Skip to main content

Saving Lives in a Health Crisis Through the National Cyber Threat Prevention Mechanism Case COVID-19

  • Chapter
  • First Online:
Cyber Security

Part of the book series: Computational Methods in Applied Sciences ((COMPUTMETHODS,volume 56))

  • 2014 Accesses

Abstract

Today’s ongoing coronavirus pandemic has shown that our overall public security mechanism in Finland requires a more coherent system that combines different types of sensors with artificial intelligence-based systems. Various states may have a crucial task: creating a common early warning system with a cyber dimension. But first, the decision-making process for public safety administration must be enhanced at the national level. COVID-19 has demonstrated the difficulty of predicting the progression of a pandemic, and nearly every country on earth has faced remarkable challenges from the spread of disinformation. False information has been shared around many public health and safety-related issues—such as how the virus is spread, the usefulness of self-protection, and the side effects of vaccines. Effective early warning tools are needed to prevent the domino effect of misinformation and to ensure the vital functions of society. This research will demonstrate the need for a common emergency response model for Europe to ensure national public safety—along with a technical platform at least for the interface between the countries. Hybrid-influenced incidents require a hybrid response.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. ATP (2012) Open-source intelligence. Army Techniques Publication No. 2–22.9, Department of the Army, Washington, DC

    Google Scholar 

  2. Bröring A, Echterhoff J, Jirka S, Simonis I, Everding T, Stasch C, Liang S, Lemmens R (2011) New generation sensor web enablement. Sensors 11(3):2652–2699

    Google Scholar 

  3. Buranyi S (2020) The WHO v coronavirus: Why it can´t handle the pandemic. The Guardian, https://www.theguardian.com/news/2020/apr/10/world-health-organization-who-v-coronavirus-why-it-cant-handle-pandemic. Accessed 10 Dec 2020

  4. CSPC (2014) Securing the U.S. electrical grid. Center for the Study of the Presidency & Congress

    Google Scholar 

  5. Chong C, Kumar S (2003) Sensor networks: Evolution, opportunities, and challenges. Proc IEEE 91(8):1247–1256

    Article  Google Scholar 

  6. Colson E (2019) What AI-driven decision making looks like. Harvard Business Review, https://hbr.org/2019/07/what-ai-driven-decision-making-looks-like. Accessed 10 Dec 2020

  7. DHS (2013) NIPP 2013: Partnering for critical infrastructure security and resilience. U.S. Department of Homeland Security, https://www.cisa.gov/publication/nipp-2013-partnering-criticalinfrastructure-security-and-resilience

  8. DigiFinland (2020) Welcome to take care of your health and well-being in Omaolo. DigiFinland Oy, https://www.omaolo.fi/. Accessed 10 Dec 2020

  9. EC (2018) Artificial intelligence for Europe. Communication from the Commission to the European Parliament, the European Council, the Council, the European Economic and Social Committee and the Committee of the Regions, COM(2018) 237, European Commission

    Google Scholar 

  10. EC (2020) Coronavirus: commission delivers first batch of 1.5 million masks from 10 million purchased to support EU healthcare workers. Press release, European Commission

    Google Scholar 

  11. ElecTech (2016) Internet of Things (IOT) and its applications. Electrical Technology, http://www.electricaltechnology.org/2016/07/internet-of-things-iot-and-its-applications-inelectrical-power-industry.html. Accessed 8 Nov 2016

  12. Endsley MR (1988) Design and evaluation for situation awareness enhancement. Proceedings of the Human Factors and Ergonomics Society Annual Meeting 32(2):97–101

    Article  Google Scholar 

  13. Finlex (2011) Emergency powers act 1552/2011. Finnish Ministry of Justice

    Google Scholar 

  14. Franke U, Brynielsson J (2014) Cyber situational awareness: A systematic review of the literature. Comput Secur 46:18–31

    Article  Google Scholar 

  15. GPMB (2019) A world at risk: Annual report on global preparedness for health emergencies. Global Preparedness Monitoring Board

    Google Scholar 

  16. Gervasi O (2010) Encryption scheme for secured communication of web-based control systems. Journal of Security Engineering 7(6):609–618

    Google Scholar 

  17. Glassman M, Kang MJ (2012) Intelligence in the internet age: The emergence and evolution of Open Source Intelligence (OSINT). Comput Hum Behav 28(2):673–682

