Академический Документы
Профессиональный Документы
Культура Документы
D.LEO FRANCIS
Intranet history is bound up with the
development of Internet – the global network.
The idea of WWW, proposed in 1989 by Tim
Berners-Lee and others, which aim was to
enable the connection and access to many
various sources, became the prototype for
the first internal networks.
E BUSINESS REQUIRES A NETWORK
PROBLEM,WHICH IS SEAMLESS AND ALLOWS
SMOOTH FLOW OF DATA AND INFORMATION
IN ANY FORM FROM ANY LOCATION TO ANY
OTHER DESTINATION (S).
INTRANET IS A VERSION OF INTERNET CONFINED
TO AN ORGANISATION
IT USES INTERNET STANDARDS LIKE HTML,HTTP, &
TCP/IP.
INTRANET USES INTERNET STANDARDS
NAMELY HTML(HYPER TEXT MARKUP
LANGUAGE),HTTP(HYPER TEXT TRANSFER
PROTOCOL) ANDTCP/IP(TRANSMISSION
CONTROL PROTOCOL/INTERNET PROTOCOL).
ACCESS MANUALS,CONTRACTS,DIRECTORIES
ACCESS PRODUCT,CUSTOMER DATA
REVISION,VALIDATION & APPROVAL OF
DOCUMENTS
ACCESS EMPLOYEE DATA BASE
Intranet Security: External Threats
Even though the intranet is a closed, private
network, it is still susceptible to external
threats from hackers or malicious software
including worms, viruses, and malware. Below
we examine some of the external threats to
the intranet and how to address them.
Various threats are:
Network Security Threats:
It’s best to use a firewall to mitigate against
external threats. In simple terms, a firewall is
a protective barrier between the intranet and
the internet.
Viruses
Security breaches
Weak password selection
Access control
Encryption
Remote access
If your organization is hosting the office
intranet via a company server, then the
responsibility for intranet security rests
entirely with you as an organization. Making
sure you have firewalls with the right rules,
SSL connections, HIPPA compliance, updates,
and backups will be down to you. Keeping
abreast of the latest threats and technologies
is also all down to you.
With a cloud-hosted intranet solution in comparison, the intranet
software provider has the responsibility for intranet security.
Important and sensitive company data remains secure as it
is hosted in a private cloud with the content delivered securely
via SSL and the web browser. The cloud’s security features
regularly undergo independent security audits to ensure the
security and confidentiality of your data.
Furthermore, the intranet provider will have a level of expertise
that is unlikely to be matched in a corporate setting. It is in their
interests – indeed, their reputation and brand depend on their
ability to deliver in terms of security. You would be unlikely to try
and repair an electrical fault in the office without using the
expertise of a qualified electrician. In a similar way, why risk the
security of your intranet when you can have the assurance and
expertise of a cloud hosted solution.
In Intranet, each client must have an IP address.
IP address is written in four segments divided by
periods.
Example: 219.44.189.10
Install TCP/IP for server, clients and routers.
Select an Intranet web server.
Web servers are available on Windows NT, Novel
and IBM platforms.
The servers have features like encryption of text,
database connectivity, search engine and HTML
tools.
Publishing – Manuals, Directories
Distribution – Multiple users, User groups
Form processing – Leave application,
Admission application
Interactive – Test and certification
Transaction processing – Order processing
and delivery billing
Collaborative processing – Work group and
workflow applications
Information Sharing – Messaging
applications
Query processing – Database queries and
queries on status of order, balance, value etc.
A wireless network enables people to
communicate and access applications and
information without wires.
Employ radio waves and/or microwaves to
maintain communication channels
one of two topologies
Infrastructure mode: