skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Security Risks and Challenges of Remote Working and Learning
This report will discuss and analyze the risks and different challenges which are accompanied when completing remote work and learning. Specifically, this paper will focus on this trends’ effect, during the 2019 Coronavirus pandemic (COVID-19). The different applications that will be included in this research are Slack, Zoom, Skype, Microsoft Teams, Google Meets, Trello, Webex, and Troop Messenger. In recent months, there has been a complete increase in the amount of people worldwide that use these platforms. However, the majority of users do not fully understand security and privacy when using these different platforms. Due to this lack of knowledge, this comes with an increase in attacks. This study will further discuss the different pros and cons of each of the different platforms (mentioned above); the applications that have been breached, how often they were breached, different flaws, vulnerabilities of each system and more. This study coherently uses and assesses its credibility with the assistance of research, a user survey, and past research studies on this topic.  more » « less
Award ID(s):
1754054
PAR ID:
10436906
Author(s) / Creator(s):
;
Date Published:
Journal Name:
The 2023 ADMI Symposium
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. This report will analyze issues related to web browser security and privacy. The web browser applications that will be looked at are Google Chrome, Bing, Mozilla Firefox, Internet Explorer, Microsoft Edge, Safari, and Opera. In recent months web browsers have increased the number of daily users. With the increase in daily users who may not be as well versed in data security and privacy, comes an increase in attacks. This study will discuss the pros and cons of each web browser, how many have been hacked, how often they have been hacked, why they have been hacked, security flaws, and more. The study utilizes research and a user survey to make a proper analysis and provide recommendations on the topic. 
    more » « less
  2. The frequency and costs of cyber-attacks are increasing each year. By the end of 2019, the total cost of data breaches is expected to reach $2.1 trillion through the evergrowing online presence of enterprises and their consumers. The tools to perform these attacks and the breached data can often be purchased within the Dark-net. Many of the threat actors within this realm use its various platforms to broker, discuss, and strategize these cyber-threat assets. To combat these attacks, researchers are developing Cyber-Threat Intelligence (CTI) tools to proactively monitor the ever-growing online hacker community. This paper will detail the creation and use of a CTI tool that leverages a social network to identify cyber-threats across major Dark-net data sources. Through this network, emerging threats can be quickly identified so proactive or reactive security measures can be implemented. 
    more » « less
  3. Physical processes involving hot electrons, including their generation, transport, injection, and relaxation, have been an extensive area of research. The most widely utilized method for actuating the creation of hot electrons involves the excitation of plasmonic modes followed by their non-radiative decay, channeling the energy into these energetic carriers. Since plasmonics has already evolved into a mature field of scientific exploration, active plasmonic devices serve as an ideal platform to study hot-electron physics. In this Perspective article, we will provide the reader with a comprehensive outline of the physics underlying hot-electron dynamics. Emphasis will be placed on the characteristic timescales involved with the lifecycle of hot electrons, the generation and decay mechanisms of surface plasmon-induced hot electrons, and the material platforms suitable for such a study. Then, we will move on to discuss different temperature models used to explain the evolution of hot electrons and the changes in the optical properties of the materials they are generated in or injected into. Finally, we will focus on some of the interesting optical phenomena occurring at ultrafast timescales mediated by hot-carrier dynamics. Such a discussion is expected to incorporate valuable insights into our understanding of the synergistic relationship between hot-electron dynamics and active plasmonics, thereby paving the way for novel applications involving optoelectronics and energy conversion. 
    more » « less
  4. This paper will discuss the beginnings of a sensitivity analysis of barrier island breaching. The study area of Mantoloking, New Jersey, USA is used as the barrier island breached significantly during Hurricane Sandy in 2012. The numerical model XBeach is used to conduct this study. The study investigates the affects that back-bay currents, water-level timing, and barrier-island configuration have on barrier island breaching. 
    more » « less
  5. he non-destructive evaluation (NDE) of civil infrastructure has been an active area of research in recent decades. The traditional inspection of civil infrastructure mostly relies on visual inspection using human inspectors. To facilitate this process, different sensors for data collection and techniques for data analyses have been used to effectively carry out this task in an automated fashion. This review-based study will examine some of the recent developments in the field of autonomous robotic platforms for NDE and the structural health monitoring (SHM) of bridges. Some of the salient features of this review-based study will be discussed in the light of the existing surveys and reviews that have been published in the recent past, which will enable the clarification regarding the novelty of the present review-based study. The review methodology will be discussed in sufficient depth, which will provide insights regarding some of the primary aspects of the review methodology followed by this review-based study. In order to provide an in-depth examination of the state-of-the-art, the current research will examine the three major research streams. The first stream relates to technological robotic platforms developed for NDE of bridges. The second stream of literature examines myriad sensors used for the development of robotic platforms for the NDE of bridges. The third stream of literature highlights different algorithms for the surface- and sub-surface-level analysis of bridges that have been developed by studies in the past. A number of challenges towards the development of robotic platforms have also been discussed. 
    more » « less