COVID 19 Safety Applications and Risks
VerifiedAdded on 2023/01/06
|33
|2384
|78
Presentation
AI Summary
This presentation analyzes the security risks and privacy threats associated with COVID 19 safety applications and provides control measures to protect user privacy. It discusses possible threats to user data security, privacy risks, issues of data sovereignty, and suggests security and privacy controls. The presentation concludes with recommendations for users and governments to ensure data safety in COVID 19 safety applications.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Title
COVID 19 safety applications and risks
COVID 19 safety applications and risks
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of content
• Introduction
• Possible threats and risks to the security of user data
• Possible threats to the privacy of a user's data, location
• Issues of data sovereignty
• Possible security controls
• Possible privacy controls
• Possible controls to sure that data is under control of Australian
data sovereignty
• Conclusion
• References
• Introduction
• Possible threats and risks to the security of user data
• Possible threats to the privacy of a user's data, location
• Issues of data sovereignty
• Possible security controls
• Possible privacy controls
• Possible controls to sure that data is under control of Australian
data sovereignty
• Conclusion
• References
INTRODUCTION
The power point presentation on analysis of various kinds of control
measures in order to prevent users from different security risks. In
COVID 19 pandemic, the government of various nations is offering
mobile applications to track the cases and protecting public. Due to
these applications, there are a range of possibilities that users might face
different kinds of issues related to security and their privacy. In this
Power point presentation, detailed analysis of different control measures
is mentioned to protect privacy of users of mobile applications.
The power point presentation on analysis of various kinds of control
measures in order to prevent users from different security risks. In
COVID 19 pandemic, the government of various nations is offering
mobile applications to track the cases and protecting public. Due to
these applications, there are a range of possibilities that users might face
different kinds of issues related to security and their privacy. In this
Power point presentation, detailed analysis of different control measures
is mentioned to protect privacy of users of mobile applications.
Possible threats and risks to the
security of user data
Due to COVID safe applications, there can various kinds of risks and threats to security
of user. This is so because after installation of these applications, users have to add
different kinds of personal information which can be misused by different cyber
hackers. Below some security risks are mentioned which can occur due to COVID safe
application:
• Risk of data leakage- This is a key risk that is related of inadvertent data breaches due to
COVID mobile apps.
• Risk of network spoofing- Network hacking is when attackers in high-traffic crowded
locations like cafes, library resources and airlines set up fake wireless networks,
conations that stare such as Wi-Fi networks, but are currently hooks.
security of user data
Due to COVID safe applications, there can various kinds of risks and threats to security
of user. This is so because after installation of these applications, users have to add
different kinds of personal information which can be misused by different cyber
hackers. Below some security risks are mentioned which can occur due to COVID safe
application:
• Risk of data leakage- This is a key risk that is related of inadvertent data breaches due to
COVID mobile apps.
• Risk of network spoofing- Network hacking is when attackers in high-traffic crowded
locations like cafes, library resources and airlines set up fake wireless networks,
conations that stare such as Wi-Fi networks, but are currently hooks.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CONTINUE
• Risk of phishing attack- There are the front lines of many of these
malware attempts, as mobile devices are always driven-on.
• Spyware- In the context of COVID 19 safe application, this type of
risk can occur.
• Broken Cryptography- Broken cryptography can occur when
application developers of COVID safe app, utilize lackluster data
encryption, or failed to adequately enforce encryption software, as per
the research.
• Risk of phishing attack- There are the front lines of many of these
malware attempts, as mobile devices are always driven-on.
• Spyware- In the context of COVID 19 safe application, this type of
risk can occur.
• Broken Cryptography- Broken cryptography can occur when
application developers of COVID safe app, utilize lackluster data
encryption, or failed to adequately enforce encryption software, as per
the research.
CONTINUE
• Risk of Improper Session Handling- Many applications like
COVID 19 safe apps make use of "coupons" to promote
ease-of-access for smart phone purchases, enabling users to
execute many acts without being asked to identify and
authenticate their identification
• Risk of financial accounts- This is also a risk which can be
faced by users due to various kinds of cyber attackers
• Risk of Improper Session Handling- Many applications like
COVID 19 safe apps make use of "coupons" to promote
ease-of-access for smart phone purchases, enabling users to
execute many acts without being asked to identify and
authenticate their identification
• Risk of financial accounts- This is also a risk which can be
faced by users due to various kinds of cyber attackers
CONTINUE
Risk of broken authentication- The identification of
innovative to distort this data is not taken by a remarkable
number of apps and APIs. It's kept unencrypted, quickly
intercepted, in plain text (Kimani, Oduol and Langat,
2019). The material is often immediately decrypted when
recovered, which makes it much easier to copy / paste
outside of the device when combined with insertion flaws.
