0 evaluări0% au considerat acest document util (0 voturi)
36 vizualizări35 pagini
Intranets offering workforce productivity which can help user to find and observe information very fast user may also use applications according to their roles and tasks through web browser a user can get access to entire contents of any website from anywhere or any time intranet also increase the ability of employee's by performing their job confidently very fast, and accurately.
Intranets offering workforce productivity which can help user to find and observe information very fast user may also use applications according to their roles and tasks through web browser a user can get access to entire contents of any website from anywhere or any time intranet also increase the ability of employee's by performing their job confidently very fast, and accurately.
Intranets offering workforce productivity which can help user to find and observe information very fast user may also use applications according to their roles and tasks through web browser a user can get access to entire contents of any website from anywhere or any time intranet also increase the ability of employee's by performing their job confidently very fast, and accurately.
By. Kirit A. Dhabalia MBA, PMP, ITIL v3, SSBB, MCTS Content UNIT 1 - Fundamentals of Intranets UNIT 2 - Intranet Security UNIT 3 - Intranet Hardware and Software F u n d a m e n t s
o f
I n t r a n e t
Unit 1 Fundamentals of Intranet The Intranet Advantages of the Intranet Types of Intranet Software and Hardware Requirement for an Intranet Application Areas Future of the Intranet Key Intranet Terms
F u n d a m e n t s
o f
I n t r a n e t
The Intranet F u n d a m e n t s
o f
I n t r a n e t
The Intranet F u n d a m e n t s
o f
I n t r a n e t
The Intranet F u n d a m e n t s
o f
I n t r a n e t
Advantages Of The Intranet Intranets offering workforce productivity which can help user to find and observe information very fast User may also use applications according to their roles and tasks Through web browser a user can get access to entire contents of any website from anywhere or any time Intranet also increase the ability of employees by performing their job confidently very fast, and accurately. Intranet permits business companies to share out information to employees according to their need or requirements. Employees may also link to appropriate data at their expediency
F u n d a m e n t s
o f
I n t r a n e t
Advantages Of The Intranet The best advantage offered by intranet is communications within an organization or business company, landscape or portrait. Intranets are helpful to converse planned initiative that has an international reach all through the organization The well known examples of transportation are chat, email, and blogs. A actual world example of Intranet is Nestle had a number of food processing plants. The most significant advantage of Intranet is Web publishing which permits burdensome corporate knowledge to be continued and effortlessly access all through the company using Web technologies and hypermedia
F u n d a m e n t s
o f
I n t r a n e t
Advantages Of The Intranet The familiar examples of web publishing consist of training, news feed, company polices, documents, and employee manual. Intranet can be accessed general internet standards such as CGI applications, Flash files, and Acrobat files. Each unit can bring up to date the online copy of a document and intranet always provides the most recent version to employees. Intranet offering business operations and administration solutions because it also being used as a platform of mounting and organizing applications across the internet world.
F u n d a m e n t s
o f
I n t r a n e t
Advantages Of The Intranet Time saving because there is no need to maintain physical documents such as procedure manual, requisition forms, and internet phone list. Now intranet facilitates their user o view and gets information and data via web browser. Intranet also save the money of any organization on printing, publishing and overall maintenance Intranet offer improve teamwork through which teamwork is enabled and all certified users can get access to information. Intranet providing cross platform capability for UNIX, Mac, Windows. F u n d a m e n t s
o f
I n t r a n e t
Advantages Of The Intranet Intranet offering their user to write applications on their browser without cross-browser compatibility issues. Intranet is a Web-based tool that permits users to produce a customized site according their requirements. You can pull all Internet actions and most wanted contented into a single page which make easier to access Security from outside users Relatively cheap to set up Quick access to information Easy and cheap to post information Increase in productivity F u n d a m e n t s
o f
I n t r a n e t
Disadvantages Of The Intranet Management does need to stop control of specific information, this problem can be minimized but with appropriate prudence. The other disadvantage of Intranet is security issue Intranet gathered everything in one location which is really good but if it is not prearranged then you will spoil everything. The cost of intranet is very high but has lots of advantages after implementing This becomes a complex and expensive task F u n d a m e n t s
o f
I n t r a n e t
