Sunteți pe pagina 1din 35

CS 75 Internet Administration

Block 1 Fundamentals on Intranet Administration


By. Kirit A. Dhabalia
MBA, PMP, ITIL v3, SSBB, MCTS
Content
UNIT 1 - Fundamentals of Intranets
UNIT 2 - Intranet Security
UNIT 3 - Intranet Hardware and Software
F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Unit 1 Fundamentals of Intranet
The Intranet
Advantages of the Intranet
Types of Intranet
Software and Hardware Requirement for an Intranet
Application Areas
Future of the Intranet
Key Intranet Terms

F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

The Intranet
F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

The Intranet
F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

The Intranet
F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Advantages Of The Intranet
Intranets offering workforce productivity which can help user
to find and observe information very fast
User may also use applications according to their roles and
tasks
Through web browser a user can get access to entire contents
of any website from anywhere or any time
Intranet also increase the ability of employees by performing
their job confidently very fast, and accurately.
Intranet permits business companies to share out information
to employees according to their need or requirements.
Employees may also link to appropriate data at their
expediency

F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Advantages Of The Intranet
The best advantage offered by intranet is communications
within an organization or business company, landscape or
portrait. Intranets are helpful to converse planned initiative
that has an international reach all through the organization
The well known examples of transportation are chat, email,
and blogs. A actual world example of Intranet is Nestle had a
number of food processing plants.
The most significant advantage of Intranet is Web publishing
which permits burdensome corporate knowledge to be
continued and effortlessly access all through the company
using Web technologies and hypermedia

F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Advantages Of The Intranet
The familiar examples of web publishing consist of training,
news feed, company polices, documents, and employee
manual. Intranet can be accessed general internet standards
such as CGI applications, Flash files, and Acrobat files. Each
unit can bring up to date the online copy of a document and
intranet always provides the most recent version to
employees.
Intranet offering business operations and administration
solutions because it also being used as a platform of
mounting and organizing applications across the internet
world.

F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Advantages Of The Intranet
Time saving because there is no need to maintain physical
documents such as procedure manual, requisition forms, and
internet phone list.
Now intranet facilitates their user o view and gets
information and data via web browser. Intranet also save the
money of any organization on printing, publishing and overall
maintenance
Intranet offer improve teamwork through which teamwork is
enabled and all certified users can get access to information.
Intranet providing cross platform capability for UNIX, Mac,
Windows.
F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Advantages Of The Intranet
Intranet offering their user to write applications on their
browser without cross-browser compatibility issues.
Intranet is a Web-based tool that permits users to produce a
customized site according their requirements. You can pull all
Internet actions and most wanted contented into a single
page which make easier to access
Security from outside users
Relatively cheap to set up
Quick access to information
Easy and cheap to post information
Increase in productivity
F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Disadvantages Of The Intranet
Management does need to stop control of specific
information, this problem can be minimized but with
appropriate prudence.
The other disadvantage of Intranet is security issue
Intranet gathered everything in one location which is
really good but if it is not prearranged then you will spoil
everything.
The cost of intranet is very high but has lots of
advantages after implementing
This becomes a complex and expensive task
F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Disadvantages Of The Intranet
Training employees Once it has been set up,
employees have to be familiarized and trained on how
to use the intranet. This involves investment in time
and money.
Security from within
New budget
Cost of training
Cost of maintaining
Separate software might be needed for internet and e-
mail

F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Types Of Intranet
Bulletin Board
Database Management
Information Access
Some experts have taken a lead and categorised intranet
into four different types
The communications
The integrating
The catalogue
The single sign-on
F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Software And Hardware Requirement
For An Intranet
you first have to build a network
This usually requires a server, web server software such as Apache
or Microsoft IIS and either wifi connections and cards or Ethernet
cables and a NIC

F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Software And Hardware Requirement
For An Intranet
Client management function - The client management function
gives the administrator can control the intranet, such as adding
users, removing users and keeping the intranet running smoothly
Employee directory - One of the most used features of any intranet
is the employee directory, many employees are always looking for
contact info, whether it is a phone number, email address, fax, title
and some can even include an organizational chart
Project Management - A great time saver is the ability for many
people within an organization to collaborate on a project whether it
is as basic as a mission statement or as complex as a budget
Document share - Your organization will want to make available
certain information for its members when they need it. This can
mean important documents such as reports or other types of
documents such as health benefit materials

F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Software And Hardware Requirement
For An Intranet
Shared Calendar - A great feature to have if you work within a work
group or small organization is to know others schedules so that you
can collaborate or know project time lines
Company news - One of the ways that the organization can
communicate with it's members is with company news
Discussion Forums - These forums are a great way to brainstorm
ideas for upcoming projects or to figure out scheduling issues
Chat and video web conferencing - Since your intranet will have
similar features as the normal Internet; you can easily incorporate
chat and video web conferencing

F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Application Areas
Education Sector Universities, Colleges &
Institutes
Industry Sector Small/Large Mfg. and automation
and control
Service sector Hotels, tourism, Travel,
Transportation, communication
Research & Development Laboratories,
Organisations & space
Govt. sector Ministries, Departments, states and
Law & order
F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Application Areas
Company Documents
Manual, building maps, airport directories, approved
vendors list, company newsletters, procedures library,
product manuals, daily bulletins, history graphs,
knowledge base & competition products, news and web
sites
Customer related
Controlled responses, feedback forum, company bulletin
boards, company store, news flashes, supplies ordering,
database queries

