Don't Miss Out on the Best Specials of the Year Available Now - Top Training, Top Instruction!

Reading Room

Subscribe to SANS Newsletters

Join the SANS Community to receive the latest curated cyber security news, vulnerabilities and mitigations, training opportunities, and our webcast schedule.


Featuring 6 Papers as of March 10, 2021

  • Remote Workforce Impact on Threat Defenses Graduate Student Research
    by Sean Goodwin - March 10, 2021 

    As organizations embrace remote work, the defensive security posture needs to be re-examined to effectively address threats while facing new or different constraints and tools. This paper investigates the prevention and detection control effectiveness against the known adversary Tactics, Techniques, and Procedures (TTPs) documented within the MITRE ATT&CK (R) taxonomy in a remote working (work from home, WFH) environment.

  • Remote Workers Poll Analyst Paper (requires membership in community)
    by Heather Mahalik - June 3, 2020 

    Remote work has quickly become the "new normal" with the COVID-19 pandemic. Organizations have been forced to rethink how they will get work done with their employees mandated to stay home. How are organizations handling working from home? How well were companies prepared for remote work? How have technological needs changed with this shift? How are teams communicating? How are devices and communications being secured? When a time like this does not allow for the mission to halt, employees and employers have scrambled to keep the work going. Ensuring that teams are equipped, communicating, and are safe at home is key during this time. This webinar, led by Heather Mahalik SANS Senior Instructor, Author and Senior Director of Digital Intelligence at Cellebrite, covers how companies have adjusted to this new landscape as a workforce. How have things changed and how are we coping and keeping the ball rolling forward from home.

  • Mitigating Teleworking Risks by Gordon Jenkins - August 28, 2002 

    This paper examines the risk of teleworking in two layers - the risk at the remote PC and the risk at the corporate network.

  • Securing the Enterprise from the Dangers of Remote Access: Analysis of New Options Available for Per by Al Maslowski-Yerges - March 27, 2002 

    This paper is an analysis of new options available for personal firewall management in comparison with other established and emerging remote access solutions.

  • Road Warriors: Protecting Them from the Wolves - and the Organization from Them by James Hughes - December 18, 2001 

    This article explores the security issues specific to traveling users, an often overlooked group for which an organization's security team must take extra care because they operate in a dangerous, changing and unpredictable environment. We will cover the special steps which should be taken with them and their computers before they sortie from the secure corporate castle out into a hostile world, the special steps when they access the home base while away, and the special steps which should be taken at the end of the trip to minimize the risk their laptops may pose to the organization should they return under the influence of the evil hacker.

  • Paranoid PC Anywhere by Kris Kistler - May 29, 2000 

    This paper will deal with host mode configuration on an Windows NT 4 Server or workstation system.

Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact

All papers are copyrighted. No re-posting or distribution of papers is permitted. Graduate Student Research - This paper was created by a SANS Technology Institute student as part of the graduate program curriculum.