Changing Mechanisms of Enterprise Security (Comparing Beyond Corp with Prevalent Network Security Mechanisms)
Keywords:Security, beyond corp, changing trends in security.
War driving, camp out etc. are common methodologies of gaining access of a companyâ€™s network and resources illegally. Packet capturing, out of thin air, brute force etc. are common mechanisms to gain key or password access to any companyâ€™s applications. In the times where hacking and cyber-attacks have become prevalent, companies are deploying various network security mechanisms to counter these attacks and to safe guard companyâ€™s applications and data. Beyond Corp is a new technology that is being used by Google these days to safe guard its applications. In this paper we will compare some of the network security mechanisms that many companies use to avoid cyber-attacks with Beyond Corp technology which is being used by Google to avoid security breach in the companyâ€™s network and applications.
 Keromytis, â€œA Look at VoIP Vulnerabilitiesâ€ in USENIX, 2010
 Gentry, â€œFully Homomorphic Encryption Using Ideal Latticesâ€ in ACM ,Stanford University and IBM Watson, 2009
 Osborn, Betsy beyer, Justin Mcwilliams and max saltonstall, â€œ Beyond Corp : Design to Deployment at Googleâ€ in ;login: , SPRING 2016 VOL. 41, NO. 1
 Luca Cittadini ,Batz Spear, Betsy Beyer and Max Saltonstall, â€œ Beyond Corp Part III: The Access Proxyâ€, in ;login: ,WINTER 2016 VOL. 41, NO. 4
 Jeff Peck, Betsy Beyer, Colin Beske and Max Saltonstall, â€œBeyond Corp: Maintaining Productivity while maintaining Securityâ€ , in ;login:, SUMMER 2017 VOL. 42, NO. 2
 Victor Escobedo, Betsy Beyer, Max Saltonstall and FilipZyzniewski, â€œBeyond Corp 5: The User Experienceâ€ in ;login:, FALL 2017 VOL. 42, NO. 3
 RADIUS Server, wikipedia
 Sophia, James Nobel and Mark S. Miller, â€œPermission and Authority Revisited towards a formalizationâ€ in Workshop on Formal Techniques for Java-like Programs, ACM (2016).
 S.V.Manikanthan and T.Padmapriya â€œRecent Trends In M2m Communications In 4g Networks And Evolution Towards 5gâ€, International Journal of Pure and Applied Mathematics, ISSN NO:1314-3395, Vol-115, Issue -8, Sep 2017.
 S.V. Manikanthan , T. Padmapriya â€œAn enhanced distributed evolved node-b architecture in 5G tele-communications networkâ€ International Journal of Engineering & Technology (UAE), Vol 7 Issues No (2.8) (2018) 248-254.March2018.
 S.V. Manikanthan, T. Padmapriya, Relay Based Architecture For Energy Perceptive For Mobile Adhoc Networks, Advances and Applications in Mathematical Sciences, Volume 17, Issue 1, November 2017, Pages 165-179
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).