scholarly journals Changing Mechanisms of Enterprise Security (Comparing Beyond Corp with Prevalent Network Security Mechanisms)

2018 ◽  
Vol 7 (3.12) ◽  
pp. 81
Author(s):  
B Amutha ◽  
Swasti Saxena ◽  
Abhinaba Das

War driving, camp out etc. are common methodologies of gaining access of a company’s network and resources illegally. Packet capturing, out of thin air, brute force etc. are common mechanisms to gain key or password access to any company’s applications. In the times where hacking and cyber-attacks have become prevalent, companies are deploying various network security mechanisms to counter these attacks and to safe guard company’s applications and data. Beyond Corp is a new technology that is being used by Google these days to safe guard its applications. In this paper we will compare some of the network security mechanisms that many companies use to avoid cyber-attacks with Beyond Corp technology which is being used by Google to avoid security breach in the company’s network and applications.  

Traditional encryption systems and techniques have always been vulnerable to brute force cyber-attacks. This is due to bytes encoding of characters utf8 also known as ASCII characters. Therefore, an opponent who intercepts a cipher text and attempts to decrypt the signal by applying brute force with a faulty pass key can detect some of the decrypted signals by employing a mixture of symbols that are not uniformly dispersed and contain no meaningful significance. Honey encoding technique is suggested to curb this classical authentication weakness by developing cipher-texts that provide correct and evenly dispersed but untrue plaintexts after decryption with a false key. This technique is only suitable for passkeys and PINs. Its adjustment in order to promote the encoding of the texts of natural languages such as electronic mails, records generated by man, still remained an open-end drawback. Prevailing proposed schemes to expand the encryption of natural language messages schedule exposes fragments of the plaintext embedded with coded data, thus they are more prone to cipher text attacks. In this paper, amending honey encoded system is proposed to promote natural language message encryption. The main aim was to create a framework that would encrypt a signal fully in binary form. As an end result, most binary strings semantically generate the right texts to trick an opponent who tries to decipher an error key in the cipher text. The security of the suggested system is assessed..


Author(s):  
Onder Onursal ◽  
Arif Sari

This chapter is a literature review of intermediate system to intermediate system (IS-IS) routing protocol to provide basic security mechanisms against cyber-attacks and enhance network security. IS-IS was originally developed by the International Organization for Standardization (ISO) as a link state routing protocol. It was first built with the ability to route CLNPs or connectionless network protocols according to the OSI standard equal to IP. IS-IS is also developed so that it can accommodate routing for any layer three-based protocol. Internet Engineering Task Force (IETF) in 1990 specified the support for IP and introduced IPv6 extensions in 2000. IS-IS protocol implementation was written as modules in order for it to be distributed freely and easily installed on the GNU routing software. SourceForge.net supported the project and gave access for developers to easily contribute to the project. The chapter elaborates the ISIS routing protocol for network security and proposes a critical survey on security routing protocols.


2022 ◽  
pp. 83-112
Author(s):  
Myo Zarny ◽  
Meng Xu ◽  
Yi Sun

Network security policy automation enables enterprise security teams to keep pace with increasingly dynamic changes in on-premises and public/hybrid cloud environments. This chapter discusses the most common use cases for policy automation in the enterprise, and new automation methodologies to address them by taking the reader step-by-step through sample use cases. It also looks into how emerging automation solutions are using big data, artificial intelligence, and machine learning technologies to further accelerate network security policy automation and improve application and network security in the process.


Author(s):  
Maria Rita Tarola

This present work intends to outline an area of criminology regarding the support of investigative approach aimed to the suppression of cybercrime, known as negative and criminal interference in the context of daily social living. In the presence of more and more impetuous modern evolutions that characterize the information field, in the technical sense, and also in accordance with an industry profile. Aiming for the most part to identify solutions, in the various events experienced by the victims themselves, in assessing how much they are willing to grant and sacrifice, in view of obtaining the fairest counterbalanced advantage or claiming what is criminalized, to the drawbacks. An arduous evaluation study of the delicate balance in the light also of the most recent statistical references, between the need to crack down and that to obtain consensus. To safeguard this need, therefore, also the new regulations that, in step with evolution  express and regulate the discomfort achieved with the new methodological approaches. If it is true that an evolution of the times makes information less high, due to the growth of interferences and redundancies, it is also true that this has a negative implication that we have to  more regulate a better guarantee of what always constitutes respect for data security, if the lack of this, can determine the limit to want to obtain, making it now more than ever with the recent implementation of GDPR 676/2016, through the duty to repress.


