SlideShare a Scribd company logo
1 of 6
Download to read offline
Intranet
                                   This is done via the
                                   Web, which sends
                                  requests through the
Using an intranet                     firewall to the
                                          internet.
makes it much
easier for a
                      Corporation
corporation to
work with other




                                     Electronic payment
businesses, such




                       invoices
as subcontractors.
The right figure
is the example.
                     Subcorporation
Sale system of
          Corporations.
Corporations can enable customers to
buy goods and services from them on
the internet by linking the
corporation's sales systems to the
Internet through the intranet.

                 Submit secure payments.
     uses encryption technology as a security measure.



                           Browse goos
                          public website
          Users    Catalogs on the corporation's   Corporations
Corporate Databases
Using corporate databases, important information are available over the
●



intranet via HTML and web-based search tools.
Search tools written by CGI script or Java.
●



That information can be used by only corporate employees.
●




                HTML                Corporate
              document              Database




                                              Search tools
Intranet and Groupware
Groupware enables employees to have online group working on the
●



intranet.
The intranet also enables to attend videoconferences that meetings by
●



people in different places.


                                                     Groupware

                                         Groupware
                                                     Brain storming sessions
                                                     Schedule group meetings
            Video conference                         Group documents, plans
                                                     Common databases
                                                     etc...


                                                     Groupware
Firewall
An internet is separated from the rest of the Internet by a firewall.

A firewall is a part of a computer system or network that is
designed to block unauthorized access while permitting
authorized communications.

There are several types of firewall techniques:
  1, Packet filter
  2, Application gateway
  3, Circuit-level gateway
  4, Proxy server
                                               source : http://en.wikipedia.org/
Internal email system
 This is a key component of an intranet and this system
                  uses any companies.

It can use normal Internet email clients, but it is designed
 to route traffic within an organization, so that email need
                not travel outside the Internet.

   Email from the intranet the travels to and from the
         Internet must go through the firewall.

More Related Content

What's hot

CHAP 3 - NETWORK, INTRANET & INTERNET
CHAP 3 - NETWORK, INTRANET & INTERNETCHAP 3 - NETWORK, INTRANET & INTERNET
CHAP 3 - NETWORK, INTRANET & INTERNETCikgu Johan Johari
 
Remote login based library services
Remote login based library servicesRemote login based library services
Remote login based library servicesDr Trivedi
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewIRJET Journal
 
Fasoo Secure Document for IBM FileNet
Fasoo Secure Document for IBM FileNetFasoo Secure Document for IBM FileNet
Fasoo Secure Document for IBM FileNetFasoo
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...IJwest
 
IRJET- A Survey on Cryptography, Encryption and Compression Techniques
IRJET- A Survey on Cryptography, Encryption and Compression TechniquesIRJET- A Survey on Cryptography, Encryption and Compression Techniques
IRJET- A Survey on Cryptography, Encryption and Compression TechniquesIRJET Journal
 
Threats of E-Commerce in Database
Threats of E-Commerce in DatabaseThreats of E-Commerce in Database
Threats of E-Commerce in DatabaseMentalist Akram
 
Ch12(revised 20071226)
Ch12(revised 20071226)Ch12(revised 20071226)
Ch12(revised 20071226)華穗 徐
 
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...IRJET Journal
 

What's hot (11)

CHAP 3 - NETWORK, INTRANET & INTERNET
CHAP 3 - NETWORK, INTRANET & INTERNETCHAP 3 - NETWORK, INTRANET & INTERNET
CHAP 3 - NETWORK, INTRANET & INTERNET
 
Remote login based library services
Remote login based library servicesRemote login based library services
Remote login based library services
 
Online DFS
Online DFSOnline DFS
Online DFS
 
Internet
InternetInternet
Internet
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
 
Fasoo Secure Document for IBM FileNet
Fasoo Secure Document for IBM FileNetFasoo Secure Document for IBM FileNet
Fasoo Secure Document for IBM FileNet
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...
 
IRJET- A Survey on Cryptography, Encryption and Compression Techniques
IRJET- A Survey on Cryptography, Encryption and Compression TechniquesIRJET- A Survey on Cryptography, Encryption and Compression Techniques
IRJET- A Survey on Cryptography, Encryption and Compression Techniques
 
Threats of E-Commerce in Database
Threats of E-Commerce in DatabaseThreats of E-Commerce in Database
Threats of E-Commerce in Database
 
Ch12(revised 20071226)
Ch12(revised 20071226)Ch12(revised 20071226)
Ch12(revised 20071226)
 
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
 

Viewers also liked

Loveisblind
LoveisblindLoveisblind
Loveisblinddj96
 
Ipr presentasi
Ipr presentasiIpr presentasi
Ipr presentasidj96
 
Housing complaints
Housing complaintsHousing complaints
Housing complaintsdj96
 
Whatifstudentsdon’tdohomework(word2003)
Whatifstudentsdon’tdohomework(word2003)Whatifstudentsdon’tdohomework(word2003)
Whatifstudentsdon’tdohomework(word2003)dj96
 
L’Origine Delle Differenze
L’Origine Delle DifferenzeL’Origine Delle Differenze
L’Origine Delle Differenzeguest46932fe
 
Loveisblind
LoveisblindLoveisblind
Loveisblinddj96
 
Housing complaints
Housing complaintsHousing complaints
Housing complaintsdj96
 
Loveisblind
LoveisblindLoveisblind
Loveisblinddj96
 
Ipr presentasi
Ipr presentasiIpr presentasi
Ipr presentasidj96
 
Whatifstudentsdon’tdohomework(word2003)
Whatifstudentsdon’tdohomework(word2003)Whatifstudentsdon’tdohomework(word2003)
Whatifstudentsdon’tdohomework(word2003)dj96
 