Risk of broken authentication- The identification of
innovative to distort this data is not taken by a remarkable
number of apps and APIs. It's kept unencrypted, quickly
intercepted, in plain text (Kimani, Oduol and Langat,
2019). The material is often immediately decrypted when
recovered, which makes it much easier to copy / paste
outside of the device when combined with insertion flaws.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Possible threats to the privacy of a
user's data, location
In the context of COVID 19 safe application, there can be certain risks of data of users,
locations and activities. There are various kinds of risks which may occur and some of
them are mentioned below in such manner:
• Data privacy and security risk
• Mobile Risks and Attacks
• Insufficient Transport Layer Protection
• Insecure Data Storage
• Lack of Binary Protections
• Poor Authorization and Authentication
user's data, location
In the context of COVID 19 safe application, there can be certain risks of data of users,
locations and activities. There are various kinds of risks which may occur and some of
them are mentioned below in such manner:
• Data privacy and security risk
• Mobile Risks and Attacks
• Insufficient Transport Layer Protection
• Insecure Data Storage
• Lack of Binary Protections
• Poor Authorization and Authentication
CONTINUE
• Client Side Injection
• Risk of denial service attack
• Risk of network exploits
• Risk of browser exploits
• Risk of Vulnerable Application
• Privacy threats
• Client Side Injection
• Risk of denial service attack
• Risk of network exploits
• Risk of browser exploits
• Risk of Vulnerable Application
• Privacy threats
Issues of data sovereignty that may apply to the
storage of COVID Safe data in U.S. based Cloud
storage
Data sovereignty, the notion that while it is processed
inside those borders, data is subject to the rules of a
government, has become more of a problem for
corporations as they migrate to the cloud. In Latin America,
if they violate the data sovereignty laws known as general
Data Protection Regulation (GDPR), "organizations will be
prosecuted up to 4 percent of its annual global turnover.
storage of COVID Safe data in U.S. based Cloud
storage
Data sovereignty, the notion that while it is processed
inside those borders, data is subject to the rules of a
government, has become more of a problem for
corporations as they migrate to the cloud. In Latin America,
if they violate the data sovereignty laws known as general
Data Protection Regulation (GDPR), "organizations will be
prosecuted up to 4 percent of its annual global turnover.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CONTINUE
When policymakers in CARICOM countries start discussing the
implementation of software and the storage of highly sensitive data
in public cloud networks, data control and confidentiality and the
possible legal ramifications of the lack of such control or
confidentiality need to be taken into account. If they suggest storing
software and data in cloud services beyond their territory, or with
international cloud vendors without a presence throughout the
Caribbean or Latin America, this risk is improved considerably.
When policymakers in CARICOM countries start discussing the
implementation of software and the storage of highly sensitive data
in public cloud networks, data control and confidentiality and the
possible legal ramifications of the lack of such control or
confidentiality need to be taken into account. If they suggest storing
software and data in cloud services beyond their territory, or with
international cloud vendors without a presence throughout the
Caribbean or Latin America, this risk is improved considerably.
CONTINUE
The obstacle of data ownership is rarely necessary for many
"advanced" nations, in which droplet public services are more
prevalent, as ones cloud provider most probably does have a
physiological public cloud existence in their nation (Limba,
Agafonov and Damkus, 2019). Nations, as in the scenario of
Member States of the European Union, may insist that sensitive
information resides solely on cloud infrastructure within their
authority.
The obstacle of data ownership is rarely necessary for many
"advanced" nations, in which droplet public services are more
prevalent, as ones cloud provider most probably does have a
physiological public cloud existence in their nation (Limba,
Agafonov and Damkus, 2019). Nations, as in the scenario of
Member States of the European Union, may insist that sensitive
information resides solely on cloud infrastructure within their
authority.
CONTINUE
Data ownership problems have become more common
with the introduction of SaaS, web and cloud providers.
In the cloud's hierarchical infrastructure, the end user
could not be sure of where application server remains. In
efficient places or destinations which make a most
advertising perception, cloud and accounting method may
host information.
