SlideShare a Scribd company logo
1 of 23
COMPUTER MANAGEMENT
ASSIGNMENT
NAME : AYUSH JADON
PROGRAMME : BBA
SEMESTER : 1ST
SECTION : A
COURSECODE : CSE101
INTRODUCTION TO
INTERNET , INTRANET
AND EXTRANET, MYTHS
ABOUT THE INTERNET.
INTERNET
WHAT IS INTERNET ?
 It is a Global network of computers,
(servers or clients).
to exchange information .
 It is a “network of computer” that includes millions of
private and public, academic, business, and government
networks (local or global),
linked by copper wires, wireless connections, and other
technologies.
Hardware and software of internet
Variety of Hardware and Software are used
to make internet functional.
MODEM
Device that enables computers to
communicate through phone lines.
When we start internet the our modem
communicates to modem of ISP.
 COMPUTER
In addition to a modem, you need a client capable of handling
multiple data types.
 SOFTWARE
Two types of software’s required to enable your PC as an
internet PC .
 Communication software to establish connection
 Client software for browsing, e-mail , news
these software’s are provided with windows itself.
Applications of internet
 Download programs and files
 E-mail
 Voice and video conferencing
 E- commerce
 File sharing
 Information browsing
 Search the web addresses for access through search engine
 Chatting and many more….
Disadvantages of internet
 Theft of personal information such as name, address, credit card
number etc.
 Virus threats nothing but a program which disrupts the normal
functioning of your system.
 Spamming refers to receiving unwanted e-mails in bulk, which provide
no purpose and needlessly obstruct the entire system.
 Pornography this is perhaps the biggest threat related to children’s
healthy mental life. A very serious issue concerning the internet.
Through, internet can also create havoc , destruction and its misuse can
be very fatal.
The advantages of it outweigh its disadvantages..
INTRANET
What is intranet ?
 Internal company network that uses internet
standards (HTML , HTTP & TCPIP protocols )
& software.
 Accessed only by authorized persons,
especially members or employees of the
organization
INTRANET SECURITY
Two levels of security required:
INTERNAL
It can be imposed by public key security &
encryption key.
EXTERNAL
Through Firewall.
What is firewall ?
 Security device located between firm’s internal network
(intranet)& external network (internet).
 Regulates access into & out of a company’s network based
on a set of rules.
NOTE : needs to be upgraded from time to time to check
latest potential security problems.
Applications of intranet
 Sharing of company policies rules and regulations.
 Access employee database
 Distribution of circulars office orders
 Access product & customer data
 Sharing of information of common interest
 Launching of personal departmetal home pages
 Submission of repots
 Corporate telephone director
Management problem
Security problem
Productivity problem
 A company may not have person to update
their intranet on a routine basis .
 Fear of sharing information and the loss
control.
 Limited bandwidth for the business.
 Unauthorized access
 Abuse of access
 Denial of service
 Information overload lowers productivity
 True purpose of the intranet is unknown to
many employeesdepartments
 Hidden or unknown complexity and costs
EXTRANET
WHAT IS EXTRANET ?
 Extranet is an intranet for outside authorized users
using same internet technology.
 Inter-organizational information system.
 Enable outsiders to work together with company’s
employees.
 Open to selected suppliers, customers & other
business partners.
examples
 Dealers/distributors have access to product
files such as :-
1. Product specification ,
2. Pictures,
3. Images, etc...
To answer the queries of the customer .
Components of extranets..
Some basis infrastructure components such as the
internet including:-
 TCP/IP protocols,
 E-mail,
 Web browsers,
 External business partners &
 Tele-commuting employees place order, check status
& send E-mail.
Benefits of extranet
 Improved quality.
 Lower level costs.
 Lower administrative & other overhead costs.
 Reduction in paperwork.
 Delivery of accurate information on time.
 Improved customer service.
 Better communication.
 Overall improvement in business effectiveness.
Disadvantages
 The suppliers & customer who don’t have technical
knowledge feel problem.
 Faceless contact.
 Information can be misused by other competitors.
 Fraud may be possible.
 Technical Employees are required.
Layered system view
E
INTRANET
EXTRANET
INTERNET
CORPORATE MEMBERS
CLIENTS,PARTNERS,CUSTOME
RS
GLOBAL SOCIETY:COMPETITORS
Myths about internet
 Your move in being tracked by your ISP
 Everything on the internet is true
 Security programs are not required for safe location on the internet
 Complex and strong passwords are best for suffering the internet
 Internet security is an expensive deal
THANKYOU

