Cybersecurity Risks in Remote Work and Learning Environments and Methods of Combating Them
DOI:
https://doi.org/10.47611/jsrhs.v13i2.6808Keywords:
cybersecurity, remote work, risks, protection, threatsAbstract
In a post-pandemic world, more and more people are opting to work from home or use personal devices for work and learning. These trends correspond to a greater rate of cyber attacks, as remote work makes it harder for companies to protect their employees and their data. In this paper, the cybersecurity risks of remote work are outlined, followed by possible means of protection and preventing attack. Some of the former include unsecured networks and expanded attack surfaces, while the latter includes enhanced endpoint management and the use of the Zero Trust model. However, it was concluded that the most important way to minimize cyber attacks in an age of remote work is to educate the public on the best security practices and the ways in which they can spot threats.
Downloads
References or Bibliography
Assunção, P. (2019). A zero trust approach to network security. In Proceedings of the Digital Privacy and Security Conference (Vol. 2019). Porto Portugal.
Bilge, L., & Dumitras, T. (2013). Investigating zero-day attacks. Login, 38(4), 6-13.
Bischoff, P. (2024, January 10). Which countries have the worst (and best) cybersecurity? Comparitech. https://www.comparitech.com/blog/vpn-privacy/cybersecurity-by-country/
Bridges, L. (2008). The changing face of malware. Network Security, 2008(1), 17-20. https://doi.org/10.1016/s1353-4858(08)70010-2
The full process of phishing [Photograph]. (n.d.). Cloudflare. https://www.cloudflare.com/learning/access-management/phishing-attack/
Griffiths, C. (2024, February). The latest 2024 phishing statistics. AAG. https://aag-it.com/the-latest-phishing-statistics/
Indian businesses continue having cybersecurity concerns with remote working, one year into pandemic, finds thales. (2021, August 18). Thales. https://www.thalesgroup.com/en/india/press_release/indian-businesses-continue-having-cybersecurity-concerns-remote-working-one
Indira Reddy, B., & Srikanth, V. (2019). Review on wireless security protocols (WEP, wpa, wpa2 & WPA3). International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 28-35. https://doi.org/10.32628/cseit1953127
Jonasson, D., & Sigholm, J. (2005). What is Spyware?. TDDC03 Projects, Department of Computer and Information Science, Linkopings University, Sewden. Chicago
Kaur, P., Kumar, M., & Bhandari, A. (2017). A review of detection approaches for distributed denial of service attacks. Systems Science & Control Engineering, 5(1), 301-320. https://doi.org/10.1080/21642583.2017.1331768
Kekatos, M. (2023, November 30). New Jersey health system says outages are likely result of cyber attack. ABC News. https://abcnews.go.com/Health/new-jersey-health-system-outages-result-cyber-attack/story?id=105270813
Kramer, S., & Bradfield, J. C. (2009). A general definition of malware. Journal in Computer Virology, 6(2), 105-114. https://doi.org/10.1007/s11416-009-0137-1
Krithika, N. (2017). A study on wha (watering hole attack)–the most dangerous threat to the organisation. Int. J. Innov. Sci. Eng. Res.(IJISER), 4, 196-198.
The main components of endpoint management and security [Photograph]. (n.d.). ManageEngine. https://www.manageengine.com/products/desktop-central/endpoint-management-solutions.html
Mallik, A. (2019). Man-in-the-middle-attack: Understanding in simple words. Cyberspace: Jurnal Pendidikan Teknologi Informasi, 2(2), 109-134. Chicago
Martínez, J., & Durán, J. M. (2021). Software supply chain attacks, a threat to global cybersecurity: SolarWinds' case study. International Journal of Safety and Security Engineering, 11(5), 537-545. https://doi.org/10.18280/ijsse.110505
Olmstead, K., & Smith, A. (2017, March 22). What the public knows about cybersecurity. Pew Research Center. https://www.pewresearch.org/internet/2017/03/22/what-the-public-knows-about-cybersecurity/
Poojary, P. S. (2021). Techniques to avoid webcam hacking. International Research Journal of Modernization in Engineering Technology and Science, 3(1).
Ray, D., & Ligatti, J. (2012). Defining code-injection attacks. ACM SIGPLAN Notices, 47(1), 179-190. https://doi.org/10.1145/2103621.2103678
Recognizing and reporting phishing. (n.d.). Information Technologies | Secure UD Threat Alerts. https://sites.udel.edu/threat/2023/10/02/recognizing-and-reporting-phishing/
Require strong passwords. (n.d.). Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov/secure-our-world/require-strong-passwords
Richardson, R., & North, M. M. (2017). Ransomware: Evolution, mitigation and prevention. International Management Review, 13(1), 10.
What is a VPN? (n.d.). Microsoft Azure. https://azure.microsoft.com/en-us/resources/cloud-computing-dictionary/what-is-vpn
Zeng, S., Adam, C., Wu, F., Guo, S., Ruan, Y., Venugopal, C., & Puri, R. (2014). Managing risk in multi-node automation of endpoint management. IEEE Symposium on Network Operations and Management. https://doi.org/10.1109/noms.2014.6838295
Published
How to Cite
Issue
Section
Copyright (c) 2024 Sanjana Mandadi; Sarada Prasad Gochhayat, Virgel Torremocha, Jothsna Kethar
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright holder(s) granted JSR a perpetual, non-exclusive license to distriute & display this article.