Data ownership problems have become more common
with the introduction of SaaS, web and cloud providers.
In the cloud's hierarchical infrastructure, the end user
could not be sure of where application server remains. In
efficient places or destinations which make a most
advertising perception, cloud and accounting method may
host information.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
KEY ISSUES
• Where to store the data- For the new generation of cloud and SaaS
hosted systems, figuring out where information is secured is not
always apparent
• Issues of local laws- Data hosted by SaaS apps will arrive in unique
and mysterious locations for cloud services including the cloud
• Issue of data security- When attempting to deal with 3rd parties, this
can be hard to exactly know the privacy of the information and service
providers they regulate.
• Where to store the data- For the new generation of cloud and SaaS
hosted systems, figuring out where information is secured is not
always apparent
• Issues of local laws- Data hosted by SaaS apps will arrive in unique
and mysterious locations for cloud services including the cloud
• Issue of data security- When attempting to deal with 3rd parties, this
can be hard to exactly know the privacy of the information and service
providers they regulate.
CONTINUE
• Clearly, trying to avoid the cloud is not feasible. Employee
performance, cost, service providers and outstanding systems rule
contemporary data scenery
• Data hosted in cloud system, SaaS, and cloud providers may not have
been stored for users in places that are evident
• Person privacy protection is frequently quoted as a policy priority by
nations, however in practice; data residency provisions are seldom
planned nor advanced to protect users
• Clearly, trying to avoid the cloud is not feasible. Employee
performance, cost, service providers and outstanding systems rule
contemporary data scenery
• Data hosted in cloud system, SaaS, and cloud providers may not have
been stored for users in places that are evident
• Person privacy protection is frequently quoted as a policy priority by
nations, however in practice; data residency provisions are seldom
planned nor advanced to protect users
CONTINUE
• Some nations want to ensure that relocation data is kept locally for
national security purposes so it can make a significant difference in a
dispute to provide access to classified information locally
• Some nations tend to think that critical data is going to be better at home.
• If, in an extreme emergency (possibly in dispute with other countries and
international businesses), a country wants to take on a bank, energy firm
or vital infrastructure supplier, it might be necessary for all related data
to be held domestically and accessible without foreign assistance.
• Some nations want to ensure that relocation data is kept locally for
national security purposes so it can make a significant difference in a
dispute to provide access to classified information locally
• Some nations tend to think that critical data is going to be better at home.
• If, in an extreme emergency (possibly in dispute with other countries and
international businesses), a country wants to take on a bank, energy firm
or vital infrastructure supplier, it might be necessary for all related data
to be held domestically and accessible without foreign assistance.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CONTINUE
• The rules of data residency profoundly influence trade, preferring local
firms over international rivals
• In addition, foreign nations may inevitably return the favor and foreign
companies may stay prevented from having countries where data residency
laws exist to escape increased expenses and taxes
• Many countries favor, by default, open economies and social liberty. To
safeguard security interests, they enact broadly framed record keeping,
privacy and anti-treason laws that are adequate
• The rules of data residency profoundly influence trade, preferring local
firms over international rivals
• In addition, foreign nations may inevitably return the favor and foreign
companies may stay prevented from having countries where data residency
laws exist to escape increased expenses and taxes
• Many countries favor, by default, open economies and social liberty. To
safeguard security interests, they enact broadly framed record keeping,
privacy and anti-treason laws that are adequate
Possible security controls
Due to usage of COVID 19 safety applications, users can face different
kinds of security issues like lack of privacy of data, risk of financial data. In
this context, it is essential for apply different kinds of security controls and
some of them are mentioned below in such manner:
• Regular update of software
• 3rd party vendors should comply
• Conduct proper training of users
• Limited access of valuable data
Due to usage of COVID 19 safety applications, users can face different
kinds of security issues like lack of privacy of data, risk of financial data. In
this context, it is essential for apply different kinds of security controls and
some of them are mentioned below in such manner:
• Regular update of software
• 3rd party vendors should comply
• Conduct proper training of users
• Limited access of valuable data
CONTINUE (Regular update of
software)
Regular update of software- The government of
Australia should advocate holding constantly
updated both application software and operating
systems. Sometimes when available, install patches.
When programmers aren’t patched and modified
frequently, the network is insecure.
software)
Regular update of software- The government of
Australia should advocate holding constantly
updated both application software and operating
systems. Sometimes when available, install patches.