More Related Content

What's hot (20)

Byod
ByodByod
Byod
 
Resume (2)
Resume (2)Resume (2)
Resume (2)
 
Data Protection, Humans and Common Sense
Data Protection, Humans and Common SenseData Protection, Humans and Common Sense
Data Protection, Humans and Common Sense
 
Mark CV
Mark CVMark CV
Mark CV
 
I.T Administrator
I.T AdministratorI.T Administrator
I.T Administrator
 
Resume_Terrence
Resume_TerrenceResume_Terrence
Resume_Terrence
 
Over view of internet computer studies lesson
Over view of internet  computer studies lessonOver view of internet  computer studies lesson
Over view of internet computer studies lesson
 
CV
CV CV
CV
 
Chapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual PropertyChapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual Property
 
Proxy
ProxyProxy
Proxy
 
Akshita
AkshitaAkshita
Akshita
 
La3 Intranet
La3 IntranetLa3 Intranet
La3 Intranet
 
Muhanned ahmed-cv
Muhanned ahmed-cvMuhanned ahmed-cv
Muhanned ahmed-cv
 
My_CV(2)
My_CV(2)My_CV(2)
My_CV(2)
 
MY CV
MY CVMY CV
MY CV
 
M M Rabea 2
M M Rabea 2M M Rabea 2
M M Rabea 2
 
SALMANB
SALMANBSALMANB
SALMANB
 
Presen15
Presen15Presen15
Presen15
 
C.V
C.VC.V
C.V
 
Paul.J.Garcia_ResumeNew
Paul.J.Garcia_ResumeNewPaul.J.Garcia_ResumeNew
Paul.J.Garcia_ResumeNew
 

Similar to Introduction to internet, intranet and Extranet . Myths about internet

202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.pptDizzi1
 
Intranet and Extranet ppt.pptx
Intranet and Extranet ppt.pptxIntranet and Extranet ppt.pptx
Intranet and Extranet ppt.pptxAnshikaGoel42
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranetNadeem Khazi
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...adeel hamid
 
Internet intranet extranet aaa
Internet intranet extranet aaaInternet intranet extranet aaa
Internet intranet extranet aaaDhani Ahmad
 
Cois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icCois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icRexon Calub
 
IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3Rexon Calub
 
Intranet Presentation
Intranet PresentationIntranet Presentation
Intranet Presentationrenaglasser
 
Internetintranetandextranet..
Internetintranetandextranet..Internetintranetandextranet..
Internetintranetandextranet..Paulo Sambo
 

Similar to Introduction to internet, intranet and Extranet . Myths about internet (20)

internet intranet and extranet
internet intranet and extranetinternet intranet and extranet
internet intranet and extranet
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt
 
Intranet and Extranet ppt.pptx
Intranet and Extranet ppt.pptxIntranet and Extranet ppt.pptx
Intranet and Extranet ppt.pptx
 
Intranet And extranet.pptx
Intranet And extranet.pptxIntranet And extranet.pptx
Intranet And extranet.pptx
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranet
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...
 
E-Commerce 07
E-Commerce 07E-Commerce 07
E-Commerce 07
 
Internet intranet extranet aaa
Internet intranet extranet aaaInternet intranet extranet aaa
Internet intranet extranet aaa
 
H1N1 & IT Continuity
H1N1 & IT ContinuityH1N1 & IT Continuity
H1N1 & IT Continuity
 
Cois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icCois20024 lec06 2002w_ic
Cois20024 lec06 2002w_ic
 
IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3
 
Protocol & Type of Networks
Protocol & Type of NetworksProtocol & Type of Networks
Protocol & Type of Networks
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
Technology
TechnologyTechnology
Technology
 
Ecommerce Chap 07
Ecommerce Chap 07Ecommerce Chap 07
Ecommerce Chap 07
 
Intranet Presentation
Intranet PresentationIntranet Presentation
Intranet Presentation
 
Networking
NetworkingNetworking
Networking
 
Internetintranetandextranet..
Internetintranetandextranet..Internetintranetandextranet..
Internetintranetandextranet..
 