    Article  Google Scholar 

  18. Harjumaa M (2020) HUSin Järvinen purkaisi koronarajoituksia: ”Pitäisi yrittää saada sitä väestönosaa sairastamaan, jolle tauti ei todennäköisimmin ole vaarallinen”. Yle, https://yle.fi/uutiset/3-11318716. Accessed 10 Dec 2020

  19. Hautanen S (2020) IS: Yksi mies vastaa 260 sote-yrityksen tietoturvan valvonnasta. Verkkouutiset, https://www.verkkouutiset.fi/is-yksi-mies-vastaa-260-sote-yrityksen-tietoturvan-valvonnasta/#2fb860b4. Accessed 10 Dec 2020

  20. Hemmilä I, Salminen V (2020) Oikeuskansleri moittii ministeriöiden yhteistyötä kevään suojavarustehankinnoissa—STM:ssä epäselvyyttä myös ministerien työnjaosta. Suomenmaa, https://www.suomenmaa.fi/uutiset/oikeuskansleri-moittii-ministerioiden-yhteistyota-kevaansuojavarustehankinnoissa-stmssa-epaselvyytta-myos-ministerien-tyonjaosta-2/. Accessed 4 Dec 2020

  21. Henley J (2020) Sweden’s Covid-19 strategist under fire over herd immunity emails. The Guardian, https://www.theguardian.com/world/2020/aug/17/swedens-covid-19-strategist-under-fireover-herd-immunity-emails. Accessed 10 Dec 2020

  22. Hevner A, Chatterjee S (2010) Design research in information systems: theory and practice. Springer

    Google Scholar 

  23. HkiTimes (2020) Finland to close borders to non-essential travel at 12 am on Thursday. Helsinki Times, https://www.helsinkitimes.fi/finland/finland-news/domestic/17450-finland-to-closeborders-to-non-essential-travel-at-12am-on-thursday.html. Accessed 10 Dec 2020

  24. ISO (2012) ISO/IEC 27032:2012: Information technology, security techniques, guidelines for cybersecurity. International Organization for Standardization (ISO), https://www.iso.org/standard/44375.html

  25. ISO (2015) ISO 9001:2015: Quality management systems, requirements. International Organization for Standardization (ISO), https://www.iso.org/standard/62085.html

  26. ISO (2016) ISO 27799:2016 Health informatics, information security management in health using ISO/IEC 27002. International Organization for Standardization (ISO), https://www.iso.org/standard/62777.html

  27. ISO (2017) ISO/IEC 27001: Information security management systems. International Organization for Standardization (ISO), https://www.iso.org/isoiec-27001-information-security.html

  28. Jaskari K (2020) Ministeriö ei aio jatkossakaan suositella kangasmaskien käyttöä julkisilla paikoilla. Yle, https://yle.fi/uutiset/3-11305744. Accessed 10 Dec 2020

  29. Johnson C, Badger L, Waltermire D, Snyder J, Skorupka C (2016) Guide to cyber threat information sharing. NIST Special Publication 800–150, National Institute of Standards and Technology (NIST)

    Google Scholar 

  30. Kela (2020) Tekniset liittymismallit Kanta-palveluihin. Ohje, Kanta-palvelut, Kela, https://www.kanta.fi/documents/20143/106828/Tekniset+liittymismallit+Kanta-palveluihin.pdf/a057c34a-f822-71fd-b2df-097245d582ee

  31. Lakka P (2020) IS selvitti Pekosen ja Kiurun ministeriön kaaosta—ainakin nämä 5 syytä vaikuttivat taustalla: ”Suksi lipsunut koko matkan”. Ilta-Sanomat, https://www.is.fi/politiikka/art2000006482234.html. Accessed 10 Dec 2020

  32. Lehto M, Limnéll J, Innola E, Pöyhönen J, Rusi T, Salminen M (2017) Suomen kyberturvallisuuden nykytila, tavoitetila ja tarvittavat toimenpiteet tavoitetilan saavuttamiseksi. Valtioneuvoston selvitys- ja tutkimustoiminnan julkaisusarja 30/2017, Valtioneuvoston kanslia

    Google Scholar 

  33. Lyngaas S (2020) Why the extortion of Vastaamo matters far beyond Finland—and how cyber pros are responding. CyberScoop, https://www.cyberscoop.com/finland-vastaamo-hack-response/. Accessed 10 Dec 2020

