RESEARCH PAPER
Mechanisms for providing cybersecurity during the COVID-19 pandemic: Perspectives for Ukraine
 
More details
Hide details
1
Department of Information Policy and Digital Technologies, National Academy of Public Administration under the President of Ukraine, 20, Antona Tsedika str., 03057, Kyiv, Ukraine
2
Department of Regional Development, University of Gdańsk, Jana Bażyńskiego 4, 80-309, Gdańsk, Poland
CORRESPONDING AUTHOR
Aleksander Kuczabski   

Department of Regional Development, University of Gdańsk, Jana Bażyńskiego 4, 80-309, Gdańsk, Poland
Submission date: 2020-05-22
Acceptance date: 2021-02-08
Online publication date: 2021-03-12
Publication date: 2021-03-31
 
Security and Defence Quarterly 2021;33(1)
 
KEYWORDS
TOPICS
ABSTRACT
The article analyses key cybersecurity trends against the background of the COVID-19 pandemic, trends that could lead to an increase in cyber threats. It also looks at cyber threats related to remote work in this period. Foreign experience in counteracting the spread of disinformation online, about COVID-19, has been studied. A global trend for strengthening law enforcement control over cyberspace content, network traffic, and digital devices of users has been identified. It has been established that some states are finding it difficult to counteract the spread of coronavirus-related threats and are sometimes resorting to violating the traditional balance of rights and freedoms of citizens in cyberspace, in fact, legalising cyber-surveillance of citizens. The paper investigates the limits of state intervention in the lives of citizens in the face of a real threat to national security. In matters of cybersecurity in the medical sphere, a shift of emphasis from the problem of protection of personal data of patients to the protection of key functions of the medical sphere is revealed. Mechanisms for implementing cybersecurity to counter the spread of fake news (misinformation) on the internet, about COVID-19, are substantiated. Practical tools and cybersecurity measures used during the COVID-19 pandemic are recommended for Ukrainian authorities. The importance of creating appropriate conditions for ensuring the balance between the implementation of restrictive policies in the field of cybersecurity and ensuring freedom of speech and openness of the internet is proven.
 
REFERENCES (28)
1.
BBC (2020) Coronavirus: Russian spies target Covid-19 vaccine research. Available at: https://www.bbc.com/news/techn... (Accessed: 9 September 2020).
 
2.
Check Point (2020) Threat actors join in the race towards a coronavirus vaccine. Available at: https://blog.checkpoint.com/20... (Accessed: 7 September 2020).
 
3.
Computing (2020) Spanish hospitals targeted with coronavirus-themed phishing lures in Netwalker ransomware attacks. Available at: https://www.computing.co.uk/ne... (Accessed: 4 September 2020).
 
4.
Cosgrove, L., Karter, J. M., Morrill, Z., and McGinley, M. (2020) ‘Psychology and surveillance capitalism: The risk of pushing mental health apps during the COVID-19 pandemic’, Journal of Humanistic Psychology, 60(5), pp. 611-625. doi: 10.1177/0022167820937498.
 
5.
Deutsche Welle (2020a) In U-turn, Germany backs Google and Apple on virus app. Available at: https://www.dw.com/en/in-u-tur... (Accessed: 6 September 2020).
 
6.
Deutsche Welle (2020b) Cyberattacks on COVID-19 vaccine research centers. Available at: https://www.dw.com/en/cyberatt... (Accessed: 9 September 2020).
 
7.
Fouquet, H. (2020) ‘Paris Hospitals Target of Failed Cyber-Attack, Authority Says’. Bloomberg, 23 March. Available at: https://www.bloomberg.com/news... (Accessed: 4 September 2020).
 
8.
Fuchs, C. (2020) ‘Everyday life and everyday communication in coronavirus capitalism. Triple C: Communication, Capitalism & Critique’, Open Access Journal for a Global Sustainable Information Society, 18(1), pp. 375-399. doi: 10.31269/triplec.v18i1.1167.
 
9.
Goggin, G. (2020) ‘COVID-19 apps in Singapore and Australia: Reimagining healthy nations with digital technology’, Media International Australia, 177(1), pp. 61-75. doi: 10.1177/1329878X20949770.
 
10.
Harwell, D. (2020) ‘Thousands of Zoom video calls left exposed on open Web’, The Washington Post, 3 April. Available at: https://www.washingtonpost.com... (Accessed: 2 September 2020).
 
11.
Klein, N. (2020). ‘Coronavirus capitalism—and how to beat it’, The Intercept, 17 March. https://theintercept.com/2020/... (Accessed: 2 September 2020).
 
12.
Klar, R., and Lanzerath, D. (2020) ‘The ethics of COVID-19 tracking apps–challenges and voluntariness’, Research Ethics, 16(3-4), pp. 1-9. doi: 10.1177/1747016120943622.
 
13.
Lallie, H. S., Shepherd, L. A., Nurse, J. R., Erola, A., Epiphaniou, G., Maple, C., and Bellekens, X. (2020) ‘Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic’, arXiv preprint arXiv:2006.11929. Available at: https://arxiv.org/abs/2006.119... (Accessed: 1 September 2020).
 
14.
Leprince-Ringuet, D. (2020) ‘Contact-tracing apps: why the NHS said no to Apple and Google’s plan’, ZDNet. Available at: https://www.zdnet.com/article/... (Accessed: 1 September 2020).
 
15.
Lwin, M. O., Vijaykumar, S., Fernando, O. N. N. et al. (2014) ‘A 21st century approach to tackling dengue: crowdsourced surveillance, predictive mapping and tailored communication’, Acta Tropica 130, pp. 100–107. doi: 10.1016/j.actatropica.2013.09.021.
 
16.
McLachlan, S., Lucas, P., Kudakwashe, D., et al. (2020) ‘Bluetooth smartphone apps: are they the most private and effective solution for COVID-19 contact tracing?’ arXiv. Epub ahead of print 15 May. Available at: https://arxiv.org/abs/2005.066... (Accessed: 1 September 2020).
 
17.
Nagy, S. (2019) ‘Digital Economy and Society. A Cross Country Comparison of Hungary and Ukraine’, Visnyk Natsionalnogo Tekhichnogo Universytetu Kharkivskyj Politekhnichnyj Instytut Ekonomichni Nauky, 46(1267). Available at: https://arxiv.org/ftp/arxiv/pa... (Accessed: 9 September 2020).
 
18.
Organisation for Economic Co-operation and Development (OECD) (2020) Combatting COVID-19 disinformation on online platforms. Available at: http://www.oecd.org/coronaviru... (Accessed: 7 September 2020).
 
19.
Sagey, М. (2020) Securing the ‘new normal’ – protecting the post Covid-19 world. Available at: https://blog.checkpoint.com/20... (Accessed: 9 September 2020).
 
20.
Stein, S. and Jacobs, J. (2020) ‘Cyber-Attack Hits U.S. Health Agency Amid Covid-19 Outbreak’, Bloomberg, 16 March. Available at: https://www.bloomberg.com/news... (Accessed: 4 September 2020).
 
21.
Tedros, A. G. (2020) Coronavirus pandemic still accelerating: WHO chief. Available at: https://economictimes.indiatim... (Accessed: 1 September 2020).
 
22.
The Law of Ukraine (2020) Pro vnesennja zmin do Zakonu Ukrajiny «Pro zakhyst naselennja vid infekcijnykh khvorob» shhodo zapobighannja poshyrennju koronavirusnoji khvoroby (COVID-19) [On Amendments to the Law of Ukraine «On Protection of the Population from Infectious Diseases» to Prevent the Spread of Coronavirus Disease (COVID-19)]. Available at: https://zakon.rada.gov.ua/laws... (Accessed: 6 September 2020).
 
23.
The United Kingdom’s National Cyber Security Centre (2020) Advisory: COVID-19 exploited by malicious cyber actors. Available at: https://www.ncsc.gov.uk/news/c... (Accessed: 1 September 2020).
 
24.
The United States Department of Justice (2020) Two Chinese Hackers Working with the Ministry of State Security Charged with Global Computer Intrusion Campaign Targeting Intellectual Property and Confidential Business Information, Including COVID-19 Research. Available at: https://www.justice.gov/opa/pr... (Accessed: 9 September 2020).
 
25.
The Verge (2020) Facebook will now show a warning before you share articles about COVID-19. Available at: https://www.theverge.com/2020/... (Accessed: 6 September 2020).
 
26.
Watts, G (2020) COVID-19 and the digital divide in the UK. Available at: https://www.thelancet.com/jour... (Accessed: 4 September 2020).
 
27.
World Health Organization (WHO) (2020) Novel Coronavirus (2019-nCoV) Situation Report – 13. Available at: https://www.who.int/docs/defau... (Accessed: 7 September 2020).
 
28.
ZDNet (2020) NSA security guide: How to choose safe conferencing and collaboration tools. Available at: https://www.zdnet.com/article/... (Accessed: 3 September 2020).
 
eISSN:2544-994X
ISSN:2300-8741