Beekman5 std ppt_11
Beekman5 std ppt_11Beekman5 std ppt_11
Beekman5 std ppt_11
 
Services and Products
Services and ProductsServices and Products
Services and Products
 

Recently uploaded

ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 

Recently uploaded (20)

ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 

Introduction to internet, intranet and Extranet . Myths about internet

  • 1. COMPUTER MANAGEMENT ASSIGNMENT NAME : AYUSH JADON PROGRAMME : BBA SEMESTER : 1ST SECTION : A COURSECODE : CSE101
  • 2. INTRODUCTION TO INTERNET , INTRANET AND EXTRANET, MYTHS ABOUT THE INTERNET.
  • 4. WHAT IS INTERNET ?  It is a Global network of computers, (servers or clients). to exchange information .  It is a “network of computer” that includes millions of private and public, academic, business, and government networks (local or global), linked by copper wires, wireless connections, and other technologies.
  • 5. Hardware and software of internet Variety of Hardware and Software are used to make internet functional. MODEM Device that enables computers to communicate through phone lines. When we start internet the our modem communicates to modem of ISP.
  • 6.  COMPUTER In addition to a modem, you need a client capable of handling multiple data types.  SOFTWARE Two types of software’s required to enable your PC as an internet PC .  Communication software to establish connection  Client software for browsing, e-mail , news these software’s are provided with windows itself.
  • 7. Applications of internet  Download programs and files  E-mail  Voice and video conferencing  E- commerce  File sharing  Information browsing  Search the web addresses for access through search engine  Chatting and many more….
  • 8. Disadvantages of internet  Theft of personal information such as name, address, credit card number etc.  Virus threats nothing but a program which disrupts the normal functioning of your system.  Spamming refers to receiving unwanted e-mails in bulk, which provide no purpose and needlessly obstruct the entire system.  Pornography this is perhaps the biggest threat related to children’s healthy mental life. A very serious issue concerning the internet. Through, internet can also create havoc , destruction and its misuse can be very fatal. The advantages of it outweigh its disadvantages..
  • 10. What is intranet ?  Internal company network that uses internet standards (HTML , HTTP & TCPIP protocols ) & software.  Accessed only by authorized persons, especially members or employees of the organization
  • 11. INTRANET SECURITY Two levels of security required: INTERNAL It can be imposed by public key security & encryption key. EXTERNAL Through Firewall.
  • 12. What is firewall ?  Security device located between firm’s internal network (intranet)& external network (internet).  Regulates access into & out of a company’s network based on a set of rules. NOTE : needs to be upgraded from time to time to check latest potential security problems.
  • 13. Applications of intranet  Sharing of company policies rules and regulations.  Access employee database  Distribution of circulars office orders  Access product & customer data  Sharing of information of common interest  Launching of personal departmetal home pages  Submission of repots  Corporate telephone director
  • 14. Management problem Security problem Productivity problem  A company may not have person to update their intranet on a routine basis .  Fear of sharing information and the loss control.  Limited bandwidth for the business.  Unauthorized access  Abuse of access  Denial of service  Information overload lowers productivity  True purpose of the intranet is unknown to many employeesdepartments  Hidden or unknown complexity and costs
  • 16. WHAT IS EXTRANET ?  Extranet is an intranet for outside authorized users using same internet technology.  Inter-organizational information system.  Enable outsiders to work together with company’s employees.  Open to selected suppliers, customers & other business partners.
  • 17. examples  Dealers/distributors have access to product files such as :- 1. Product specification , 2. Pictures, 3. Images, etc... To answer the queries of the customer .
  • 18. Components of extranets.. Some basis infrastructure components such as the internet including:-  TCP/IP protocols,  E-mail,  Web browsers,  External business partners &  Tele-commuting employees place order, check status & send E-mail.
  • 19. Benefits of extranet  Improved quality.  Lower level costs.  Lower administrative & other overhead costs.  Reduction in paperwork.  Delivery of accurate information on time.  Improved customer service.  Better communication.  Overall improvement in business effectiveness.
  • 20. Disadvantages  The suppliers & customer who don’t have technical knowledge feel problem.  Faceless contact.  Information can be misused by other competitors.  Fraud may be possible.  Technical Employees are required.
  • 21. Layered system view E INTRANET EXTRANET INTERNET CORPORATE MEMBERS CLIENTS,PARTNERS,CUSTOME RS GLOBAL SOCIETY:COMPETITORS
  • 22. Myths about internet  Your move in being tracked by your ISP  Everything on the internet is true  Security programs are not required for safe location on the internet  Complex and strong passwords are best for suffering the internet  Internet security is an expensive deal