When programmers aren’t patched and modified
frequently, the network is insecure.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CONTINUE (Regular update of
software)
Microsoft also provides a Baseline Vulnerability
analysis software service that can be reviewed
regularly to make sure that all applications are
updated and updated. The way to reinforce the
network and avoid assaults before they occur is
reasonably cost-effective and simple.
software)
Microsoft also provides a Baseline Vulnerability
analysis software service that can be reviewed
regularly to make sure that all applications are
updated and updated. The way to reinforce the
network and avoid assaults before they occur is
reasonably cost-effective and simple.
CONTINUE (3rd party vendors
should comply)
With a broad variety of third-party suppliers each business
operates. Knowing who these people are is more essential
than ever. Firms will also open themselves for prosecution
by allowing foreigners to access their property. What if
the person who provides office got out of goal? Much to
remember. Furthermore, make sure that these vendors are
knowledgeable of the types of records.
should comply)
With a broad variety of third-party suppliers each business
operates. Knowing who these people are is more essential
than ever. Firms will also open themselves for prosecution
by allowing foreigners to access their property. What if
the person who provides office got out of goal? Much to
remember. Furthermore, make sure that these vendors are
knowledgeable of the types of records.
CONTINUE (Conduct proper
training of users)
The lack of awareness of training of users is the
lowest link in the computer protection chain, as per
recent polls. Despite preparation, staff opens
questionable e-mails that are capable of
downloading viruses every day.
training of users)
The lack of awareness of training of users is the
lowest link in the computer protection chain, as per
recent polls. Despite preparation, staff opens
questionable e-mails that are capable of
downloading viruses every day.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CONTINUE (Conduct proper
training of users)
One mistake businesses offer is to believe that one
cyber security training class is sufficient. If the
sensitive information is concerned about
safeguarding, plan daily courses every quarter or
even weekly.
training of users)
One mistake businesses offer is to believe that one
cyber security training class is sufficient. If the
sensitive information is concerned about
safeguarding, plan daily courses every quarter or
even weekly.
CONTINUE (Limited access of
valuable data)
Most of the users of COVID 19 applications have to access to all the data
files. Governments are actually discovering the difficult way to restrict
access to sensitive data. After all, hackers can access financial consumer
details for no cause. If users will limit who can access those papers, the
restrict the category of people who can unintentionally click on a dangerous
connection. When governments step into the future, they require all
documents to be segregated so that only people who have clear access to
them have access. This is one of the common sense solutions businesses
should possibly have worked throughout.
valuable data)
Most of the users of COVID 19 applications have to access to all the data
files. Governments are actually discovering the difficult way to restrict
access to sensitive data. After all, hackers can access financial consumer
details for no cause. If users will limit who can access those papers, the
restrict the category of people who can unintentionally click on a dangerous
connection. When governments step into the future, they require all
documents to be segregated so that only people who have clear access to
them have access. This is one of the common sense solutions businesses
should possibly have worked throughout.
Possible privacy controls
In order to control privacy risks, there are some ways
which can be applied in such manner by users of
COVID 19 application:
• Encryption of data
• Installation of security application
• Enabling location only when using application
In order to control privacy risks, there are some ways
which can be applied in such manner by users of
COVID 19 application:
• Encryption of data
• Installation of security application
• Enabling location only when using application
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CONTINUE (Encryption of data)
Data encryption is not only suitable for new tech; contemporary
tools allow everyone to authenticate email messages and other
information. "In fact, the securely encrypted (and decrypting) of e-
mails and documents is historically the only jurisdiction for e-
mails, although several improvements have arisen. For instance,
the GPG for Email is a connector-in to the free software Apple
Mail software that makes it simple to encrypt, decrypt, sign and
check e-mails utilizing.
Data encryption is not only suitable for new tech; contemporary
tools allow everyone to authenticate email messages and other
information. "In fact, the securely encrypted (and decrypting) of e-
mails and documents is historically the only jurisdiction for e-
mails, although several improvements have arisen. For instance,
the GPG for Email is a connector-in to the free software Apple
Mail software that makes it simple to encrypt, decrypt, sign and
check e-mails utilizing.
CONTINUE (Installation of
security application)
Users of COVID 19 application should install
various kinds of applications to protect from virus
and attackers. This can be done only because of
authorized applications of location privacy.
security application)
Users of COVID 19 application should install
various kinds of applications to protect from virus
and attackers. This can be done only because of
authorized applications of location privacy.