F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Application Areas
General administration and management
Departmental budgets, FAQs, Employee attendance, intercom
any chatting, internal postings, employee orientation, online
collaboration projects, org. charts, security policies, trend
graphs and equipment checklists
Training
Employee proficiency training, training materials and video
training
Coordination and control
Form routing, forms library and help desk submission forms
Meetings related
Meeting minutes/schedules, online meeting, meeting room
schedules

F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Future of The Intranet
Coordination, Cooperation and Collaboration
More.
More content about people rather than just business artifacts (another
way to look at it is that people become recognized as business
artifacts!)
More non-curated end-user-generated content
More metadata (much of it through explicit tagging)
More feedback for authors of sites and content (ratings, thumbs, etc.)
More open (sharing more internal content with those outside the
firewall)
More storage and bandwidth needed (due to exponential content
growth, video, archived conference calls, and voice mail)
More form factors (access from home PC, iPad, iPhone, and BlackBerry,
and whatever the Next Big Thing is)
F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Key Intranet terms
F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Applets Home Page Intranet
Bits, Bitmap Hot Links Search Engine
Bookmark HTML Server
Browser HTTP / HTTPS Surfing
Counter Icon T-1
Cyberspace ISDN TCP/IP
FAQ Java URL
Firewall JPEG Web or Net
Frame LDAP Web Page
FTP Network Web server
GIF Internet Webmaster
Unit 2 Intranet Security
Security concerns
Threats
Internal
External
Security Solutions
Hardware
Software
Information
Certification
Firewalls
Encryption / description methods
Security policy
Multiple layers of intranet security
SOCKS
Advice from Security Experts

F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Security Concerns
Understanding the security vulnerabilities in an organization
Identifying the threats that face your organization;
Assessing the risk of each threat
Identifying appropriate steps to reduce risk to an acceptable
level
Verifying that the system meets the security benchmark
appropriate for a particular organization.
Persons who can find access to the intranet can be put into
three categories
Those who can enter the site
Those who can access the various secured areas
Those who can update the sites contents

F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Threats - Internal
Disable the accounts of employees upon their notification of
termination. Do not wait until their termination date. In this
case, the logic bomb had been planted before the employee
was actually terminated, but after he knew termination was
imminent
Reinitialize security for systems that were under the terminated
employees control. Continuously monitor these systems for
security violations, such as back doors that are left open.
Terminated employees often use these as reentry points.
Install and run antivirus software on each computer on the
intranet
Back up systems, applications, and data; deploy off-site storage
for archival backups
F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Threats - Internal
In 1996, a disgruntled Information Systems employee of a U.S. manufacturer of
measurement and control instruments planted a logic bomb on a company LAN.
The bomb detonated ten days after the man had been terminated, wiping out the
companys research, development, and production software, including its backup systems.
The company estimated the cost to recover the damage at $12 million (over the several
years that would be required to redevelop the software).
The employee had been notified that he was to be terminated, but his network accounts
had not been disabled until his termination date. He had ample time to plant the bomb
before leaving the company. Had he wanted to do so, he could have opened a back door
to the systems he used, which would have allowed him to commit further damaging acts.
This incident shows the need for creating and enforcing realistic security practices,
in order to combat internal threats to assets. There is no way to guarantee that employees
will not commit destructive acts. However, some policies and practices that could have
helped minimize the risk of incurring damages (such as those just cited) include disabling
employee access before termination, running antivirus software on each computer on the
network, and monitoring the network to detect intrusive traffic. Because the employee, in
this case, had root privileges to the systems on the network, the Information Technology
team should have locked down all the systems he administered.
F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Threats - External
Intranets use Internet technologies, such as e-mail and Hypertext
Transfer Protocol (HTTP), in order to provide corporate resources to
employees. Because these technologies are based on the TCP/IP suite
of protocols, intranets give employees easy access to corporate
information resources via the Internet, from wherever they might
happen to be: at home, on a business partners site, or in a distant
city.
One result of this access is that employees send identification and
authentication data as well as other sensitive business information
over public networks, as they take care of business from remote
locations. When the logon and authentication communication is not
secured by encryption, amateur programmers working outside the
corporation can intercept and use this sensitive information against
the company intranet.
F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Security Solutions
The open house
The owner
The garden party
The paying guest
The Fort
Hardware/Software
Information
Certification
Firewalls
Packet Filter firewalls
Proxy servers
Application level gateways
Circuit level gateways
Stateful Multi-Layer Inspection (SMLI)

F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Security Solutions
Encryption / decryption Methods
Public Key Infrastructure (PKI) Solutions
Web server security through SSL (Secure Socket Layer)
Virtual Private Network (VPN)
Security Policy
Identification of
The content, and needs to be secured
User groups or categories
F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Security Solutions
Security Policy
Procedures
Access authorisation procedure
Backup procedures
Disaster recovery procedure
Action against miuse
Course of action in the event of misuse or attacks
Employee does not misrepresent the company
Handling sensitive or secured documents
Copyright policies for intellectual property
F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Security Solutions
Network service access policy
Firewall design policy
Consider three characteristics concerning the
classification of important data
Confidentiality
Integrity
Availability
Multiple layers of internet security
SOCKS
F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Advice from Security Experts
International hacking helps in maintaining better
security
Good resources
Qualifications of security professionals
Firewall configuration makes all the difference
Lot of care required while programming
Security risks present on the networks
Routine security audits are essential

F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

Unit 3 Intranet Hardware and Software
Selection of computing infrastructure
Hardware
Severs
Clients
Security systems
Network Environment
LAN
Address Translation
Firewall
Software
Is
Groupware
Database Connectivity
Other Aspects
Protocol support Tools
Web Based Tools
Security Tools

F
u
n
d
a
m
e
n
t
s

o
f

I
n
t
r
a
n
e
t

6/23/2014 35

S-ar putea să vă placă și