Телефон: 8-800-350-22-65
WhatsApp: 8-800-350-22-65
Telegram: sibac
Прием заявок круглосуточно
График работы офиса: с 9.00 до 18.00 Нск (5.00 - 14.00 Мск)

Статья опубликована в рамках: Научного журнала «Студенческий» № 4(174)

Рубрика журнала: Информационные технологии

Скачать книгу(-и): скачать журнал часть 1, скачать журнал часть 2, скачать журнал часть 3, скачать журнал часть 4, скачать журнал часть 5, скачать журнал часть 6, скачать журнал часть 7, скачать журнал часть 8

Библиографическое описание:
Radich V. SAFETY OF WORKERS ON THE INTERNET IN CONNECTION WITH THE PANDEMIC // Студенческий: электрон. научн. журн. 2022. № 4(174). URL: https://sibac.info/journal/student/174/240690 (дата обращения: 19.04.2024).

SAFETY OF WORKERS ON THE INTERNET IN CONNECTION WITH THE PANDEMIC

Radich Valeriya

master, Department of Information technologies for transport, Siberian State University of Railways,

Russia, Novosibirsk

Volegzhanina Irina

научный руководитель,

scientific supervisor, professor, doctor of pedagogical sciences, Department of Foreign Languages, Siberian State University of Railways,

Russia, Novosibirsk

ABSTRACT

The article discusses the main problems of remote cloud operation in the context of the pandemic. The author discovered, analyzed and classified cybersecurity problems associated with remote work programs.

 

Keywords: information; cloud technology; information security; remote mode of operation; online.

 

The article is an analysis of theoretical and practical aspects of employee remote work security using available cloud technologies in the context of the pandemic. The relevance of the topic is determined by the fact that at present, due to the spread of the pandemic in the world, more and more people work remotely. To do this, they use services for video conferencing and instant messengers. The use of online platforms stimulates the development of cloud technologies for storing and analyzing data, increases the demand for the rental of such services from technology companies. The pandemic outbreak has forced many people around the world to work and study at home, and businesses and institutions to move their activities to an online environment. Cybercriminals actively use these difficult circumstances to find new illegal ways to earn money. Successful cyber-attacks lead to data loss, reputation damage. The purpose of the study is to address the problems that arise when working remotely. Challenges include cybersecurity risk factors and the impact of cyber-attacks using affordable cloud technologies.

In recent years, we often hear and use the word remote work. Remote work is a form of employment in which the employer and the hired employee (or customer) are at a significant distance from each other, transferring and receiving technical assignment, labor results and payment using modern means of communication. The current wave of remote work was caused by the demands of the pandemic. As a result, each important component of remote work is a unique security issue that needs to be leveled or carefully controlled to minimize the likelihood of cyber-attacks by hackers [1]. Cloud technology is a tool that companies can use to improve the interconnectedness of their workforce. The benefits of using cloud technologies include greater flexibility in data storage, increased collaboration from anywhere in the world, and increased security. Most companies already use cloud services in their activities. Companies should understand that they have options for choosing cloud services. The three main types are software as a service (SaaS), infrastructure as a service (IaaS), and platform as a service (PaaS). These services vary by cloud service provider. Today, it is possible for every business to consider using the cloud service to increase the efficiency and effectiveness of its activities. Executives need to understand their specific needs before buying cloud services. The demand for cloud services has increased sharply. Microsoft reported a 775% surge in demand for cloud services due to pandemic [2]. The companies which are suppliers of cloud services it is cloud service providers (CSP). Clients borrow infrastructure for storage when they use CSP. This helps save costs and enables faster scalability.

Consider the major benefits of cloud technology in the context of the pandemic.

1. More specific and simple collaboration tools. There has been a surge in collaboration or productivity tools when remote work has become the norm. Video conferencing, screen sharing, and chat will become more integrated. This will simplify communication between teams. Other advances in artificial intelligence, such as noise cancellation and virtual background, will continue to improve and be used more widely.

2. Use of artificial intelligence in the workplace. Artificial intelligence covers a wide range of services, including chat bots, location services and digital assistants. It is aimed at automating recurring tasks, which saves time and money. Its growth will continue this year, and by 2024, global revenue in the artificial intelligence market is expected to exceed $300 billion. Thanks to AI, companies will be able to get rid of most manual tasks and instead focus on innovation.

3. Cloud storage in healthcare. Health care has been moving into the cloud over the past few years. Because cloud storage allows health systems to store data online, it has opened doors for tele-health applications. Patients can receive medical care without visiting hospitals. According to a study by Frost & Sullivan, the introduction of tele-health applications by about two years due to the global pandemic [3]. Cloud storage flexibility will also save healthcare companies money. For example, as the number of patient visits increases during the flu season, they can increase the capacity of their clouds at this time. In summer, when fewer people are sick, they can reduce it.

4. Predominance of boundary calculations.In recent years, the popularity of boundary calculations has increased. This is similar to cloud computing because they store data and information on the Internet, but store it locally. This brings the data store closer to the devices used, eliminating the need to rely on storing data at a remote central location. Edge computing is very useful in remote locations where there is little connectivity to a centralized site. Boundary computing is used for other Internet technologies (IoT) such as facial recognition, remote door calls, smart light switches, Bluetooth, and temperature control systems [4].