Disadvantages Of The Intranet Training employees Once it has been set up, employees have to be familiarized and trained on how to use the intranet. This involves investment in time and money. Security from within New budget Cost of training Cost of maintaining Separate software might be needed for internet and e- mail
F u n d a m e n t s
o f
I n t r a n e t
Types Of Intranet Bulletin Board Database Management Information Access Some experts have taken a lead and categorised intranet into four different types The communications The integrating The catalogue The single sign-on F u n d a m e n t s
o f
I n t r a n e t
Software And Hardware Requirement For An Intranet you first have to build a network This usually requires a server, web server software such as Apache or Microsoft IIS and either wifi connections and cards or Ethernet cables and a NIC
F u n d a m e n t s
o f
I n t r a n e t
Software And Hardware Requirement For An Intranet Client management function - The client management function gives the administrator can control the intranet, such as adding users, removing users and keeping the intranet running smoothly Employee directory - One of the most used features of any intranet is the employee directory, many employees are always looking for contact info, whether it is a phone number, email address, fax, title and some can even include an organizational chart Project Management - A great time saver is the ability for many people within an organization to collaborate on a project whether it is as basic as a mission statement or as complex as a budget Document share - Your organization will want to make available certain information for its members when they need it. This can mean important documents such as reports or other types of documents such as health benefit materials
F u n d a m e n t s
o f
I n t r a n e t
Software And Hardware Requirement For An Intranet Shared Calendar - A great feature to have if you work within a work group or small organization is to know others schedules so that you can collaborate or know project time lines Company news - One of the ways that the organization can communicate with it's members is with company news Discussion Forums - These forums are a great way to brainstorm ideas for upcoming projects or to figure out scheduling issues Chat and video web conferencing - Since your intranet will have similar features as the normal Internet; you can easily incorporate chat and video web conferencing
F u n d a m e n t s
o f
I n t r a n e t
Application Areas Education Sector Universities, Colleges & Institutes Industry Sector Small/Large Mfg. and automation and control Service sector Hotels, tourism, Travel, Transportation, communication Research & Development Laboratories, Organisations & space Govt. sector Ministries, Departments, states and Law & order F u n d a m e n t s
o f
I n t r a n e t
Application Areas Company Documents Manual, building maps, airport directories, approved vendors list, company newsletters, procedures library, product manuals, daily bulletins, history graphs, knowledge base & competition products, news and web sites Customer related Controlled responses, feedback forum, company bulletin boards, company store, news flashes, supplies ordering, database queries
F u n d a m e n t s
o f
I n t r a n e t
Application Areas General administration and management Departmental budgets, FAQs, Employee attendance, intercom any chatting, internal postings, employee orientation, online collaboration projects, org. charts, security policies, trend graphs and equipment checklists Training Employee proficiency training, training materials and video training Coordination and control Form routing, forms library and help desk submission forms Meetings related Meeting minutes/schedules, online meeting, meeting room schedules
F u n d a m e n t s
o f
I n t r a n e t
Future of The Intranet Coordination, Cooperation and Collaboration More. More content about people rather than just business artifacts (another way to look at it is that people become recognized as business artifacts!) More non-curated end-user-generated content More metadata (much of it through explicit tagging) More feedback for authors of sites and content (ratings, thumbs, etc.) More open (sharing more internal content with those outside the firewall) More storage and bandwidth needed (due to exponential content growth, video, archived conference calls, and voice mail) More form factors (access from home PC, iPad, iPhone, and BlackBerry, and whatever the Next Big Thing is) F u n d a m e n t s
o f
I n t r a n e t
Key Intranet terms F u n d a m e n t s
o f
I n t r a n e t
Applets Home Page Intranet Bits, Bitmap Hot Links Search Engine Bookmark HTML Server Browser HTTP / HTTPS Surfing Counter Icon T-1 Cyberspace ISDN TCP/IP FAQ Java URL Firewall JPEG Web or Net Frame LDAP Web Page FTP Network Web server GIF Internet Webmaster Unit 2 Intranet Security Security concerns Threats Internal External Security Solutions Hardware Software Information Certification Firewalls Encryption / description methods Security policy Multiple layers of intranet security SOCKS Advice from Security Experts
F u n d a m e n t s
o f
I n t r a n e t