  34. Mediuutiset (2020) Lääkäri: Aletaan tartuttaa koronaa hallitusti hoitohenkilökuntaan immuniteetin saamiseksi. Mediuutiset, https://www.mediuutiset.fi/debatti/laakari-aletaan-tartuttaa-koronaa-hallitusti-hoitohenkilokuntaan-immuniteetin-saamiseksi/dfbc96a4-c757-44e9-988d38cf093a7e8b. Accessed 5 May 2020

  35. Mäntymaa E, Mäntymaa J (2020) Sairaalat saivat varmuusvarastoista vuosia sitten vanhentuneita hengityssuojaimia—”Ihan kuranttia ei kaikki tavara ole ollut”, sanoo HUS-johtaja. Yle, https://yle.fi/uutiset/3-11286164. Accessed 10 Dec 2020

  36. NASA (2010) Risk-informed decision making handbook (NASA/SP-2010-576). Technical report, NASA. https://ntrs.nasa.gov/api/citations/20100021361/downloads/20100021361.pdf. Accessed 10 Dec 2021

  37. NIST (2010) Guidelines for smart grid cybersecurity. In: Privacy and the smart grid, vol 2. NISTIR 7628, National Institute of Standards and Technology (NIST)

    Google Scholar 

  38. NIST (2018) Framework for improving critical infrastructure cybersecurity. Version 1.1, National Institute of Standards and Technology (NIST)

    Google Scholar 

  39. Natri S (2020) THL:n pääjohtaja kehottaa suomalaisia pukemaan kangasmaskin julkisilla paikoilla—”Näin oireeton tartuttaja suojelee muita”. Yle, https://yle.fi/uutiset/3-11305102. Accessed 10 Dec 2020

  40. NewsNowFin (2020) Maria Ohisalo: Vastaamo cyber attack and blackmail demands “serious, outrageous and cowardly”. News Now Finland, https://newsnowfinland.fi/crime/mariaohisalo-vastaamo-cyber-attack-and-blackmail-demands-serious-outrageous-and-cowardly. Accessed 10 Dec 2020

  41. NewsNowFin (2020) Vastaamo hacking and blackmail: 25,000 police reports filed. News Now Finland, https://newsnowfinland.fi/crime/vastaamo-hacking-and-blackmail-25000-police-reports-filed. Accessed 10 Nov 2020

  42. Nunamaker J Jr, Chen M, Purdin T (1990) Systems development in information systems research. J Manag Inf Syst 7(3):89–106

    Article  Google Scholar 

  43. Nurmi P (2015) OSINT: Avointen lähteiden internet-tiedustelu. Kehitysprojektin raportti, Aaltoyliopisto

    Google Scholar 

  44. Ollila A (2020) Lääkintöneuvos Pälve tyrmää Kirsi Varhilan näkemykset maskien käytön esteistä. Uusi Suomi, https://puheenvuoro.uusisuomi.fi/aveollila1-2/laakintoneuvos-palve-tyrmaakirsi-varhilan-nakemykset-maskien-kayton-esteista/. Accessed 10 Dec 2020

  45. PM (2010) Yhteiskunnan turvallisuusstrategia: Valtioneuvoston periaatepäätös 16.12.2010. Puolustusministeriö, Helsinki

    Google Scholar 

  46. PPD (2013) Critical infrastructure security and resilience. Presidential Policy Directive PPD-21, U.S. White House Office

    Google Scholar 

  47. dos Passos DS (2016) Big Data, data science and their contributions to the development of the use of open source intelligence. Electronic Journal of Management & System 11(4):392–396

    Google Scholar 

  48. Ranta E (2020) Tällainen yritys on tietomurron kohteeksi joutunut Vastaamo. Ilta-Sanomat, https://www.is.fi/taloussanomat/art-2000006699437.html. Accessed 30 Nov 2020

  49. Robles RJ, Kim T (2010) Communication security for SCADA in smart grid environment. In: DNCOCO’10: proceedings of the 9th WSEAS international conference on data networks, communications, computers, pp 36–40. World Scientific and Engineering Academy and Society (WSEAS), Stevens Point, WI

