
Abhishek kurre.pptx
 
Post covid 19 era new age of cyber security
Post covid 19 era new age of cyber securityPost covid 19 era new age of cyber security
Post covid 19 era new age of cyber security
 
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
 
DIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxDIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docx
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdf
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
 
What is Importance of Cyber Security
What is Importance of Cyber Security What is Importance of Cyber Security
What is Importance of Cyber Security
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
 

More from ajmrdjournals

More from ajmrdjournals (20)

C372122.pdf
C372122.pdfC372122.pdf
C372122.pdf
 
E323741.pdf
E323741.pdfE323741.pdf
E323741.pdf
 
E372731.pdf
E372731.pdfE372731.pdf
E372731.pdf
 
G316268.pdf
G316268.pdfG316268.pdf
G316268.pdf
 
D312843.pdf
D312843.pdfD312843.pdf
D312843.pdf
 
D362842.pdf
D362842.pdfD362842.pdf
D362842.pdf
 
G374044.pdf
G374044.pdfG374044.pdf
G374044.pdf
 
D353451.pdf
D353451.pdfD353451.pdf
D353451.pdf
 
E314456.pdf
E314456.pdfE314456.pdf
E314456.pdf
 
F364959.pdf
F364959.pdfF364959.pdf
F364959.pdf
 
C352033.pdf
C352033.pdfC352033.pdf
C352033.pdf
 
A380114.pdf
A380114.pdfA380114.pdf
A380114.pdf
 
B340723.pdf
B340723.pdfB340723.pdf
B340723.pdf
 
H374553.pdf
H374553.pdfH374553.pdf
H374553.pdf
 
C322330.pdf
C322330.pdfC322330.pdf
C322330.pdf
 
B381520.pdf
B381520.pdfB381520.pdf
B381520.pdf
 
C342433.pdf
C342433.pdfC342433.pdf
C342433.pdf
 
C382135.pdf
C382135.pdfC382135.pdf
C382135.pdf
 
C311327.pdf
C311327.pdfC311327.pdf
C311327.pdf
 
A330112.pdf
A330112.pdfA330112.pdf
A330112.pdf
 

Recently uploaded

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 

Recently uploaded (20)

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

D372326.pdf

  • 1. American Journal of Multidisciplinary Research & Development (AJMRD) Volume 03, Issue 07 (July- 2021), PP 23-26 ISSN: 2360-821X www.ajmrd.com Multidisciplinary Journal www.ajmrd.com Page | 23 Research Paper Open Access Information systems security in the age of pandemics: COVID-19 and beyond Dismas Kitaria1 , David Kibara2 Stephen Mageto3 ,Patrick Njuguna4 1,2,3,4 Computer Science Department, Meru University of Science and Technology, Kenya *Corresponding Author: DismasKitaria ABSTRACT: In the wake of the COVID-19, most organizations have had to invest in different information systems to facilitate virtual working and meetings between organizations to ensure adherence to the COVID-19 prevention guidelines. This presented a new challenge of information systems security, which most organizations may not have been ready to handle or manage. As a result, organizations have had to change how they view information systems security. This new unfolding of events has presented an opportunity for cybercriminals to exploit the crisis, which involves some laxity in security measures to accommodate the new working formula and focus shifting to the pandemic. Due to the increased risks and challenges to information systems, organizations have understood the need to invest in information systems security. To address human actions as a source of risk to information systems, organizations have and should develop appropriate interventions such as cybersecurity awareness campaigns, governance frameworks, and protocols. Even beyond the COVID-19 era, the policies, protocols, and guidelines that organizations have developed to prevent attacks on information systems will become operations guiding policies. Keywords: cyberattacks,cybercriminals, COVID-19, information system security I. Introduction In the wake of the COVID-19, most organizations have had to invest in different information systems to facilitate virtual working and meetings between organizations. While this move has helped organizations remain operational in a manner that adheres to the COVID-19 prevention guidelines, it presents a new challenge of information systems security, which most organizations may not have been ready to handle or manage. There have been different technological innovations that have been developed, including information systems and technology geared towards making a positive contribution to the global pandemic [1]. As the COVID-19 pandemic continues to rage across the world, it affects all aspects of life as we previously understood but presents different perspectives where information systems can positively contribute [2]. Organizations have had to change how they view information systems security. Remote working during the COVID-19 pandemic has seen most people working from their homes, using their own computers, routers, and virus protection. There is a need to consider cybersecurity protection for people to invest in for protection against possible hacker attacks, which might expose an organization's highly sensitive information [3]. The purpose of this research review paper is to provide a comprehensive review of the literature on information systems security in the age of pandemic and even beyond the pandemic. II. Definition It is important to understand the meaning of information systems and information systems. Several definitions have been proposed to explain the term information system.In general terms, an information system refers to "a system of people, data records and activities that process the data and information in an organization, and it includes the organization’s manual and automated processes” [4].An information system may be considered as “computer-based systems, which are combinations of hardware, software, and telecommunications networks that people build and use to collect, create, and distribute useful information” [5]. One of the most relevant definitions of an information system is one that considers it as a working system. An information system is "a work system whose processes and activities are devoted to processing information, i.e., capturing, transmitting, storing, retrieving,
  • 2. Information systems security in the age of pandemics: COVID-19 and beyond Multidisciplinary Journal www.ajmrd.com Page | 24 manipulating, and displaying information” [6]. Information system as a working system involves human participants and machines working on processes and activities with information technology assistance. Information system security can be defined as the "application of any technical methods and managerial processes on the information resources (hardware, software and data) in order to keep organizational assets and personal privacy protected” [7]. Another closely related but different term is information system management, which refers to "a set of activities involved in configuring resources to meet an organization's information security needs” [8]. The purpose of information system security is to secure information in the systems to ensure that the information within the information systems is to retain its confidentiality, integrity, and availability [9]. This narrative review seeks to examine how in the current age of the COVID-19 pandemic, information systems security is facing various challenges and solutions implemented to protect the confidentially, integrity, and availability of the information in information systems and assess whether such solutions would last beyond the pandemic era. III. Risks and Challenges to Information Systems Security during the Pandemic Era As a response to curb the spread of COVID-19, health guidelines on maintaining physical distance led to national lockdowns, which made people and organizations dependent on technologies to carry on their business. Therefore, it is apparent the pandemic has led to drastic changes to business models, contributing to the phenomena of "working