2. INTERNET MONITORING
INTERNET MONITORING SYSTEM IS
YET TO USE WITH VIRTUALLY NO
ADMINISTRATOR OVERHEAD.
INTERNET MONITORING SYS ONLY
REQ PLUGGING AND FILTTERING
APPLIANCE INTO THE INFRA
STRUCTURE CONFIGURING USER
PROFILE
4. INTERNET MISUSE
ACCORDING TO IDC RESEARCH 30% TO
40% OF INTERNET USE IN THE WORK
PLACE IS NOT RELATED TO BUSINESS.
SECURITY THREATS WHEN HAKERS OR
HARMFUL APPLETS ENTER THE
CORPORATED NETWORKS.
5. • Peer-to-Peer (P2P)
– New concept between
file sharing and transferring
– Generates high
volume of traffic
Structure of Applications
Structures of applications are changing!
Client-Server
Traditional structure
client
server
peer discovery, content,
transfer query
peer
peer
6. ADVANTAGE
INTERNET IS MORE USEFUL FOR
GETTING INFORMATION TO ALL
LEVEL.
INCREASE SECURITY AND BETTER
RISK MANAGEMENT.
ORGANIGATIONAL AND PERSONAL
ACCOUNTABILITY
7. DISADVANTAGE
IF THE EMPLOYEES ARE MISUSE
THE INTERNET THEN THEY REDUSE
THE PRODUCTIVITY
FINANCIAL COST OF INTERNET IS
VERY HIGH.
UNWANTED ACCESS OF INTERNET
INCREASE THE CRIME ACTIVITY.
8. CONCLUSTION
INTERNET MONITORING IN A WORK
STATION IS AN IMPORTANT
CONSIDERATION FOR ANY ENTERPRISES.
INTERNET MONITORING IS ONLY
DEVELOPED FOR THE BUSINESS
PURPOSE.