    Google Scholar 

  50. SecComm (2017) Security Strategy for Society. Government resolution, Security Committee, Helsinki

    Google Scholar 

  51. Simola J (2020) Privacy issues and critical infrastructure protection. In: Benson V, Mcalaney J (eds) Emerging Cyber Threats and Cognitive Vulnerabilities. Academic Press, pp 197–226

    Chapter  Google Scholar 

  52. Simola J, Rajamäki J (2017) Hybrid emergency response model: improving cyber situational awareness. In: Scanlon M, Le-Khac N (eds) ECCWS 2017—proceedings of the 16th European conference on cyber warfare and security. Academic Conferences and Publishing International, pp 442–451

    Google Scholar 

  53. Simola J, Rajamäki J (2018) Improving cyber situational awareness in maritime surveillance. In: Josang A (ed) ECCWS 2018—proceedings of the 17th European conference on cyber warfare and security, pp 480–488. Academic Conferences and Publishing International

    Google Scholar 

  54. Solita (2020) The Finnish Covid-19 app Koronavilkku has been downloaded a million times already! Solita, https://www.solita.fi/en/the-finnish-covid-19app-koronavilkku-has-been-downloaded-million-times/. Accessed 10 Dec 2020

  55. Trottier D (2015) Open source intelligence, social media and law enforcement: Visions, constraints and critiques. Eur J Cult Stud 18(4–5):530–547

    Article  Google Scholar 

  56. Uosukainen R, de Fresnes T (2020) Poliitikot tulevat ja menevät, virkamiehet pysyvät—käynnissä on kamppailu siitä kenellä valta on. Yle, https://yle.fi/uutiset/3-11186910. Accessed 10 Dec 2020

  57. Valvira (2020) Organizational structure. Valvira, https://www.valvira.fi/web/en/valvira/organisational_structure. Accessed 20 Oct 2020

  58. Wooldridge M (2009) An introduction to multiagent systems, 2nd ed. Wiley

    Google Scholar 

  59. Yin RK (2017) Case study research and applications: design and methods, 6th ed. SAGE, Thousand Oaks, CA

    Google Scholar 

  60. Yle (2020) Daily: Gov’t not planning to extend Uusimaa border closure. Yle, https://yle.fi/uutiset/osasto/news/daily_govt_not_planning_to_extend_uusimaa_border_closure/11303010. Accessed 10 Dec 2020

  61. Yle (2020) Finland: Chinese face masks fail tests. Yle, https://yle.fi/uutiset/osasto/news/finland_chinese_face_masks_fail_tests/11298914. Accessed 10 Dec 2020

  62. Yle (2020) Finland’s first coronavirus case confirmed in Lapland. Yle, https://yle.fi/uutiset/osasto/news/finlands_first_coronavirus_case_confirmed_in_lapland/11182855. Accessed 10 Dec 2020

  63. Yle (2020) Friday's paper: problem with corona alert app, more countries on restricted list, drugs in the countryside. Yle, https://yle.fi/uutiset/osasto/news/fridays_papers_problem_with_corona_alert_app_more_countries_on_restricted_list_drugs_in_the_countryside/11586606. Accessed 10 Dec 2020

  64. Yle (2020) President Niinistö defends role in coronavirus crisis. Yle, https://yle.fi/uutiset/osasto/news/president_niinisto_defends_role_in_coronavirus_crisis/11303872. Accessed 12 Dec 2020

  65. Yle (2020) Two possible coronavirus cases in northern Finland. Yle, https://yle.fi/uutiset/osasto/news/two_possible_coronavirus_cases_in_northern_finland/11173752. Accessed 10 Dec 2020

  66. Zio E, Pedroni N (2012) Risk-informed decision-making processes: an overview. Foundation for an Industrial Safety Culture, Touloise, https://www.foncsi.org/fr/publications/cahiers-securite-industrielle/overview-of-risk-informed-decision-making-processes/CSI-RIDM.pdf. Accessed 15 Dec 2020

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jussi Simola .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Simola, J. (2022). Saving Lives in a Health Crisis Through the National Cyber Threat Prevention Mechanism Case COVID-19. In: Lehto, M., Neittaanmäki, P. (eds) Cyber Security. Computational Methods in Applied Sciences, vol 56. Springer, Cham. https://doi.org/10.1007/978-3-030-91293-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-91293-2_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-91292-5

  • Online ISBN: 978-3-030-91293-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics