Sunteți pe pagina 1din 28

Know Your Intranet

Compiled by : Jayachandran G
Corporate Office/Computer
Services
Know Your Intranet

What Is an Intranet?

• An intranet delivers collaboration and coordination


to employees around the clock

 Communication system designed by technical staff


 Focus is the message, not the media

• Normally runs in a client/server environment and a


local area network configuration

• Separated from other networks by firewalls, a


means of preventing unauthorized access to the
company’s internal data or leaks of sensitive
company information

Compiled by : Jayachandran G
Corporate Office/Computer
Services
Know Your Intranet
The Internet generally allows
everyone to access all network
resources.

An Intranet allows for restricted


access to only members of an
organization.

An Extranet expands that access by


allowing non-members such as
suppliers and customers to use
company resources.

The main difference between the


three is accessibility.

Compiled by : Jayachandran G
Corporate Office/Computer
Services
Know Your Intranet
Why Intranet?

• Improved internal communication

• Improved access to information

• Improved productivity

• Promote user participation

• Improved management

Compiled by : Jayachandran G
Corporate Office/Computer
Services
Know Your Intranet
Why Intranet?

• Sharing of company policies/rules & regulations

• Sharing of information of common interest

• Access product & customer data

• Launching of personal/departmental home pages

• Submission of reports

• Corporate telephone directories

Compiled by : Jayachandran G
Corporate Office/Computer
Services
Know Your Intranet
Why Intranet?

• Links employees and managers around the clock and automates a lot of intra
organizational traffic

• Makes it possible for a company to gain better access to its primary resource
the knowledge and experience of decision makers

• Enables easier integration of processes.

Compiled by : Jayachandran G
Corporate Office/Computer
Services
Know Your Intranet
Technology behind Intranet?

• One or more inter-connected TCP/IP networks

• Internet connectivity with firewall protection

• Servers: Web, E-Mail, Proxy, DNS

• Browsers, plug-ins, authoring tools

• Databases, search engines

• Website administration tools

Compiled by : Jayachandran G
Corporate Office/Computer
Services
Know Your Intranet
Intranet Security

Two levels of Security required:

• Internal
It can be imposed by Public Key Security & Encryption Key.

• External
Through Firewall.

Compiled by : Jayachandran G
Corporate Office/Computer
Services
Know Your Intranet

Firewall

Is hardware, software, or a combination


of both

Used to prevent unauthorized programs


or Internet users from accessing a
private network and/or a single
computer.

Compiled by : Jayachandran G
Corporate Office/Computer
Services
Know Your Intranet
How does a software firewall work?

Inspects each individual “packet” of data as it arrives


at either side of the firewall

Determines whether it should be allowed to pass


through or if it should be blocked.

Compiled by : Jayachandran G
Corporate Office/Computer
Services
Know Your Intranet
Firewall Rules

Allow – traffic that flows automatically because it


has been deemed

Block – traffic that is blocked because it has been


deemed dangerous to your computer

Ask – asks the user whether or not the traffic is


allowed to pass through

Compiled by : Jayachandran G
Corporate Office/Computer
Services
Know Your Intranet
Firewall Will Do …

• Stop hackers from accessing your computer

• Protects your personal information

• Blocks “pop up” ads and certain cookies

• Determines which programs can access the Internet

Compiled by : Jayachandran G
Corporate Office/Computer
Services
Know Your Intranet
Firewall Limitation..

• Can't protect you against malicious insiders

• Can't protect you against connections that don't go


through it

• Can't protect against completely new threats

• Can't protect against viruses

Compiled by : Jayachandran G
Corporate Office/Computer
Services
Know Your Intranet
Firewall Gateway are they same or diff?

• A gateway is a machine through which data packets flow.


It is responsible for linking together two networks (e.g. an
internal network, and the Internet).

• A firewall is a filtering system through which data packets


are sent; the firewall decides to let some of the packets
pass through, while it blocks or divert others.

• Recent days the gateway comes with the internal firewall


(e.g Netgear Gateway)

Compiled by : Jayachandran G
Corporate Office/Computer
Services
Know Your Intranet
Can I connect Intranet from other location?

• Yes it is possible through VPN – Virtual Private Network.

Compiled by : Jayachandran G
Corporate Office/Computer
Services
Know Your Intranet
Ethical Responsibilities

• The Intranet is setup with a firewall to protect the


institution from “outside harm” but must also protect itself
from “harm from within”.

• Ethical responsibility must be part of the Intranet culture


to help inform and provide guidelines to “insiders”.

• Ethical responsibility is must for each an every individual


in order save our organization data.

Compiled by : Jayachandran G
Corporate Office/Computer
Services
Know Your Intranet
Ethical Responsibilities

eMail Safety

• Never share your email password.

• Never use your official mail for your personal communications.

• Never share confidential personal data like bank details, passwords


etc.

• Be aware of spam(unwanted mails) and phishing(fake mails seems


to trusted source) mails.

• If you are not expecting an attachment to a mail, then never open


the attachment which may be a virus from unknown source.

Compiled by : Jayachandran G
Corporate Office/Computer
Services
Know Your Intranet

Computer viruses are called viruses because they share some


of the traits of biological viruses.

A computer virus passes from computer to computer like


a biological virus passes from person to person.

Compiled by : Jayachandran G
Corporate Office/Computer
Services
WHAT IS A "VIRUS"?

BIOLOGICAL VIRUSES

• A biological virus is not a living thing


• A virus is a fragment of DNA inside a protective jacket
• A biological virus must inject its DNA into a cell

COMPUTER VIRUSES

• A computer virus must piggyback on top of some other program


or document in order to get executed
• Once it is running, it is then able to infect other programs or documents
VIRUS HISTORY

Traditional computer viruses were first widely seen in the late 1980s
Viruses took advantage of these three facts to create the first self-
replicating programs!

FIRST FACTOR
Spread of personal computers

SECOND FACTOR
Use of computer "bulletin boards"

THIRD FACTOR
The floppy disk
CLASSES OF VIRUSES

1. FILE INFECTORS VIRUSES


a. Embedded in program
b. Runs when program gets executed
c. Loads in memory
d. Cycle continues through sharing files

2. BOOT-SECTOR VIRUSES
a. Load viruses into memory
b. Infect the boot sector on floppy disks and hard disks

3. MACRO VIRUSES
a. Infects data files
b. Executed in embedded scripts
c. Inserts copies of itself into other documents
d. Spreads by sharing data files
CLASSES OF VIRUSES

EXECUTABLE AND BOOT SECTOR VIRUSES


ARE NOT VERY THREATENING ANY MORE

1. Large size of today's programs (executable)

2. Operating systems now protect the boot sector


E-MAIL VIRUSES

E-MAIL VIRUSES ARE THE LATEST INVENTION

1. Melissa Virus (March 1999)


a. Embedded into Word document
b. When opened, sent to first 50 email addresses in address book
c. Included a friendly note making it look harmless
d. If opened by any of the recipients, sent to another 50
addresses of the current recipient

1. The ILOVEYOU Virus (May 2000)


a. Attachment is a piece of code
b. When executed, sent itself to everyone in the address book
c. Corrupted files
ORIGINS

THREE REASONS PEOPLE CREATE VIRUSES

1. The same psychology that drives vandals and arsonists

2. The thrill of watching things destroyed

3. Bragging rights, or the thrill of doing it


FIGHTING VIRUSES

ANTIVIRUS PROGRAMS

- Norton Antivirus (Symantec)

- VirusScan (McAfee)

- F-Secure Anti-Virus (F-Secure)

No anti-viruses guarantee 100 percent protection from viruses!!!


STATISTICS

Position Name Number of occurrences

1 I-Worm.Klez 96.49%
2 Win95.CIH 0.84%
3 I-Worm.BadtransII 0.52%
4 I-Worm.Hybris 0.30%
5 Trojan.PSW.Delf 0.24%
6 I-Worm.Sircam 0.21%
7 Win32.Elkern.c 0.16%
8 Macro.Word.Cap 0.13%
9 Win32.FunLove 0.09%
10 I-Worm.Magistr 0.07%
STATISTICS

NUMBER OF INFECTED FILES BY COUNTRY, WITHIN THE LAST 30 DAYS

0-100

101-1000

1001-10,000

10,001-100,000

100,001+

S-ar putea să vă placă și