Housing complaints
Housing complaintsHousing complaints
Housing complaintsdj96
 
Legallyyours Voor Slideshare
Legallyyours Voor SlideshareLegallyyours Voor Slideshare
Legallyyours Voor SlideshareRik Vegter
 
2 loveisblind
2 loveisblind2 loveisblind
2 loveisblinddj96
 

Viewers also liked (18)

Loveisblind
LoveisblindLoveisblind
Loveisblind
 
Ipr presentasi
Ipr presentasiIpr presentasi
Ipr presentasi
 
Housing complaints
Housing complaintsHousing complaints
Housing complaints
 
Week12 Presentation
Week12 PresentationWeek12 Presentation
Week12 Presentation
 
Whatifstudentsdon’tdohomework(word2003)
Whatifstudentsdon’tdohomework(word2003)Whatifstudentsdon’tdohomework(word2003)
Whatifstudentsdon’tdohomework(word2003)
 
W11
W11W11
W11
 
L’Origine Delle Differenze
L’Origine Delle DifferenzeL’Origine Delle Differenze
L’Origine Delle Differenze
 
Loveisblind
LoveisblindLoveisblind
Loveisblind
 
Housing complaints
Housing complaintsHousing complaints
Housing complaints
 
Singa
SingaSinga
Singa
 
Loveisblind
LoveisblindLoveisblind
Loveisblind
 
Week14
Week14Week14
Week14
 
Ipr presentasi
Ipr presentasiIpr presentasi
Ipr presentasi
 
Whatifstudentsdon’tdohomework(word2003)
Whatifstudentsdon’tdohomework(word2003)Whatifstudentsdon’tdohomework(word2003)
Whatifstudentsdon’tdohomework(word2003)
 
Housing complaints
Housing complaintsHousing complaints
Housing complaints
 
Legallyyours Voor Slideshare
Legallyyours Voor SlideshareLegallyyours Voor Slideshare
Legallyyours Voor Slideshare
 
2 loveisblind
2 loveisblind2 loveisblind
2 loveisblind
 
Week10 Web Presentation
Week10 Web PresentationWeek10 Web Presentation
Week10 Web Presentation
 

Similar to Week13 (20)

Week13 Presentation
Week13 PresentationWeek13 Presentation
Week13 Presentation
 
Week13presentation
Week13presentationWeek13presentation
Week13presentation
 
week13
week13week13
week13
 
Presentation Week13
Presentation Week13Presentation Week13
Presentation Week13
 
Week13
Week13Week13
Week13
 
eng_hw
eng_hweng_hw
eng_hw
 
Week13
Week13Week13
Week13
 
Presen15
Presen15Presen15
Presen15
 
Week13_Web_Presentation
Week13_Web_PresentationWeek13_Web_Presentation
Week13_Web_Presentation
 
Internet_Interanet_Extranet
Internet_Interanet_ExtranetInternet_Interanet_Extranet
Internet_Interanet_Extranet
 
1150087w13 Intranet
1150087w13 Intranet1150087w13 Intranet
1150087w13 Intranet
 
Presentation 13all
Presentation 13allPresentation 13all
Presentation 13all
 
Intranet & Extranet
Intranet & ExtranetIntranet & Extranet
Intranet & Extranet
 
Intranets and Extranets
Intranets and Extranets Intranets and Extranets
Intranets and Extranets
 
Week13 F
Week13 FWeek13 F
Week13 F
 
week13-EP3
week13-EP3week13-EP3
week13-EP3
 
Presentation Week13
Presentation Week13Presentation Week13
Presentation Week13
 
Chp7 intranet
Chp7 intranetChp7 intranet
Chp7 intranet
 
SW3 Presentation13
SW3 Presentation13SW3 Presentation13
SW3 Presentation13
 
Intranet Presentation
Intranet PresentationIntranet Presentation
Intranet Presentation
 

Recently uploaded

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Week13

  • 1. Intranet This is done via the Web, which sends requests through the Using an intranet firewall to the internet. makes it much easier for a Corporation corporation to work with other Electronic payment businesses, such invoices as subcontractors. The right figure is the example. Subcorporation
  • 2. Sale system of Corporations. Corporations can enable customers to buy goods and services from them on the internet by linking the corporation's sales systems to the Internet through the intranet. Submit secure payments. uses encryption technology as a security measure. Browse goos public website Users Catalogs on the corporation's Corporations
  • 3. Corporate Databases Using corporate databases, important information are available over the ● intranet via HTML and web-based search tools. Search tools written by CGI script or Java. ● That information can be used by only corporate employees. ● HTML Corporate document Database Search tools
  • 4. Intranet and Groupware Groupware enables employees to have online group working on the ● intranet. The intranet also enables to attend videoconferences that meetings by ● people in different places. Groupware Groupware Brain storming sessions Schedule group meetings Video conference Group documents, plans Common databases etc... Groupware
  • 5. Firewall An internet is separated from the rest of the Internet by a firewall. A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. There are several types of firewall techniques: 1, Packet filter 2, Application gateway 3, Circuit-level gateway 4, Proxy server source : http://en.wikipedia.org/
  • 6. Internal email system This is a key component of an intranet and this system uses any companies. It can use normal Internet email clients, but it is designed to route traffic within an organization, so that email need not travel outside the Internet. Email from the intranet the travels to and from the Internet must go through the firewall.