SlideShare a Scribd company logo
1 of 6
Download to read offline
Using an Intranet Wihin a Company
    FireWALL
●

    Intranet
●

    Mail system in intranet
●

    The benefit of Intranet
●
FireWALL
    Firewall can prevent from Attacking from other
●

    computer .
    Firewal is almost software but sometime embedded
●

    in hardware
Intranet
    Intranet is a network that is separated from other
●

    network .
    It is using in company,or school.
●
Mail system in intranet
    Mail system in Intranet is using only in Intranet.
●

    It works like normal Internet mail system.
●
Week13
Week13

More Related Content

What's hot

4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
hazirma
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
hazirma
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
chrispaul8676
 

What's hot (20)

System failure
System  failureSystem  failure
System failure
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
Wireless Security, Firewall,Encryption
Wireless Security, Firewall,EncryptionWireless Security, Firewall,Encryption
Wireless Security, Firewall,Encryption
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecure
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Network Security
Network SecurityNetwork Security
Network Security
 
Ericom Shield datasheet
Ericom Shield datasheetEricom Shield datasheet
Ericom Shield datasheet
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
iTwin Technology
iTwin TechnologyiTwin Technology
iTwin Technology
 
Network security
Network securityNetwork security
Network security
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
internet security
internet securityinternet security
internet security
 
Windows network security
Windows network securityWindows network security
Windows network security
 

Viewers also liked

Ct & Port Cranes Psa 22jan07
Ct & Port Cranes Psa 22jan07Ct & Port Cranes Psa 22jan07
Ct & Port Cranes Psa 22jan07
krishnan.R
 
Happy Mother’s Day!
Happy Mother’s Day!Happy Mother’s Day!
Happy Mother’s Day!
cmorel20
 
Strategy of Hard Work
Strategy of Hard WorkStrategy of Hard Work
Strategy of Hard Work
neha17
 
関西ライフハック研究会×アイデアプラント
関西ライフハック研究会×アイデアプラント関西ライフハック研究会×アイデアプラント
関西ライフハック研究会×アイデアプラント
Rikie Ishii
 
Le Graal Des Communautés
Le Graal Des CommunautésLe Graal Des Communautés
Le Graal Des Communautés
Yann Leroux
 

Viewers also liked (20)

Firewall
FirewallFirewall
Firewall
 
Ct & Port Cranes Psa 22jan07
Ct & Port Cranes Psa 22jan07Ct & Port Cranes Psa 22jan07
Ct & Port Cranes Psa 22jan07
 
Aturankatabenda
AturankatabendaAturankatabenda
Aturankatabenda
 
Primary Sources
Primary SourcesPrimary Sources
Primary Sources
 
Deploying Rails on EC2 using Rubber (Slides and Notes)
Deploying Rails on EC2 using Rubber (Slides and Notes)Deploying Rails on EC2 using Rubber (Slides and Notes)
Deploying Rails on EC2 using Rubber (Slides and Notes)
 
Design Logo
Design  LogoDesign  Logo
Design Logo
 
Prew13
Prew13Prew13
Prew13
 
Web2.0 Ecosystem
Web2.0 EcosystemWeb2.0 Ecosystem
Web2.0 Ecosystem
 
Happy Mother’s Day!
Happy Mother’s Day!Happy Mother’s Day!
Happy Mother’s Day!
 
UIMP: Aplicaciones de AmI en Telefónica I+D
UIMP: Aplicaciones de AmI en Telefónica I+DUIMP: Aplicaciones de AmI en Telefónica I+D
UIMP: Aplicaciones de AmI en Telefónica I+D
 
Presentationpempek
PresentationpempekPresentationpempek
Presentationpempek
 
Strategy of Hard Work
Strategy of Hard WorkStrategy of Hard Work
Strategy of Hard Work
 
FOTOS CON HUMOR
FOTOS CON HUMORFOTOS CON HUMOR
FOTOS CON HUMOR
 
関西ライフハック研究会×アイデアプラント
関西ライフハック研究会×アイデアプラント関西ライフハック研究会×アイデアプラント
関西ライフハック研究会×アイデアプラント
 
Le Graal Des Communautés
Le Graal Des CommunautésLe Graal Des Communautés
Le Graal Des Communautés
 
La Bella Italia
La Bella ItaliaLa Bella Italia
La Bella Italia
 
July09
July09July09
July09
 
Redes sociales virtuales
Redes sociales virtualesRedes sociales virtuales
Redes sociales virtuales
 
Records De Ingenieria
Records De IngenieriaRecords De Ingenieria
Records De Ingenieria
 
Pietra
PietraPietra
Pietra
 

Similar to Week13 (20)

week13
week13week13
week13
 
Presentation Week13
Presentation Week13Presentation Week13
Presentation Week13
 
eng_hw
eng_hweng_hw
eng_hw
 
Week13
Week13Week13
Week13
 
Week13_Web_Presentation
Week13_Web_PresentationWeek13_Web_Presentation
Week13_Web_Presentation
 
Week13
Week13Week13
Week13
 
Week13presentation
Week13presentationWeek13presentation
Week13presentation
 
Week13
Week13Week13
Week13
 
week13-EP3
week13-EP3week13-EP3
week13-EP3
 
English Week13
English Week13English Week13
English Week13
 
Week13
Week13Week13
Week13
 
bcomclasscond.pptx
bcomclasscond.pptxbcomclasscond.pptx
bcomclasscond.pptx
 
SW3 Presentation13
SW3 Presentation13SW3 Presentation13
SW3 Presentation13
 
Windows_Intune.pptx
Windows_Intune.pptxWindows_Intune.pptx
Windows_Intune.pptx
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
14 572
14 57214 572
14 572
 
Firewall
FirewallFirewall
Firewall
 
firewall.pdf
firewall.pdffirewall.pdf
firewall.pdf
 
Firewall
FirewallFirewall
Firewall
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 

Recently uploaded (20)

Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 

Week13

  • 1. Using an Intranet Wihin a Company FireWALL ● Intranet ● Mail system in intranet ● The benefit of Intranet ●
  • 2. FireWALL Firewall can prevent from Attacking from other ● computer . Firewal is almost software but sometime embedded ● in hardware
  • 3. Intranet Intranet is a network that is separated from other ● network . It is using in company,or school. ●
  • 4. Mail system in intranet Mail system in Intranet is using only in Intranet. ● It works like normal Internet mail system. ●