cs 75 01 intranet administration
TRANSCRIPT
-
8/12/2019 CS 75 01 Intranet Administration
1/35
-
8/12/2019 CS 75 01 Intranet Administration
2/35
Content
UNIT 1 -Fundamentals of IntranetsUNIT 2 -Intranet SecurityUNIT 3 -Intranet Hardware and Software
F u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
3/35
Unit 1 Fundamentals of Intranet The Intranet Advantages of the Intranet Types of Intranet Software and Hardware Requirement for an Intranet Application Areas Future of the Intranet Key Intranet Terms
F u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
4/35
The Intranet
F u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
5/35
The Intranet
F u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
6/35
The Intranet
F u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
7/35
Advantages Of The Intranet Intranets offering workforce productivity which can help user
to find and observe information very fast User may also use applications according to their roles and
tasks Through web browser a user can get access to entire contents
of any website from anywhere or any time Intranet also increase the ability of employees by performing
their job confidently very fast, and accurately.
Intranet permits business companies to share out informationto employees according to their need or requirements.Employees may also link to appropriate data at theirexpediency F
u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
8/35
Advantages Of The Intranet The best advantage offered by intranet is communications
within an organization or business company, landscape orportrait. Intranets are helpful to converse planned initiativethat has an international reach all through the organization
The well known examples of transportation are chat, email,and blogs. A actual world example of Intranet is Nestle had anumber of food processing plants.
The most significant advantage of Intranet is Web publishingwhich permits burdensome corporate knowledge to becontinued and effortlessly access all through the companyusing Web technologies and hypermedia
F u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
9/35
Advantages Of The Intranet The familiar examples of web publishing consist of training,
news feed, company polices, documents, and employeemanual. Intranet can be accessed general internet standardssuch as CGI applications, Flash files, and Acrobat files. Each
unit can bring up to date the online copy of a document andintranet always provides the most recent version toemployees.
Intranet offering business operations and administrationsolutions because it also being used as a platform ofmounting and organizing applications across the internetworld.
F u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
10/35
Advantages Of The Intranet Time saving because there is no need to maintain physical
documents such as procedure manual, requisition forms, andinternet phone list.
Now intranet facilitates their user o view and gets
information and data via web browser. Intranet also save themoney of any organization on printing, publishing and overallmaintenance
Intranet offer improve teamwork through which teamwork isenabled and all certified users can get access to information.
Intranet providing cross platform capability for UNIX, Mac,Windows.
F u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
11/35
Advantages Of The Intranet Intranet offering their user to write applications on their
browser without cross-browser compatibility issues. Intranet is a Web-based tool that permits users to produce a
customized site according their requirements. You can pull all
Internet actions and most wanted contented into a singlepage which make easier to access
Security from outside users Relatively cheap to set up Quick access to information Easy and cheap to post information Increase in productivity F
u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
12/35
Disadvantages Of The Intranet Management does need to stop control of specific
information, this problem can be minimized but withappropriate prudence.
The other disadvantage of Intranet is security issue Intranet gathered everything in one location which is
really good but if it is not prearranged then you will spoileverything.
The cost of intranet is very high but has lots ofadvantages after implementing
This becomes a complex and expensive task F u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
13/35
-
8/12/2019 CS 75 01 Intranet Administration
14/35
Types Of Intranet Bulletin Board Database Management Information Access
Some experts have taken a lead and categorised intranetinto four different types The communications The integrating The catalogue The single sign-on
F u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
15/35
Software And Hardware RequirementFor An Intranet
you first have to build a network This usually requires a server, web server software such as Apache
or Microsoft IIS and either wifi connections and cards or Ethernetcables and a NIC
F u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
16/35
Software And Hardware RequirementFor An Intranet
Client management function - The client management functiongives the administrator can control the intranet, such as addingusers, removing users and keeping the intranet running smoothly
Employee directory - One of the most used features of any intranetis the employee directory, many employees are always looking forcontact info, whether it is a phone number, email address, fax, titleand some can even include an organizational chart
Project Management - A great time saver is the ability for manypeople within an organization to collaborate on a project whether itis as basic as a mission statement or as complex as a budget
Document share - Your organization will want to make availablecertain information for its members when they need it. This canmean important documents such as reports or other types ofdocuments such as health benefit materials F
u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
17/35
Software And Hardware RequirementFor An Intranet
Shared Calendar - A great feature to have if you work within a workgroup or small organization is to know others schedules so that youcan collaborate or know project time lines
Company news - One of the ways that the organization cancommunicate with it's members is with company news
Discussion Forums - These forums are a great way to brainstormideas for upcoming projects or to figure out scheduling issues
Chat and video web conferencing - Since your intranet will havesimilar features as the normal Internet; you can easily incorporate
chat and video web conferencing
F u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
18/35
Application Areas
Education Sector Universities, Colleges &Institutes
Industry Sector Small/Large Mfg. and automation
and control Service sector Hotels, tourism, Travel,
Transportation, communication Research & Development Laboratories,
Organisations & space Govt. sector Ministries, Departments, states and
Law & order F u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
19/35
-
8/12/2019 CS 75 01 Intranet Administration
20/35
Application Areas
General administration and management Departmental budgets, FAQs, Employee attendance, intercom
any chatting, internal postings, employee orientation, onlinecollaboration projects, org. charts, security policies, trendgraphs and equipment checklists
Training Employee proficiency training, training materials and video
training Coordination and control
Form routing, forms library and help desk submission forms Meetings related
Meeting minutes/schedules, online meeting, meeting roomschedules F
u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
21/35
Future of The Intranet
Coordination, Cooperation and Collaboration More. More content about people rather than just business artifacts (another
way to look at it is that people become recognized as businessartifacts!)
More non-curated end-user-generated content More metadata (much of it through explicit tagging) More feedback for authors of sites and content (ratings, thumbs, etc.) More open (sharing more internal content with those outside the
firewall) More storage and bandwidth needed (due to exponential content
growth, video, archived conference calls, and voice mail) More form factors (access from home PC, iPad, iPhone, and BlackBerry,
and whatever the Next Big Thing is) F u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
22/35
Key Intranet terms
F u n
d a m
e n t s o f
I n t r a n e t Applets Home Page Intranet
Bits, Bitmap Hot Links Search Engine
Bookmark HTML Server
Browser HTTP / HTTPS Surfing
Counter Icon T-1
Cyberspace ISDN TCP/IP
FAQ Java URL
Firewall JPEG Web or Net
Frame LDAP Web Page
FTP Network Web server
GIF Internet Webmaster
-
8/12/2019 CS 75 01 Intranet Administration
23/35
-
8/12/2019 CS 75 01 Intranet Administration
24/35
Security Concerns Understanding the security vulnerabilities in an organization Identifying the threats that face your organization; Assessing the risk of each threat Identifying appropriate steps to reduce risk to an acceptable
level Verifying that the system meets the security benchmark
appropriate for a particular organization. Persons who can find access to the intranet can be put into
three categories Those who can enter the site Those who can access the various secured areas Those who can update the sites contents F
u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
25/35
Threats - Internal Disable the accounts of employees upon their notification of
termination. Do not wait until their termination date. In thiscase, the logic bomb had been planted before the employeewas actually terminated, but after he knew termination wasimminent
Reinitialize security for systems that were under the terminatedemployees control. Continuously monitor these systems forsecurity violations, such as back doors that are left open.Terminated employees often use these as reentry points.
Install and run antivirus software on each computer on theintranet
Back up systems, applications, and data; deploy off-site storagefor archival backups F
u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
26/35
Threats - Internal In 1996, a disgruntled Information Systems employee of a U.S. manufacturer of
measurement and control instruments planted a logic bomb on a company LAN.The bomb detonated ten days after the man had been terminated, wiping out thecompanys research, development, and production software, including its backup systems.The company estimated the cost to recover the damage at $12 million (over the severalyears that would be required to redevelop the software).The employee had been notified that he was to be terminated, but his network accountshad not been disabled until his termination date. He had ample time to plant the bombbefore leaving the company. Had he wanted to do so, he could have opened a back doorto the systems he used, which would have allowed him to commit further damaging acts.This incident shows the need for creating and enforcing realistic security practices,in order to combat internal threats to assets. There is no way to guarantee that employeeswill not commit destructive acts. However, some policies and practices that could havehelped minimize the risk of incurring damages (such as those just cited) include disablingemployee access before termination, running antivirus software on each computer on thenetwork, and monitoring the network to detect intrusive traffic. Because the employee, inthis case, had root privileges to the systems on the network, the Information Technologyteam should have locked down all the systems he administered. F
u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
27/35
Threats - External Intranets use Internet technologies, such as e-mail and Hypertext
Transfer Protocol (HTTP), in order to provide corporate resources toemployees. Because these technologies are based on the TCP/IP suiteof protocols, intranets give employees easy access to corporateinformation resources via the Internet, from wherever they might
happen to be: at home, on a business partners site, or in a distantcity.
One result of this access is that employees send identification andauthentication data as well as other sensitive business informationover public networks, as they take care of business from remote
locations. When the logon and authentication communication is notsecured by encryption, amateur programmers working outside thecorporation can intercept and use this sensitive information againstthe company intranet. F
u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
28/35
Security Solutions The open house The owner The garden party The paying guest The Fort Hardware/Software Information Certification Firewalls
Packet Filter firewalls Proxy servers
Application level gateways Circuit level gateways Stateful Multi-Layer Inspection (SMLI) F
u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
29/35
Security Solutions Encryption / decryption Methods
Public Key Infrastructure (PKI) Solutions Web server security through SSL (Secure Socket Layer) Virtual Private Network (VPN)
Security Policy Identification of
The content, and needs to be secured
User groups or categories
F u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
30/35
-
8/12/2019 CS 75 01 Intranet Administration
31/35
Security Solutions Network service access policy Firewall design policy Consider three characteristics concerning the
classification of important data Confidentiality Integrity Availability
Multiple layers of internet security SOCKS
F u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
32/35
Advice from Security Experts International hacking helps in maintaining better
security Good resources Qualifications of security professionals Firewall configuration makes all the difference Lot of care required while programming
Security risks present on the networks Routine security audits are essential
F u n
d a m
e n t s o f
I n t r a n e t
-
8/12/2019 CS 75 01 Intranet Administration
33/35
-
8/12/2019 CS 75 01 Intranet Administration
34/35
-
8/12/2019 CS 75 01 Intranet Administration
35/35
6/23/2014 35