from home,” where employees are remotely connected to the organization’s corporate information systems infrastructure [10]. This new unfolding of events has presented an opportunity for cybercriminals to exploit the crisis, which involves some laxity in security measures to accommodate the new working formula and focus shifting to the pandemic. This leads to a challenge where the global economy has to deal with both the COVID-19 pandemic and cybersecurity warfare, where there are increased risks for the occurrence of cybercrimes [10]. A notable challenge of the "working from home" phenomenon is that most personal information technology devices tend to be poorly configured relative to the work-based information systems, making the home devices more prone to cyberattacks [11]. A report by Delloite observed that even with the increase in technology need, most organizations filed to avail a cyber-safe remote-working environment, which has contributed to increased exposure to cyber risk. Cybersecurity experts have estimated that the incidents of cybercrimes and attacks have almost doubled in the wake of the COVID-19 pandemic [12]. The cybercriminals have exploited the opportunity presented by the unprecedented havoc due to the COVID-19 pandemic to carry out attacks on information systems and steal or distort sensitive information. Different industries face different challenges and risks to information systems security. The health sector is one of the industries whose information cybercriminal attacks have often compromised systems security. It has been identified that COVID-19 has challenges in the health care information system [13]. It has been observed that cyber attackers have sought to exploit the crisis of the COVID-19 pandemic and carried out attacks against health care organization's information systems [14]. The World Health Organization has identified that during the COVID-19 pandemic period, the number of cyber-attacks has increased five-fold, with the increased cyber risks arising from the actions of people and systems and technology failures [15]. It has been observed that “the main changes to health services caused by the COVID-19 pandemic include decreased mobility, border closures, and the increasing reliance on remote work, often carried out with little previous experience and planning” [13]. Another sector affected by the COVID-19 pandemic is the e-Commerce sector. Most small and medium-sized commercial stores have shifted to the digital platform to sustain their business following the pandemic. It has been reported that the financial sector has been affected by hackers relatively more than other sectors during the COVID era but are also has a leading edge in their response to the cyber risk [16]. The extent of information systems security exposure to the risk of attacks is evident from the increased attacks on organizations. These attacks have affected even the large organization such as "World Health Organization (WHO), World Bank, US Centers for Disease Control and Prevention (CDC), the Gates Foundations, the US National Institutes of Health (NIH), the Wuhan Institute of Virology” [17]. Organizations from different sectors have been compelled to shift to holding online meetings using different platforms such as zoom during the pandemic. The online meeting platforms have presented a major weak point for attacks, which hackers have exploited to pose a threat referred to as "Zoom bombing” [17]. Therefore, it is apparent that different industries have been affected by the increased risks and challenges to information systems security.
  • 3. Information systems security in the age of pandemics: COVID-19 and beyond Multidisciplinary Journal www.ajmrd.com Page | 25 IV. Solutions to Risks and Challenges to Information Systems Security during the Pandemic Era Due to the increased risks and challenges to information systems, organizations have understood the need to invest in information systems security. Organizations have had to invest in their capacity to counteract cyberattacks in an effort to protect their information system. Among the notable solutions to prevent attacks on information systems is remote working security assurance. With remote working being an integral part of many business models, including the healthcare services delivery model, employees have been prompted to utilize enterprise remote desktop protocols and virtual private networks (VPN) to access corporate networks [13]. Other security features have been added to support the "working from home" phenomena, such as the use of a firewall, whitelist, and multifactor authentication. In addition, organizations offering video conferencing platforms have taken initiatives to improve the security of their platforms to improve the security of information systems. For example, Zoom has been forced to evaluate and improve its security measures, such as improvement in end-to-end encryption. It is noted that Zoom Video Communications initiated end-to-end encryption with the aim of protecting conversation during the meeting even from insiders in Zoom company itself [18]. Among the factors contributing to increased risks to information systems security is human factors. To address human actions as a source of risk to information systems, organizations have and should develop appropriate interventions such as cybersecurity awareness campaigns, governance frameworks, and protocols. Cybersecurity awareness campaigns and educational programs would be an essential intervention to address threats to information system security. Such training and awareness campaigns would equip the employees with skills to identify possible threats and urge them to be vigilant and collaborate to combat cybercrime, especially in the COVID-19 era [10]. In addition, organizations have been urged to implement a cybersecurity governance framework addressing issues such as good cyber hygiene, verify sources, and get official updates [19]. Information