Changing Mechanisms of Enterprise Security (Comparing Beyond Corp with Prevalent Network Security Mechanisms)

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    War driving, camp out etc. are common methodologies of gaining access of a company’s network and resources illegally. Packet capturing, out of thin air, brute force etc. are common mechanisms to gain key or password access to any company’s applications. In the times where hacking and cyber-attacks have become prevalent, companies are deploying various network security mechanisms to counter these attacks and to safe guard company’s applications and data. Beyond Corp is a new technology that is being used by Google these days to safe guard its applications. In this paper we will compare some of the network security mechanisms that many companies use to avoid cyber-attacks with Beyond Corp technology which is being used by Google to avoid security breach in the company’s network and applications.

     

     


  • Keywords


    Security, beyond corp , changing trends in security.

  • References


      [1] Keromytis, “A Look at VoIP Vulnerabilities” in USENIX, 2010

      [2] Gentry, “Fully Homomorphic Encryption Using Ideal Lattices” in ACM ,Stanford University and IBM Watson, 2009

      [3] Osborn, Betsy beyer, Justin Mcwilliams and max saltonstall, “ Beyond Corp : Design to Deployment at Google” in ;login: , SPRING 2016 VOL. 41, NO. 1

      [4] Luca Cittadini ,Batz Spear, Betsy Beyer and Max Saltonstall, “ Beyond Corp Part III: The Access Proxy”, in ;login: ,WINTER 2016 VOL. 41, NO. 4

      [5] Jeff Peck, Betsy Beyer, Colin Beske and Max Saltonstall, “Beyond Corp: Maintaining Productivity while maintaining Security” , in ;login:, SUMMER 2017 VOL. 42, NO. 2

      [6] Victor Escobedo, Betsy Beyer, Max Saltonstall and FilipZyzniewski, “Beyond Corp 5: The User Experience” in ;login:, FALL 2017 VOL. 42, NO. 3

      [7] RADIUS Server, wikipedia

      [8] Martín Abadi and David G. Andersen, “Learning to Protect Communications with Adversarial Neural Cryptography” in arXiv:1610.06918v1 [cs.CR] 21 Oct 2016

      [9] Sophia, James Nobel and Mark S. Miller, “Permission and Authority Revisited towards a formalization” in Workshop on Formal Techniques for Java-like Programs, ACM (2016).

      [10] S.V.Manikanthan and T.Padmapriya “Recent Trends In M2m Communications In 4g Networks And Evolution Towards 5g”, International Journal of Pure and Applied Mathematics, ISSN NO:1314-3395, Vol-115, Issue -8, Sep 2017.

      [11] S.V. Manikanthan , T. Padmapriya “An enhanced distributed evolved node-b architecture in 5G tele-communications network” International Journal of Engineering & Technology (UAE), Vol 7 Issues No (2.8) (2018) 248-254.March2018.

      [12] S.V. Manikanthan, T. Padmapriya, Relay Based Architecture For Energy Perceptive For Mobile Adhoc Networks, Advances and Applications in Mathematical Sciences, Volume 17, Issue 1, November 2017, Pages 165-179


 

View

Download

Article ID: 15867
 
DOI: 10.14419/ijet.v7i3.12.15867




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.