Role of Cybersecurity in Remote Work Research Paper

Exclusively available on Available only on IvyPanda®
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Introduction

Remote work is a practice made possible by various technological advances in communication. Unfortunately, the same advances brought new risks for companies practicing remote working and respective challenges for their security. Consequently, this paper will first highlight the risks associated with remote working. Then, it will focus on possible cybersecurity measures to protect companies’ data, using the NIST Cybersecurity Framework to exemplify cybersecurity’s role in remote working.

Discussion

Allowing remote access to the company’s data and systems is essential in remote working. However, the remote working practice creates numerous compelling opportunities for cybercriminals. Firstly, many employees use less protected personal devices to remotely access the server or directly download company files in their private Wi-Fi networks (Škiljić, 2020). Secondly, remote work implies weaker control over a human factor due to so-called “home- distractions” (Škiljić, 2020). Finally, implementing cloud technologies to support the remote workforce creates additional security risks as it divides the security control between companies and cloud providers.

Cyber threats have become even more concerning in the face of the recent pandemic. Due to the need to maintain social isolation, many companies had to urgently implement remote working practices. In this context, the NIST Cybersecurity Framework (CF) can serve as a reliable guide for a cybersecurity system establishment (Gordon et al., 2020). According to Weil & Murugesan (2020), this framework represents “a set of standards, methodologies, procedures, and processes that align policy, business, and technological approaches to address cyber risks” (p. 5). It consists of five primary domains: Identify, Protect, Detect, Respond, and Recover (NIST, 2018). They provide a high-level strategic overview of an organization’s cybersecurity risk management lifecycle.

The first domain develops the foundation for CF’s effective and meaningful use. In particular, it focuses on the organizational understanding of cybersecurity risks, data, assets, and capabilities management (NIST, 2018). Regarding remote working, this domain would stress the difference between home and office levels of protection for employees. The second domain resembles the ability to deal with the impact of a potential cyberattack (NIST, 2018). It would include establishing antiviral and firewall protection for home devices. The third domain focuses on preemptively discovering potential cybersecurity events (NIST, 2018). In other words, it would constantly scan the home device or network for weak links or unexpected program behavior. The fourth domain is responsible for the system’s ability to contain a cybersecurity incident. For instance, it would mean undertaking swift and decisive quarantine actions regarding the detected malware (NIST, 2018). Finally, the last domain aims at a system’s timely recovery to normal operations, reducing the intrusion impact (NIST, 2018). It would follow approved resilience and capability restoration plans for home devices impaired during a cybersecurity incident.

Conclusion

Cybersecurity’s role in the practice of remote working proves to be essential to data protection. Remote work creates many opportunities for cybercriminals as it weakens the overall data protection level. In response, companies enhance their security measures according to cybersecurity frameworks, such as NIST CF. Consisting of five domains – Identify, Protect, Detect, Respond, and Recover – CF establishes and maintains control over the companies’ cybersecurity lifecycle, decreasing the chance of potential security breaches.

References

NIST. (2018). . Web.

Gordon, L. A., Loeb, M. P., & Zhou, L. (2020). . Journal of Cybersecurity, 6(1), tyaa005. Web.

Škiljić, A. (2020). . International Cybersecurity Law Review, 1(1), 51-61. Web.

Weil, T., & Murugesan, S. (2020). . IT professional, 22(3), 4-10. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2024, March 15). Role of Cybersecurity in Remote Work. https://ivypanda.com/essays/role-of-cybersecurity-in-remote-work/

Work Cited

"Role of Cybersecurity in Remote Work." IvyPanda, 15 Mar. 2024, ivypanda.com/essays/role-of-cybersecurity-in-remote-work/.

References

IvyPanda. (2024) 'Role of Cybersecurity in Remote Work'. 15 March.

References

IvyPanda. 2024. "Role of Cybersecurity in Remote Work." March 15, 2024. https://ivypanda.com/essays/role-of-cybersecurity-in-remote-work/.

1. IvyPanda. "Role of Cybersecurity in Remote Work." March 15, 2024. https://ivypanda.com/essays/role-of-cybersecurity-in-remote-work/.


Bibliography


IvyPanda. "Role of Cybersecurity in Remote Work." March 15, 2024. https://ivypanda.com/essays/role-of-cybersecurity-in-remote-work/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
1 / 1