5. The growth of worthless computing. Server-free cloud computing is a relatively new development that is particularly useful for software developers. CSPs are responsible for allocating resources instead of supporting, updating, and scaling servers. This frees employees more time to focus on UX and UI, as there is no need to worry about infrastructure. Server-free computing is more energy-efficient, cost-effective, and flexible.

6. Distribution of virtual cloud desktops. Virtual cloud desktops (DaaS) deliver workstations to us through the cloud. Everything from computer settings to operating systems is delivered over the Internet. DaaS will become increasingly important because it allows us to work anywhere and on any device. According to Gartner, by 2023 DaaS will grow annually by 58.8%. DaaS also helps reduce costs, as businesses can get rid of the need to upgrade equipment and duplicate technology. Everything is automatically backed up and stored in a secure data center. Since everything is centralized, it is much safer than if all the data was stored on a separate device. Hackers defiantly take advantage of the pandemic crisis. The number of phishing and other cyber-attacks is growing. A cyber-attack is a malicious attempt by a person or organization to enter the information system of another person or organization.

Typical risks of remote operation.

Network risks. For remote access to company resources, employees usually use various combinations of secure and unprotected, wired or wireless, private or public networks. This provides many login options for hackers and cybercriminals.

Physical protection of devices. Ensuring the physical security of devices in a remote environment becomes a serious risk and a complex problem. This is due to the fact that the lost device poses a threat of loss of confidential data and personal information.

Use of personal devices for operational purposes. In this situation, there is a high risk that personal use of software products and other resources may give criminals access to company resources. Typically, companies do not have control over applications and programs installed on personal devices along with enterprise applications.

Fraud focuses on remote workers. Hackers know well how to use the psychological features of a person, and can subtly manipulate workers. Cloud security includes technologies, controls, processes, and policies that collectively protect cloud systems, data, and infrastructure. This is a subdomain of computer security and, more broadly, information security [5].

Cloud security is a critical requirement for all organizations. Let's look at six strategic steps an organization can take to improve the security of remote employees.

1. Improved password management. Inefficient or incomplete password management systems interfere with business. Moving to remote work only exacerbated this problem. Serious efforts must be made to improve password management. This should include a single sign-on (SSO) path for each application and service the company uses. You must combine single sign-on with multifactor authentication. A significant part of the risk of cybersecurity of remote personnel will be eliminated.

2. Improve infrastructure transparency. Visibility of data traffic is becoming increasingly important as remote employees use business devices. The ability to monitor and display network traffic in detail between employee devices can help identify traffic anomalies or configuration errors.

3. Deploying enterprise-class remote worker security hardware. Most midsize and large enterprises have already deployed many network security tools for managing and controlling end devices. Next-generation firewalls, intrusion prevention systems, network malicious tools, and Wi-Fi authentication are just a few examples. IT security administrators realized that their attempts to manage security policies are hampered because devices are no longer protected by the corporate network. Remote employee gateways can help create a unified security policy. These devices also create a secure VPN tunnel for remote resources. This eliminates the need to install and permanently incorporate software-based remote VPN software.

4. Virtual desktops. Many companies are moving to virtual desktops. The virtual desktop infrastructure has many advantages in IT management. Preventing data loss is the main reason why enterprises migrate to virtualized desktops. Threads are sent to the desktop from a secure private data center.

5. Zero trust. Zero trust is a legitimate and ideal security structure for employees and digital assets located inside and outside the corporate infrastructure. These principles must be taken into account in order to determine where a firm with its security infrastructure is located.

In conclusion, the pandemic gave a powerful impetus to the mass introduction of digital technologies into everyday life. In most countries of the world, social exclusion measures forced them to switch to the online part of world trade. On the one hand, these changes will make human life even more convenient. Broad horizons open up for the development of mankind. A person can provide themselves with the necessary needs without leaving home using remote interaction technologies, the use of artificial intelligence and big data analysis. On the other hand, there is a huge set of risks and questions that are not yet clearly answered. Summing up the above, it should be noted that the current crisis in connection with will be a precursor to one of the largest reformatting of the political and socio-economic structure.

 

Reference:

  1. Brenton C. The basics of virtualization security. Cloud Security Alliance, 2011. – 17 p. URL: https://cloudsecurityalliance.org/wp-content/uploads/2011/ 11/virtualization-security.pdf;
  2. Suddenly Essential Infrastructure: Cloud Computing Resources at the Forefront of the COVID-19 Crisis. Infospace (April 2020). https://ischool.syr.edu/infospace/2021/03/20/suddenly-essential-infrastructure-cloud-computing-resources-at-the-forefront-of-the-covid-19-crisis/;
  3. Carroll E. Transitioning to a Mass Remote Workforce – We Must Verify Before Trusting. McAfee, 7 April 2020. URL: https://www.mcafee.com/blogs/other-blogs/mcafee-labs/transitioning-to-a-mass- remoteworkforce-we-must-verify-before-trusting (дата обращения 00.10.2021);
  4. Choudhary M., Kumar A., Kumar N. Social Engineering in Social Networking Sites: A Survey. International Journal of Engineering Research & Management Technology (IJERMT). 2016. vol. 3, no. 1, pp. 123– 129.;
  5. Hoff Ch. In: Security guidance for critical areas of focus in cloud computing. 2011. – P. 12–20. URL: https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf.

Оставить комментарий

Форма обратной связи о взаимодействии с сайтом
CAPTCHA
Этот вопрос задается для того, чтобы выяснить, являетесь ли Вы человеком или представляете из себя автоматическую спам-рассылку.