system security protocols provide guidelines to employees engaged in remote working, which is a norm during this COVID era. Among the solution proposed to improve information systems, security is the use of artificial intelligence. This intervention involves using artificial intelligence to identify and prevent threats before there is an establishment in the information system [17]. An artificial intelligence solution would involve a collective of data for service and analyzing it to establish patterns or common attacks. Such a solution is expected to be effective during the COVID- 19 pandemic era, characterized by more frequent attacks, whereby speeding up the machine learning process and preventing information system cyberattacks would be more effective [17]. V. Implications Beyond COVID-19 Era While the COVID-19 has opened a window of opportunity to organizations to shift into the digital platform, it has also exposed a laxity in their information systems security. The pandemic has made it clear that my organizations should invest in information system security and have plans to minimize possible cyberattacks. Even beyond the COVID-19 era, the policies, protocols, and guidelines that organizations have developed in response to preventing attacks on information systems will become operations guiding policies. Organizations will continue taking proactive measures to improve information system security. Industries will develop sector-wide guidelines to govern information system security. Organizations offer remote work platforms has been made to realize vulnerabilities in their systems, which will become keener addressing such threats even beyond the COVID-era. VI. Conclusion The ongoing COVID-19 has exposed the vulnerabilities of information system security. The COVID-19 has changed the business model in most industries, with the most notable change being the increased adoption of the "working from home" arrangement. Another notable observation has been that there is an increase in attacks on information systems. A key advantage of this research paper review is that it has reviewed different sources and thereby provided a broader perspective on information systems security during COVID and beyond. However, one of the limitations of this study is that since it uses secondary data, the research had no control over the quality of the evidence. Nevertheless, the study findings can be applied by the management of any organization seeking to improve its information systems security.
  • 4. Information systems security in the age of pandemics: COVID-19 and beyond Multidisciplinary Journal www.ajmrd.com Page | 26 References [1] He, W., Zhang, Z. J., & Li, W. (2021). Information technology solutions, challenges, and suggestions for tackling the COVID-19 pandemic. International journal of information management, 57, 102287. https://doi.org/10.1016/j.ijinfomgt.2020.102287 [2] Ă…gerfalk, P. J., Conboy, K., & Myers, M. D. (2020). Information systems in the age of pandemics: COVID-19 and beyond. [3] Wang, L., & Alexander, C. A. (2021). Cybersecurity during the COVID-19 pandemic. AIMS Electronics and Electrical Engineering, 5(2), 146-157. [4] Paul, R. J. (2010). What an information system is, and why is it important to know this. Journal of computing and information technology, 18(2), 95-99. [5] Jessup, L. M., & Valacich, J. S. (2008). Information systems today: managing in the digital world (Vol. 3). Upper Saddle River, NJ: Pearson Prentice Hall. [6] Alter, S. (2008). Defining information systems as work systems: implications for the IS field. European Journal of Information Systems, 17(5), 448-469. [7] Hong, K. S., Chi, Y. P., Chao, L. R., & Tang, J. H. (2006). An empirical study of information security policy on information security elevation in Taiwan. Information Management & Computer Security. [8] Singh, A. N., & Gupta, M. P. (2019). Information security management practices: Case studies from India. Global Business Review, 20(1), 253-271. [9] Lundgren, B., & Möller, N. (2019). Defining information security. Science and engineering ethics, 25(2), 419-441. [10] Chigada, J., & Madzinga, R. (2021). Cyberattacks and threats during COVID-19: A systematic literature review. South African Journal of Information Management, 23(1), 1-11. [11] BA, O., OM, O., Sobowale, A. A., Nnamdi, O., Adebimpe, E., & OO, A. (2020). Cyber Security Threats in the Era of COVID-19 Pandemic: A Case Study of Nigeria System. International Journal of Advanced Research in Engineering and Technology, 11(9). [12] Omodunbi B. A., Odiase P. O., Olaniyan O. M., Esan A. O (2016):; Cybercrime in Nigeria: Analysis, Detection and Prevention. InFUOYE Journal of Engineering and Technology Vol 1 Issue 1, Pp 37-42 [13] He, Y., Aliyu, A., Evans, M., & Luo, C. (2021). Health Care Cybersecurity Challenges and Solutions Under the Climate of COVID-19: Scoping Review. Journal of medical Internet research, 23(4), e21747. [14] Stein S, Jacobs J. Cyber-attack hits U.S. health agency amid Covid-19 Outbreak. Bloomberg. 2020 Mar 16. URL: https://www.bloomberg.com/news/articles/2020-03-16/u-s-health-agency-suffers-cyber-attack- during-covid-19-response [15] Sardi, A., Rizzi, A., Sorano, E., & Guerrieri, A. (2020). Cyber Risk in Health Facilities: A Systematic Literature Review. Sustainability, 12(17), 7002. [16] Aldasoro, I., Frost, J., Gambacorta, L., & Whyte, D. (2021). Covid-19 and cyber risk in the financial sector (No. 37). Bank for International Settlements. [17] Eian, I. C., Yong, L. K., Li, M. Y. X., Qi, Y. H., & Fatima, Z. (2020). Cyber Attacks in the Era of COVID- 19 and Possible Solution Domains. [18] Isobe, T., & Ito, R. (2021). Security Analysis of End-to-End Encryption for Zoom Meetings. IACR Cryptol. ePrint Arch., 2021, 486. [19] Abukari, A. M., & Bankas, E. K. (2020). Some cybersecurity hygienic protocols for teleworkers in COVID-19 pandemic period and beyond. International Journal of Scientific & Engineering Research, 11(4), 1401-1407.