Google's Cybersecurity Framework
Keywords:
Google, Cybersecurity, Application, Network, Encryption, Software, InternetAbstract
Cybersecurity is a fundamental concept in modern-day organizations. Firms are constantly exploring security solutions to keep them secure from security compromises that bear a great potential of disrupting their daily operations. The cybersecurity landscape is highly diverse and incorporates numerous elements that firms can exploit to protect vital corporate systems, including networks and sensitive resources such as data. Google is highly conscious of cybersecurity and employs every measure to protect its vital IT resources and systems from security threats. Google’s cybersecurity landscape is significantly mature and employs multiple plans that guarantee infrastructural security, data asset management, and effective access control. The firm’s security policies greatly prioritize promoting employee security awareness as the firm understands that workers form a fundamental component of its entire cybersecurity plan. This paper explores Google’s cybersecurity plan by focusing on cybersecurity security awareness programs, company information exposure on social networking sites, and the effects of not using encryption on network or Internet traffic. The paper will similarly recommend ways of minimizing information exposure while developing an understanding between password strengths and password managers in cybersecurity.
Downloads
References
Alomari, E., Manickam, S., Gupta, B. B., Karuppayah, S., & Alfaris, R. (2012). Botnet based distributed denial of service (DDoS) attacks on web servers: Classification and art. ArXiv Preprint ArXiv:1208.0403, 49(7).
Aloul, F. (2012). The Need for Effective Information Security Awareness. Journal of Advances in Information Technology, 3(3), 176–183. https://doi.org/10.4304/jait.3.3.176-183
Caldwell, T. (2016). Making security awareness training work. Computer Fraud & Security, 2016, 8–14. https://doi.org/10.1016/S1361-3723(15)30046-4
Franchi, E., Poggi, A., & Tomaiuolo, M. (2017). Information and Password Attacks on Social Networks: An Argument for Cryptography. Journal of Information Technology Research, 8(1), 25–42. https://doi.org/10.4018/JITR.2015010103
Google Inc. (2011). Security Whitepaper: Google Apps Messaging and Collaboration Products. http://webcache.googleusercontent.com/search?q=cache:BY ArJhqP0wYJ:www.google.c om/a/help/intl/en GB/admins/pdf/ds_gsa_apps_whitepaper_0207.pdf+&cd=1& hl=sw&ct=clnk&gl=ke
Habitu8. (n.d.). Security Awareness Program Plan & Strategy Guide. Retrieved May 22, 2021, from https://info.habitu8.io/security-awareness-program-plan-and strategy-guide
Hiatt, D., & B., Y. (2016). Role of Security in Social Networking. International Journal of Advanced Computer Science and Applications, 7(2). https://doi.org/10.14569/IJACSA.2016.070202
Hosch, W. L. (n.d.). Google | History & Facts. Encyclopedia Britannica. Retrieved May 22, 2021, from https://www.britannica.com/topic/Google-Inc
Kumar, M., & Kishor, A. (2019). Network Traffic Encryption by IPSec. International Journal of Computer Sciences and Engineering, 7(5), 912–915. https://doi.org/10.26438/ijcse/v7i5.912915
Lakhtaria, K. (2011). (PDF) Protecting Computer Network with Encryption Technique: A Study.
International Journal of U- and e- Service, Science and Technology, 4(2). https://www.researchgate.net/publication/226217163_Protecti ng_Computer_Network_wi
th_Encryption_Technique_A_Study
Lopatto, E. (2014). What is HTTPS and why does Google like it so much? —Quartz. https://qz.com/246441/what-is-https and-why-does-google-like-it-so-much/
Moscaritolo, A. (2016). 77 Percent of Google Internet Traffic Now Encrypted. PCMAG. https://www.pcmag.com/news/77- percent-of-google-internet-traffic-now-encrypted
Ohajionu, U. C., & Mathews, S. (2015). (PDF) ADVERTISING ON SOCIALMEDIA AND BENEFITS TO BRANDS. Journal of Social Sciences and Humanities, 10(2). https://www.researchgate.net/publication/299561852_ADVE
RTISING_ON_SOCIAL_M
EDIA_AND_BENEFITS_TO_BRANDS
Statista. (n.d.-a). Google: Annual revenue. Statista. Retrieved May 22, 2021, from
https://www.statista.com/statistics/266206/googles-annual global-revenue/ Statista. (n.d.-b). Number of Google employees 2018. Statista. Retrieved May 22, 2021, from https://www.statista.com/statistics/273744/number-of-full time-google-employees/
Yaqoob, I., Hussain, S., Mamoon, S., Naseer, N., & Akram, J. (2017). Penetration Testing and Vulnerability Assessment. Journal of Network Communications and Emerging Technologies (JNCET), 7(8).