Google's Cybersecurity Framework

Authors

  • Ravindra Patel Department of Computer Science, Campbellsville University, University Dr, Campbellsville, KY, USA 42718 Author

Keywords:

Google, Cybersecurity, Application, Network, Encryption, Software, Internet

Abstract

 Cybersecurity is a fundamental concept in  modern-day organizations. Firms are constantly exploring  security solutions to keep them secure from security  compromises that bear a great potential of disrupting their  daily operations. The cybersecurity landscape is highly  diverse and incorporates numerous elements that firms can  exploit to protect vital corporate systems, including networks  and sensitive resources such as data. Google is highly  conscious of cybersecurity and employs every measure to  protect its vital IT resources and systems from security  threats. Google’s cybersecurity landscape is significantly  mature and employs multiple plans that guarantee  infrastructural security, data asset management, and effective  access control. The firm’s security policies greatly prioritize  promoting employee security awareness as the firm  understands that workers form a fundamental component of  its entire cybersecurity plan. This paper explores Google’s  cybersecurity plan by focusing on cybersecurity security  awareness programs, company information exposure on  social networking sites, and the effects of not using  encryption on network or Internet traffic. The paper will  similarly recommend ways of minimizing information  exposure while developing an understanding between  password strengths and password managers in cybersecurity. 

Downloads

Download data is not yet available.

References

Alomari, E., Manickam, S., Gupta, B. B., Karuppayah, S., & Alfaris, R. (2012). Botnet based distributed denial of service (DDoS) attacks on web servers: Classification and art. ArXiv Preprint ArXiv:1208.0403, 49(7).

Aloul, F. (2012). The Need for Effective Information Security Awareness. Journal of Advances in Information Technology, 3(3), 176–183. https://doi.org/10.4304/jait.3.3.176-183

Caldwell, T. (2016). Making security awareness training work. Computer Fraud & Security, 2016, 8–14. https://doi.org/10.1016/S1361-3723(15)30046-4

Franchi, E., Poggi, A., & Tomaiuolo, M. (2017). Information and Password Attacks on Social Networks: An Argument for Cryptography. Journal of Information Technology Research, 8(1), 25–42. https://doi.org/10.4018/JITR.2015010103

Google Inc. (2011). Security Whitepaper: Google Apps Messaging and Collaboration Products. http://webcache.googleusercontent.com/search?q=cache:BY ArJhqP0wYJ:www.google.c om/a/help/intl/en GB/admins/pdf/ds_gsa_apps_whitepaper_0207.pdf+&cd=1& hl=sw&ct=clnk&gl=ke

Habitu8. (n.d.). Security Awareness Program Plan & Strategy Guide. Retrieved May 22, 2021, from https://info.habitu8.io/security-awareness-program-plan-and strategy-guide

Hiatt, D., & B., Y. (2016). Role of Security in Social Networking. International Journal of Advanced Computer Science and Applications, 7(2). https://doi.org/10.14569/IJACSA.2016.070202

Hosch, W. L. (n.d.). Google | History & Facts. Encyclopedia Britannica. Retrieved May 22, 2021, from https://www.britannica.com/topic/Google-Inc

Kumar, M., & Kishor, A. (2019). Network Traffic Encryption by IPSec. International Journal of Computer Sciences and Engineering, 7(5), 912–915. https://doi.org/10.26438/ijcse/v7i5.912915

Lakhtaria, K. (2011). (PDF) Protecting Computer Network with Encryption Technique: A Study.

International Journal of U- and e- Service, Science and Technology, 4(2). https://www.researchgate.net/publication/226217163_Protecti ng_Computer_Network_wi

th_Encryption_Technique_A_Study

Lopatto, E. (2014). What is HTTPS and why does Google like it so much? —Quartz. https://qz.com/246441/what-is-https and-why-does-google-like-it-so-much/

Moscaritolo, A. (2016). 77 Percent of Google Internet Traffic Now Encrypted. PCMAG. https://www.pcmag.com/news/77- percent-of-google-internet-traffic-now-encrypted

Ohajionu, U. C., & Mathews, S. (2015). (PDF) ADVERTISING ON SOCIALMEDIA AND BENEFITS TO BRANDS. Journal of Social Sciences and Humanities, 10(2). https://www.researchgate.net/publication/299561852_ADVE

RTISING_ON_SOCIAL_M

EDIA_AND_BENEFITS_TO_BRANDS

Statista. (n.d.-a). Google: Annual revenue. Statista. Retrieved May 22, 2021, from

https://www.statista.com/statistics/266206/googles-annual global-revenue/ Statista. (n.d.-b). Number of Google employees 2018. Statista. Retrieved May 22, 2021, from https://www.statista.com/statistics/273744/number-of-full time-google-employees/

Yaqoob, I., Hussain, S., Mamoon, S., Naseer, N., & Akram, J. (2017). Penetration Testing and Vulnerability Assessment. Journal of Network Communications and Emerging Technologies (JNCET), 7(8).

Downloads

Published

2022-04-30

How to Cite

Google’s Cybersecurity Framework . (2022). International Journal of Innovative Research in Engineering & Management, 9(2), 78–83. Retrieved from https://acspublisher.com/journals/index.php/ijirem/article/view/10919