Changing Mechanisms of Enterprise Security (Comparing Beyond Corp with Prevalent Network Security Mechanisms)
DOI:
https://doi.org/10.14419/ijet.v7i3.12.15867Published:
2018-07-20Keywords:
Security, beyond corp, changing trends in security.Abstract
War driving, camp out etc. are common methodologies of gaining access of a company’s network and resources illegally. Packet capturing, out of thin air, brute force etc. are common mechanisms to gain key or password access to any company’s applications. In the times where hacking and cyber-attacks have become prevalent, companies are deploying various network security mechanisms to counter these attacks and to safe guard company’s applications and data. Beyond Corp is a new technology that is being used by Google these days to safe guard its applications. In this paper we will compare some of the network security mechanisms that many companies use to avoid cyber-attacks with Beyond Corp technology which is being used by Google to avoid security breach in the company’s network and applications.
References
[1] Keromytis, “A Look at VoIP Vulnerabilities†in USENIX, 2010
[2] Gentry, “Fully Homomorphic Encryption Using Ideal Lattices†in ACM ,Stanford University and IBM Watson, 2009
[3] Osborn, Betsy beyer, Justin Mcwilliams and max saltonstall, “ Beyond Corp : Design to Deployment at Google†in ;login: , SPRING 2016 VOL. 41, NO. 1
[4] Luca Cittadini ,Batz Spear, Betsy Beyer and Max Saltonstall, “ Beyond Corp Part III: The Access Proxyâ€, in ;login: ,WINTER 2016 VOL. 41, NO. 4
[5] Jeff Peck, Betsy Beyer, Colin Beske and Max Saltonstall, “Beyond Corp: Maintaining Productivity while maintaining Security†, in ;login:, SUMMER 2017 VOL. 42, NO. 2
[6] Victor Escobedo, Betsy Beyer, Max Saltonstall and FilipZyzniewski, “Beyond Corp 5: The User Experience†in ;login:, FALL 2017 VOL. 42, NO. 3
[7] RADIUS Server, wikipedia
[8] MartÃn Abadi and David G. Andersen, “Learning to Protect Communications with Adversarial Neural Cryptography†in arXiv:1610.06918v1 [cs.CR] 21 Oct 2016
[9] Sophia, James Nobel and Mark S. Miller, “Permission and Authority Revisited towards a formalization†in Workshop on Formal Techniques for Java-like Programs, ACM (2016).
[10] S.V.Manikanthan and T.Padmapriya “Recent Trends In M2m Communications In 4g Networks And Evolution Towards 5gâ€, International Journal of Pure and Applied Mathematics, ISSN NO:1314-3395, Vol-115, Issue -8, Sep 2017.
[11] S.V. Manikanthan , T. Padmapriya “An enhanced distributed evolved node-b architecture in 5G tele-communications network†International Journal of Engineering & Technology (UAE), Vol 7 Issues No (2.8) (2018) 248-254.March2018.
[12] S.V. Manikanthan, T. Padmapriya, Relay Based Architecture For Energy Perceptive For Mobile Adhoc Networks, Advances and Applications in Mathematical Sciences, Volume 17, Issue 1, November 2017, Pages 165-179
How to Cite
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Accepted 2018-07-19
Published 2018-07-20