SlideShare a Scribd company logo
1 of 5
Download to read offline
Using an Intranet Within
      a Company

        Intranet
        Firewall
        Router
Intranet
  An intranet is a private computer network that
 uses Internet protocols and network connectivity
     to securely share part of an organization's
   information or operations with its employees.
    For instance, software and hardware for the
Internet widely widespread can be used as it is by
 constructing the in-house informational common
   system by using the communication protocol
            widespread by the Internet.
 Moreover, to use the standardized technology, it
    becomes easy to enhance to the extranet in
       cooperation with the other companies.
Firewall
 System that prevents it from invading computer
     network in organization from the outside.
    Moreover, it is computational which such a
  system was built in. The data that flows in the
 boundary with the outside so that the third party
 might not invade through an external network of
   the Internet etc. , and stealing a glance, the
falsification, and the destruction, etc. of data and
  the program be done is observed, and in the
network such as the enterprises, an illegal access
                     should be
            detected and be intercepted.
Router
A router is a computer whose software and
hardware are usually tailored to the tasks of

routing and forwarding information.

                 A part of business large-scale
                 router.
                 A thin cable that has expanded
                 yellow is an optical fiber for ten
                 Gigabit Ethernet.
References



         wikipedia
http://ja.wikipedia.org/

         Yahoo!
http://www.yahoo.co.jp/

More Related Content

What's hot

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
SW3 Presentation13
SW3 Presentation13SW3 Presentation13
SW3 Presentation13guest21076f
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network securityVikram Khanna
 
Using an Intranet Within a Company
Using an Intranet Within a CompanyUsing an Intranet Within a Company
Using an Intranet Within a Companys1120037
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
Document Security
Document SecurityDocument Security
Document SecurityTim O'Leary
 
FOUR BEST PRACTICES TO IMPROVE DOC SECURITY
FOUR BEST PRACTICES TO IMPROVE DOC SECURITYFOUR BEST PRACTICES TO IMPROVE DOC SECURITY
FOUR BEST PRACTICES TO IMPROVE DOC SECURITYTim O'Leary
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and FirewallShafeeqaFarsana
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Communication devices
Communication devicesCommunication devices
Communication devicesFazailAhmad2
 
Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security pptSAIKAT BISWAS
 

What's hot (20)

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
SW3 Presentation13
SW3 Presentation13SW3 Presentation13
SW3 Presentation13
 
Network security
Network securityNetwork security
Network security
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Using an Intranet Within a Company
Using an Intranet Within a CompanyUsing an Intranet Within a Company
Using an Intranet Within a Company
 
Network security
Network securityNetwork security
Network security
 
Network Security
Network Security Network Security
Network Security
 
Document Security
Document SecurityDocument Security
Document Security
 
FOUR BEST PRACTICES TO IMPROVE DOC SECURITY
FOUR BEST PRACTICES TO IMPROVE DOC SECURITYFOUR BEST PRACTICES TO IMPROVE DOC SECURITY
FOUR BEST PRACTICES TO IMPROVE DOC SECURITY
 
2 1 lan
2 1 lan2 1 lan
2 1 lan
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Communication devices
Communication devicesCommunication devices
Communication devices
 
Computing safety
Computing safetyComputing safety
Computing safety
 
w13presen
w13presenw13presen
w13presen
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 

Similar to W13poster

Internet_Interanet_Extranet
Internet_Interanet_ExtranetInternet_Interanet_Extranet
Internet_Interanet_Extranetvikashchauhan908
 
Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet AyushJadon5
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranetNadeem Khazi
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)Amare Kassa
 
WT INTERNET OVERVIEW
WT INTERNET OVERVIEWWT INTERNET OVERVIEW
WT INTERNET OVERVIEWMohan186867
 
Internet intranet extranet aaa
Internet intranet extranet aaaInternet intranet extranet aaa
Internet intranet extranet aaaDhani Ahmad
 
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptxCHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptxFame22
 
Distributed systems
Distributed systemsDistributed systems
Distributed systemssree kanth
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.pptDizzi1
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 

Similar to W13poster (20)

Internet_Interanet_Extranet
Internet_Interanet_ExtranetInternet_Interanet_Extranet
Internet_Interanet_Extranet
 
Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
Chapter 03 pertemuan 4- donpas- concept and management
Chapter 03  pertemuan 4- donpas- concept and managementChapter 03  pertemuan 4- donpas- concept and management
Chapter 03 pertemuan 4- donpas- concept and management
 
internet intranet and extranet
internet intranet and extranetinternet intranet and extranet
internet intranet and extranet
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranet
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
WT INTERNET OVERVIEW
WT INTERNET OVERVIEWWT INTERNET OVERVIEW
WT INTERNET OVERVIEW
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
Internet intranet extranet aaa
Internet intranet extranet aaaInternet intranet extranet aaa
Internet intranet extranet aaa
 
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptxCHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt
 
محمد
محمدمحمد
محمد
 
Internet
InternetInternet
Internet
 
Group G
Group GGroup G
Group G
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

W13poster

  • 1. Using an Intranet Within a Company Intranet Firewall Router
  • 2. Intranet An intranet is a private computer network that uses Internet protocols and network connectivity to securely share part of an organization's information or operations with its employees. For instance, software and hardware for the Internet widely widespread can be used as it is by constructing the in-house informational common system by using the communication protocol widespread by the Internet. Moreover, to use the standardized technology, it becomes easy to enhance to the extranet in cooperation with the other companies.
  • 3. Firewall System that prevents it from invading computer network in organization from the outside. Moreover, it is computational which such a system was built in. The data that flows in the boundary with the outside so that the third party might not invade through an external network of the Internet etc. , and stealing a glance, the falsification, and the destruction, etc. of data and the program be done is observed, and in the network such as the enterprises, an illegal access should be detected and be intercepted.
  • 4. Router A router is a computer whose software and hardware are usually tailored to the tasks of routing and forwarding information. A part of business large-scale router. A thin cable that has expanded yellow is an optical fiber for ten Gigabit Ethernet.
  • 5. References wikipedia http://ja.wikipedia.org/ Yahoo! http://www.yahoo.co.jp/