CFP last date
20 May 2024
Reseach Article

Internet Threats and Mitigation Methods in Electronic Businesses Post Covid-19

by E.E. Odokuma, M.O. Musa
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 19
Year of Publication: 2022
Authors: E.E. Odokuma, M.O. Musa
10.5120/ijca2022922195

E.E. Odokuma, M.O. Musa . Internet Threats and Mitigation Methods in Electronic Businesses Post Covid-19. International Journal of Computer Applications. 184, 19 ( Jun 2022), 1-4. DOI=10.5120/ijca2022922195

@article{ 10.5120/ijca2022922195,
author = { E.E. Odokuma, M.O. Musa },
title = { Internet Threats and Mitigation Methods in Electronic Businesses Post Covid-19 },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2022 },
volume = { 184 },
number = { 19 },
month = { Jun },
year = { 2022 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number19/32423-2022922195/ },
doi = { 10.5120/ijca2022922195 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:21:49.960729+05:30
%A E.E. Odokuma
%A M.O. Musa
%T Internet Threats and Mitigation Methods in Electronic Businesses Post Covid-19
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 19
%P 1-4
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the advent of COVID-19 and the imposed lockdowns, many businesses were forced online. A number of these business owners had no prior knowledge of internet technology use and were therefore devoid of the knowledge of internet security threats. Many businesses still operate the e-business model even after the restrictions were lifted, due to the merits of the model. E-Business organizations were one of the main victims of internet fraud during the pandemic for various reasons. In this work, the most common threats and their mitigation measureshave been presented using the semi-systematic literature review method. Knowledge and adherence to these mitigation measures, especially education of staff and customers will save electronic business owners from falling victim to internet fraud.

References
  1. Tedros, A. G. (2020). Retrieved May 19, 2022, from Who.int website: https://www.who.int/director-general/speeches/detail/who-director-general-s-opening-remarks-at-the-media-briefing-on-covid-19---11-march-2020
  2. Pranggono, B., and Arabo, A. (2020). COVID‐19 pandemic cybersecurity issues. Internet Technol. Lett. Doi: 10.1002/itl2.247
  3. Walker, A. (2021). What Is Threat Modelling? Retrieved 19th May, 2022, from https://learn.g2.com/threat-modeling
  4. Nigeria 2020 Crime & Safety Report: Abuja. (2021). Retrieved 19th May, 2022, from https://www.osac.gov/Content/Report/04a87fa7-8575-4ce1-b5bb-188e5cb9d1d8
  5. Max, D. (2020). What is E-Business: Meaning, Types, Components, Model and Features. Temok Hosting Blog. Retrieved 17th May, 2022, from https://www.temok.com/blog/what-is-e-business/
  6. Nigeria – e-Commerce. (2021). Retrieved from https://www.trade.gov/knowledge-product/nigeria-ecommerce
  7. Furnell S, and Shah J. N. (2020) Home working and cyber security–an outbreak of unpreparedness? Computer Fraud and Security. (8):6-12.
  8. Samuel Adu-Gyimah, George Asante and Oliver Kufuor Boansi. Social Engineering Attacks: A Clearer Perspective. International Journal of Computer Applications184(8):53-62, April 2022
  9. Ahmad, T. (2020, April 05). Corona Virus (COVID-19) Pandemic and Work from Home: Challenges of Cybercrimes and Cybersecurity. Doi: 10.2139/ssrn.3568830
  10. Summer, A. and Yuan X. (2019) Mitigating Phishing Attacks: An Overview Publication: Proceedings of the 2019 ACM Southeast Conference April 2019. Pages 72–77 https://doi.org/10.1145/3299815.3314437
  11. De Bona M. and Paci F. 2020 Real world study on employees' susceptibility to phishing attacks. Proceedings of the 15th International Conference on Availability, Reliability and Security. August 2020 Article No.: 4 Pages 1–10 https://doi.org/10.1145/3407023.3409179
  12. Madsen, P., Koga, Y., & Takahashi, K. (2005). Federated identity management for protecting users from ID theft. Association for Computing Machinery. Proceedings of the 2005 workshop on Digital identity management, November 2005 Pages 77–83 https://doi.org/10.1145/1102486.1102500
  13. Zou, Y., Roundy, K., Tamersoy, A., Shintre, S., Roturier, J., and Schaub, F. (2020). Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices. Association for Computing Machinery. CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems April 2020 Pages 1–15. Doi: 10.1145/3313831.3376570.
  14. Malecki F. Overcoming the National Cyber Security Centre (NCSC) and Cybersecurity and Infrastructure Security Agency (CISA) (2020). Advisory: COVID-19 exploited by malicious cyber actors. https://www.ncsc.gov.uk/news/covid-19-exploited-by-cyber-actors-advisory
  15. Ali, M., Qaseem, Dr. M., and Rahman, M. (2020). A Survey on Deceptive Phishing Attacks in Social Networking Environments. Doi: 10.1007/978-981-15-1480-7_37
  16. National Cyber Security Centre (NCSC), and Cybersecurity and Infrastructure Security Agency (CISA), (2020). Advisory: APT groups target healthcare and essential services. https://www.ncsc.gov.uk/news/apt-groups-target-healthcare-essential-services-advisory.
  17. FraudWatch. (2019, February 25). Retrieved May 19, 2022, from Digital Brand Protection – FraudWatch website: https://fraudwatch.com/what-is-vishing-voice-phishing-scams-explained-how-to-prevent-them/
  18. How To Spot, Avoid, and Report Fake Check Scams. (2020, January 29). Retrieved 19th May, 2022, from Consumer Advice website: https://consumer.ftc.gov/articles/how-spot-avoid-report-fake-check-scams
  19. Pedley D, Borges T, Bollen A (2020, March 12). Cyber Security Skills in the UK Labour Market 2020. Retrieved May 19, 2022, from GOV.UK website: https://www.gov.uk/government/publications/cyber-security-skills-in-the-uk-labour-market-2020
Index Terms

Computer Science
Information Sciences

Keywords

Internet eCommerce Security Threats Fraud Mitigation