iPad Pro w/ Magic KB, Surface Go 2, or $350 Off with OnDemand Training - Register Now

Reading Room

Subscribe to SANS Newsletters

Join the SANS Community to receive the latest curated cyber security news, vulnerabilities and mitigations, training opportunities, and our webcast schedule.






Telecommuting

Featuring 5 Papers as of June 3, 2020

  • Remote Workers Poll Analyst Paper (requires membership in SANS.org community)
    by Heather Mahalik - June 3, 2020 

    Remote work has quickly become the "new normal" with the COVID-19 pandemic. Organizations have been forced to rethink how they will get work done with their employees mandated to stay home. How are organizations handling working from home? How well were companies prepared for remote work? How have technological needs changed with this shift? How are teams communicating? How are devices and communications being secured? When a time like this does not allow for the mission to halt, employees and employers have scrambled to keep the work going. Ensuring that teams are equipped, communicating, and are safe at home is key during this time. This webinar, led by Heather Mahalik SANS Senior Instructor, Author and Senior Director of Digital Intelligence at Cellebrite, covers how companies have adjusted to this new landscape as a workforce. How have things changed and how are we coping and keeping the ball rolling forward from home.


  • Mitigating Teleworking Risks by Gordon Jenkins - August 28, 2002 

    This paper examines the risk of teleworking in two layers - the risk at the remote PC and the risk at the corporate network.


  • Securing the Enterprise from the Dangers of Remote Access: Analysis of New Options Available for Per by Al Maslowski-Yerges - March 27, 2002 

    This paper is an analysis of new options available for personal firewall management in comparison with other established and emerging remote access solutions.


  • Road Warriors: Protecting Them from the Wolves - and the Organization from Them by James Hughes - December 18, 2001 

    This article explores the security issues specific to traveling users, an often overlooked group for which an organization's security team must take extra care because they operate in a dangerous, changing and unpredictable environment. We will cover the special steps which should be taken with them and their computers before they sortie from the secure corporate castle out into a hostile world, the special steps when they access the home base while away, and the special steps which should be taken at the end of the trip to minimize the risk their laptops may pose to the organization should they return under the influence of the evil hacker.


  • Paranoid PC Anywhere by Kris Kistler - May 29, 2000 

    This paper will deal with host mode configuration on an Windows NT 4 Server or workstation system.


Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact webmaster@sans.org.

All papers are copyrighted. No re-posting or distribution of papers is permitted.

SANS.edu Graduate Student Research - This paper was created by a SANS Technology Institute student as part of the graduate program curriculum.