2014 ◽  
Vol 1 (3) ◽  
pp. 1-20
Author(s):  
Soumyo D. Moitra

Estimating the benefits of network security systems is important for security decisions since considerable resources are spent on them and organizations need to know the returns on their investments. The objective of the model presented here is to improve management decisions. Better decisions imply greater security for the budget. This model has a number of novel features such as a probabilistic sub-model for the detection and response process, a new attack/damage matrix based on damage-type and cyber-attacks by category, and extensive sensitivity analyses. The results suggest a number of insights into the factors affecting the benefits from sensors such as the effects of non-linear relationships between the rate of attacks and the damages caused. The key role of the value of sensitive information is identified. The model helps identify the conditions under which a new security system provides enough benefits to justify its purchase.


Author(s):  
Yosua Ade Pohan

Regional Tax Reporting Application Webserver is one of the public services for taxpayers to report their sales transactions. This application can be accessed on the domain http://sptpd.payakumbuhkota.go.id. This application is public, so the principles of information security must be applied to prevent cyber attacks. The principles of information security include confidentiality, integrity, and availability. To apply this information security principle, it is necessary to conduct vulnerability assesment of the application webserver. This study aims to improve the security of the application webserver so that the data and information in it is secure. The method used in this study is the Penetration Testing Execution Standard which is one of the methods developed by the Pentest Organization to become a standard in analyzing or auditing security systems. The results of vulnerability testing using software Acunetix, Nikto, BurpSuite and Owasp, there are seven types of vulnerabilities, namely: X-Frame Header Options is Missing, CSRF Attack, Cookie Without Only Flash, DNS Vulnerability, Ddos Attack, Bruteforce Page Login and Open Port. The vulnerability can be exploited, where the level of application vulnerability is in the medium category. The recommendations for fixing vulnerabilities can be applied by the developer, so that after repairs are made, the vulnerability level of the application webserver is in the low category and there is only one type of vulnerability, namely Brute Force Page Login.


2021 ◽  
Vol 353 ◽  
pp. 01006
Author(s):  
Xinjian Xu ◽  
Zhaoxing Meng ◽  
Haiqiang Lv

at present, the three-dimensional cleaning machine involved in tank car cleaning technology in China has full-automatic function, which includes two main structures: three-dimensional positioning machine and high-pressure cleaning machine. However, the tank car cleaning process used in the railway field still has many shortcomings. For example, serious pollution, serious energy consumption, insecurity, etc. In order to improve such defects, it is necessary to introduce new processes and improve the previous cleaning processes. The introduction of new technology can reduce environmental pollution and save capital cost. It can adapt to the development of the times and meet people's needs. Therefore, this paper expounds and analyzes the high-pressure water jet cleaning technology in railway tank cars from the aspects of application and improvement, and puts forward the corresponding improvement measures for reference.


2018 ◽  
Author(s):  
Harry Dhika ◽  
Fitriana Destiawati

Teaching and learning activities of students currently in Indonesia in general been conventional in the absence of high-tech touches, not in line with the development of existing technologies. The importance of the use of technology in classroom learning because the need is increasing with the times. Almost every new technology was born three months but is not accompanied by the development of the place or the implementation of the class. This study discusses the application of the Internet of Things to the grade used in the learning process. Implementation of tools such as a good Internet connection, use of space for technology-based learning will be discussed in the internet. Learning must also keep abreast of the times, students will be bored and tends not too quick to accept if the classroom as a learning tool that is used still remains conventional.


Author(s):  
S.Nagendra Prabhu ◽  
D.Shanthi

Among the various forms of malware, Botnet is the serious threat which occurs commonly in today’s cyber attacks and cyber crimes. Botnet are designed to perform predefined functions in an automated fashion, where these malicious activities ranges from online searching of data, accessing lists, moving files sharing channel information to DDoS attacks against critical targets, phishing, click fraud etc. Existence of command and control(C&C) infrastructure makes the functioning of Botnet unique; in turn throws challenges in the mitigation of Botnet attacks. Hence Botnet detection has been an interesting research topic related to cyber-threat and cyber-crime prevention in network security. Various types of techniques and approaches have been proposed for detection, mitigation and preventation to Botnet attack. Here I discusses in detail about Botnet and related research including Botnet evolution, life-cycle, command and control models, communication protocols, Botnet detection, and Botnet mitigation mechanism etc. Also an overview of research on Botnets which describe the possible attacks performed by various types of Botnet communication technologies in future. KEYWORDS— Bot; Botnet; C&C mechanism; communication protocols; honeynet; passive traffic; attacks; defense; preventaation; mitigation


Sign in / Sign up

Export Citation Format

Share Document