Cybersecurity Risks in Remote Work and Learning Environments and Methods of Combating Them

Authors

  • Sanjana Mandadi Gifted Gabber
  • Sarada Prasad Gochhayat Assistant Teaching Professor at Villanova University
  • Virgel Torremocha University of Southeastern Philippines
  • Jothsna Kethar Gifted Gabber

DOI:

https://doi.org/10.47611/jsrhs.v13i2.6808

Keywords:

cybersecurity, remote work, risks, protection, threats

Abstract

In a post-pandemic world, more and more people are opting to work from home or use personal devices for work and learning. These trends correspond to a greater rate of cyber attacks, as remote work makes it harder for companies to protect their employees and their data. In this paper, the cybersecurity risks of remote work are outlined, followed by possible means of protection and preventing attack. Some of the former include unsecured networks and expanded attack surfaces, while the latter includes enhanced endpoint management and the use of the Zero Trust model. However, it was concluded that the most important way to minimize cyber attacks in an age of remote work is to educate the public on the best security practices and the ways in which they can spot threats.

Downloads

Download data is not yet available.

References or Bibliography

Assunção, P. (2019). A zero trust approach to network security. In Proceedings of the Digital Privacy and Security Conference (Vol. 2019). Porto Portugal.

Bilge, L., & Dumitras, T. (2013). Investigating zero-day attacks. Login, 38(4), 6-13.

Bischoff, P. (2024, January 10). Which countries have the worst (and best) cybersecurity? Comparitech. https://www.comparitech.com/blog/vpn-privacy/cybersecurity-by-country/

Bridges, L. (2008). The changing face of malware. Network Security, 2008(1), 17-20. https://doi.org/10.1016/s1353-4858(08)70010-2

The full process of phishing [Photograph]. (n.d.). Cloudflare. https://www.cloudflare.com/learning/access-management/phishing-attack/

Griffiths, C. (2024, February). The latest 2024 phishing statistics. AAG. https://aag-it.com/the-latest-phishing-statistics/

Indian businesses continue having cybersecurity concerns with remote working, one year into pandemic, finds thales. (2021, August 18). Thales. https://www.thalesgroup.com/en/india/press_release/indian-businesses-continue-having-cybersecurity-concerns-remote-working-one

Indira Reddy, B., & Srikanth, V. (2019). Review on wireless security protocols (WEP, wpa, wpa2 & WPA3). International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 28-35. https://doi.org/10.32628/cseit1953127

Jonasson, D., & Sigholm, J. (2005). What is Spyware?. TDDC03 Projects, Department of Computer and Information Science, Linkopings University, Sewden. Chicago

Kaur, P., Kumar, M., & Bhandari, A. (2017). A review of detection approaches for distributed denial of service attacks. Systems Science & Control Engineering, 5(1), 301-320. https://doi.org/10.1080/21642583.2017.1331768

Kekatos, M. (2023, November 30). New Jersey health system says outages are likely result of cyber attack. ABC News. https://abcnews.go.com/Health/new-jersey-health-system-outages-result-cyber-attack/story?id=105270813

Kramer, S., & Bradfield, J. C. (2009). A general definition of malware. Journal in Computer Virology, 6(2), 105-114. https://doi.org/10.1007/s11416-009-0137-1

Krithika, N. (2017). A study on wha (watering hole attack)–the most dangerous threat to the organisation. Int. J. Innov. Sci. Eng. Res.(IJISER), 4, 196-198.

The main components of endpoint management and security [Photograph]. (n.d.). ManageEngine. https://www.manageengine.com/products/desktop-central/endpoint-management-solutions.html

Mallik, A. (2019). Man-in-the-middle-attack: Understanding in simple words. Cyberspace: Jurnal Pendidikan Teknologi Informasi, 2(2), 109-134. Chicago

Martínez, J., & Durán, J. M. (2021). Software supply chain attacks, a threat to global cybersecurity: SolarWinds' case study. International Journal of Safety and Security Engineering, 11(5), 537-545. https://doi.org/10.18280/ijsse.110505

Olmstead, K., & Smith, A. (2017, March 22). What the public knows about cybersecurity. Pew Research Center. https://www.pewresearch.org/internet/2017/03/22/what-the-public-knows-about-cybersecurity/

Poojary, P. S. (2021). Techniques to avoid webcam hacking. International Research Journal of Modernization in Engineering Technology and Science, 3(1).

Ray, D., & Ligatti, J. (2012). Defining code-injection attacks. ACM SIGPLAN Notices, 47(1), 179-190. https://doi.org/10.1145/2103621.2103678

Recognizing and reporting phishing. (n.d.). Information Technologies | Secure UD Threat Alerts. https://sites.udel.edu/threat/2023/10/02/recognizing-and-reporting-phishing/

Require strong passwords. (n.d.). Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov/secure-our-world/require-strong-passwords

Richardson, R., & North, M. M. (2017). Ransomware: Evolution, mitigation and prevention. International Management Review, 13(1), 10.

What is a VPN? (n.d.). Microsoft Azure. https://azure.microsoft.com/en-us/resources/cloud-computing-dictionary/what-is-vpn

Zeng, S., Adam, C., Wu, F., Guo, S., Ruan, Y., Venugopal, C., & Puri, R. (2014). Managing risk in multi-node automation of endpoint management. IEEE Symposium on Network Operations and Management. https://doi.org/10.1109/noms.2014.6838295

Published

05-31-2024

How to Cite

Mandadi, S., Gochhayat, S. P., Torremocha, V. ., & Kethar, J. (2024). Cybersecurity Risks in Remote Work and Learning Environments and Methods of Combating Them. Journal of Student Research, 13(2). https://doi.org/10.47611/jsrhs.v13i2.6808

Issue

Section

HS Research Projects