CONTINUE(Enabling location
only when using application)
In addition to this, users of COVID 19 application
should on the location tab only when there is need.
They should turn off the location tab when they are
not using the safety application.
only when using application)
In addition to this, users of COVID 19 application
should on the location tab only when there is need.
They should turn off the location tab when they are
not using the safety application.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Possible controls to sure that data is
under control of Australian data
sovereignty
Governments take unparalleled ways to ensure and contain new corona
virus (COVID-19) and use data power to push technology capabilities.
Data on the distribution of the infection, such as the locations and
number of new cases reported, recovery rates of mortality, and the
cause of new cases (international arrivals or population transmission),
are especially relevant for an efficient battlefield reaction. Below some
control to assure that COVID 19 data safety is done in such manner:
• Proper coordination with US government
under control of Australian data
sovereignty
Governments take unparalleled ways to ensure and contain new corona
virus (COVID-19) and use data power to push technology capabilities.
Data on the distribution of the infection, such as the locations and
number of new cases reported, recovery rates of mortality, and the
cause of new cases (international arrivals or population transmission),
are especially relevant for an efficient battlefield reaction. Below some
control to assure that COVID 19 data safety is done in such manner:
• Proper coordination with US government
CONTINUE
Proper coordination with US government- The
government of Australia should focus on making
proper agreement about data controlling that which
nation will be able to personal information of
customers.
Proper coordination with US government- The
government of Australia should focus on making
proper agreement about data controlling that which
nation will be able to personal information of
customers.
CONCLUSION
On the basis of above PPT this can be concluded that this is essential
for users to adopt the recommendations before using any application
of COVID 19. For this objective they have to implement different
kinds of security applications so that unwanted virus scanned. In
addition to this, there are various kinds of risks of security and
locations which can occur only because of issues in applications. For
this purpose governments should apply different kinds of security and
safety features in their COVID 19 safety application.
On the basis of above PPT this can be concluded that this is essential
for users to adopt the recommendations before using any application
of COVID 19. For this objective they have to implement different
kinds of security applications so that unwanted virus scanned. In
addition to this, there are various kinds of risks of security and
locations which can occur only because of issues in applications. For
this purpose governments should apply different kinds of security and
safety features in their COVID 19 safety application.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
REFERENCES
• Malladi, S.S. and Subramanian, H.C., 2019. Bug Bounty Programs for Cybersecurity:
Practices, Issues, and Recommendations. IEEE Software, 37(1), pp.31-39.
• Aldawood, H. and Skinner, G., 2019. Reviewing cyber security social engineering
training and awareness programs—Pitfalls and ongoing issues. Future Internet, 11(3),
p.73.
• Gearhart, G.D., Abbiatti, M.D. and Miller, M.T., 2019. Higher education’s cyber
security: Leadership issues, challenges and the future. International Journal on New
Trends in Education and Their Implications, 10(2), pp.11-18.
• Kour, R., Aljumaili, M., Karim, R. and Tretten, P., 2019. eMaintenance in railways:
Issues and challenges in cybersecurity. Proceedings of the Institution of Mechanical
Engineers, Part F: Journal of Rail and Rapid Transit, 233(10), pp.1012-1022.
• Malladi, S.S. and Subramanian, H.C., 2019. Bug Bounty Programs for Cybersecurity:
Practices, Issues, and Recommendations. IEEE Software, 37(1), pp.31-39.
• Aldawood, H. and Skinner, G., 2019. Reviewing cyber security social engineering
training and awareness programs—Pitfalls and ongoing issues. Future Internet, 11(3),
p.73.
• Gearhart, G.D., Abbiatti, M.D. and Miller, M.T., 2019. Higher education’s cyber
security: Leadership issues, challenges and the future. International Journal on New
Trends in Education and Their Implications, 10(2), pp.11-18.
• Kour, R., Aljumaili, M., Karim, R. and Tretten, P., 2019. eMaintenance in railways:
Issues and challenges in cybersecurity. Proceedings of the Institution of Mechanical
Engineers, Part F: Journal of Rail and Rapid Transit, 233(10), pp.1012-1022.
APPENDIX
A:
B:
C:
Microsoft Word
Document
Microsoft Word
Document
Microsoft Word
Document
A:
B:
C:
Microsoft Word
Document
Microsoft Word
Document
Microsoft Word
Document
1 out of 33
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.