Security Concerns Understanding the security vulnerabilities in an organization Identifying the threats that face your organization; Assessing the risk of each threat Identifying appropriate steps to reduce risk to an acceptable level Verifying that the system meets the security benchmark appropriate for a particular organization. Persons who can find access to the intranet can be put into three categories Those who can enter the site Those who can access the various secured areas Those who can update the sites contents
F u n d a m e n t s
o f
I n t r a n e t
Threats - Internal Disable the accounts of employees upon their notification of termination. Do not wait until their termination date. In this case, the logic bomb had been planted before the employee was actually terminated, but after he knew termination was imminent Reinitialize security for systems that were under the terminated employees control. Continuously monitor these systems for security violations, such as back doors that are left open. Terminated employees often use these as reentry points. Install and run antivirus software on each computer on the intranet Back up systems, applications, and data; deploy off-site storage for archival backups F u n d a m e n t s
o f
I n t r a n e t
Threats - Internal In 1996, a disgruntled Information Systems employee of a U.S. manufacturer of measurement and control instruments planted a logic bomb on a company LAN. The bomb detonated ten days after the man had been terminated, wiping out the companys research, development, and production software, including its backup systems. The company estimated the cost to recover the damage at $12 million (over the several years that would be required to redevelop the software). The employee had been notified that he was to be terminated, but his network accounts had not been disabled until his termination date. He had ample time to plant the bomb before leaving the company. Had he wanted to do so, he could have opened a back door to the systems he used, which would have allowed him to commit further damaging acts. This incident shows the need for creating and enforcing realistic security practices, in order to combat internal threats to assets. There is no way to guarantee that employees will not commit destructive acts. However, some policies and practices that could have helped minimize the risk of incurring damages (such as those just cited) include disabling employee access before termination, running antivirus software on each computer on the network, and monitoring the network to detect intrusive traffic. Because the employee, in this case, had root privileges to the systems on the network, the Information Technology team should have locked down all the systems he administered. F u n d a m e n t s
o f
I n t r a n e t
Threats - External Intranets use Internet technologies, such as e-mail and Hypertext Transfer Protocol (HTTP), in order to provide corporate resources to employees. Because these technologies are based on the TCP/IP suite of protocols, intranets give employees easy access to corporate information resources via the Internet, from wherever they might happen to be: at home, on a business partners site, or in a distant city. One result of this access is that employees send identification and authentication data as well as other sensitive business information over public networks, as they take care of business from remote locations. When the logon and authentication communication is not secured by encryption, amateur programmers working outside the corporation can intercept and use this sensitive information against the company intranet. F u n d a m e n t s
o f
I n t r a n e t
Security Solutions The open house The owner The garden party The paying guest The Fort Hardware/Software Information Certification Firewalls Packet Filter firewalls Proxy servers Application level gateways Circuit level gateways Stateful Multi-Layer Inspection (SMLI)
F u n d a m e n t s
o f
I n t r a n e t
Security Solutions Encryption / decryption Methods Public Key Infrastructure (PKI) Solutions Web server security through SSL (Secure Socket Layer) Virtual Private Network (VPN) Security Policy Identification of The content, and needs to be secured User groups or categories F u n d a m e n t s
o f
I n t r a n e t
Security Solutions Security Policy Procedures Access authorisation procedure Backup procedures Disaster recovery procedure Action against miuse Course of action in the event of misuse or attacks Employee does not misrepresent the company Handling sensitive or secured documents Copyright policies for intellectual property F u n d a m e n t s
o f
I n t r a n e t
Security Solutions Network service access policy Firewall design policy Consider three characteristics concerning the classification of important data Confidentiality Integrity Availability Multiple layers of internet security SOCKS F u n d a m e n t s
o f
I n t r a n e t
Advice from Security Experts International hacking helps in maintaining better security Good resources Qualifications of security professionals Firewall configuration makes all the difference Lot of care required while programming Security risks present on the networks Routine security audits are essential
F u n d a m e n t s
o f
I n t r a n e t
Unit 3 Intranet Hardware and Software Selection of computing infrastructure Hardware Severs Clients Security systems Network Environment LAN Address Translation Firewall Software Is Groupware Database Connectivity Other Aspects Protocol support Tools Web Based Tools Security Tools