SlideShare a Scribd company logo
Internet
The Internet is a worldwide, publicly
accessible network of interconnected
computer networks that transmit data using
the standard Internet Protocol (IP).
It is a "network of networks" that consists of
millions of smaller domestic, academic,
business, and government networks, which
together carry various information and
services, such as electronic mail, online chat,
file transfer, and the interlinked Web pages
and other documents of the World Wide Web.
Internet and the workplace
The Internet is allowing greater flexibility in
working hours and location, especially with the
spread of unmetered high-speed connections and
Web applications.
The mobile Internet
The Internet can now be accessed virtually
anywhere by numerous means. Mobile phones,
handheld game consoles and cellular routers allow
users to connect to the Internet from anywhere
E-mail
Concept of sending electronic text messages
between parties in a way analogous to mailing
letters or memos.
Remote access
The Internet allows computer users to connect to
other computers and information stores easily,
wherever they may be across the world.
Collaboration
The low cost and nearly instantaneous sharing of
ideas, knowledge, and skills has made
collaborative work dramatically easier.
File sharing
A computer file can be e-mailed to customers,
colleagues and friends as an attachment. It can be
uploaded to a Web site or FTP server for easy
download by others
Voice telephony (VoIP)
VoIP stands for Voice over IP, where IP refers to
the Internet Protocol that underlies all Internet
communication.
IP address
An IP address (Internet Protocol address) is a
unique address that certain electronic devices use
in order to identify and communicate with each
other on a computer network utilizing the
Internet Protocol standard (IP)
Any participating network device—including
routers, computers, printers, Internet fax
machines, and some telephones—can have their
own unique address.
Intranet
An intranet is a private computer
network that uses Internet protocols
, network connectivity to securely
share part of an organization's
information or operations with its
employees.
intranet can be understood as
"a private version of the Internet,"
or as a version of the Internet confined to an
organization
The term first appeared in print on April 19, 1995, in Digital
News & Review in an article authored by Technical Editor
Stephen Lawton [1]
.
Industry examples:
Ford Motor Co has more than 175,000
employees in 950 locations worldwide,
each of whom had access to the
company’s intranet. The intranet gave
employees information about benefits,
demographics, salary, history etc
The Australian National University uses an
Intranet called Claromentis to maintain one of
its external sites.
“The success of Cisco Systems has been
largely attributed to its innovative corporate
intranet”
North Korea controls access to the internet
among its people by using a country-wide
intranet called "Kwangmyong"
Advantages:
Workforce productivity: Intranets can help
users to locate and view information faster and
use applications relevant to their roles and
responsibilities.
Time: organizations can make more
information available to employees on a "pull"
basis (i.e: employees can link to relevant
information at a time which suits them)
Communication: Intranets can serve as powerful
tools for communication within an organization,
vertically and horizontally.
Business operations and management: Intranets are
also being used as a platform for developing and
deploying applications to support business
operations and decisions across the internetworked
enterprise.
Cost-effective: Users can view information and
data via web-browser rather than maintaining
physical documents such as procedure manuals,
internal phone list and requistion forms.
Promote common corporate culture: Every user is
viewing the same information within the Intranet.
Enhance Collaboration: With information easily
accessible by all authorized users, teamwork is
enabled.
Disadvantages
Inappropriate or incorrect information can be
posted on an intranet which can reduce its
credibility and effectiveness.
In a devolved and highly interactive intranet
there is freedom to post abusive and possibly
illegal materials.
Training is required to educate people of what
intranet can do.
Need expertise in field to administer and develop
Intranet information within the organization.
Security of the intranet becomes an issue. Other
users may post sensitive information which may
appear to another user.
As information can be posted by any user,
information overload may occur during the cause if
it is not controlled well.
Extranet
"Extranet" is generally restricted to
employees of the organization:
can be accessed by customers, suppliers, or
other approved parties
An extranet is a private network that uses
Internet protocols, network connectivity, and
possibly the public telecommunication system to
securely share part of an organization's information
or operations with suppliers, vendors, partners,
customers or other businesses.
An extranet can be viewed as part of a company's
Intranet that is extended to users outside the
company
Security
An extranet requires security and privacy. These
can include firewalls, server management, the
issuance and use of digital certificates or similar
means of user authentication, encryption of
messages, and the use of virtual private networks
(VPNs) that tunnel through the public network.
1. Disadvantages
Extranets can be expensive to implement and
maintain within an organization (e.g.:
hardware, software, employee training costs)
— if hosted internally instead of via an ASP
*.
*Application Service Provider
Security of extranets can be a big concern when
dealing with valuable information.
System access needs to be carefully controlled to
avoid sensitive information falling into the wrong
hands.
Extranets can reduce personal contact (face-to-
face meetings) with customers and business
partners.

More Related Content

What's hot

Internet
InternetInternet
Internet
mustha3
 
Information system
Information systemInformation system
Information system architecture
Information system architectureInformation system architecture
Information system architecture
Dr. Vardhan choubey
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information system
PROF.JITENDRA PATEL
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technology
actanimation
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranet
MohsinHusenManasiya
 
INFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESSINFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESS
METHODIST COLLEGE OF ENGG & TECH
 
Internet and intranet
Internet and intranetInternet and intranet
Internet and intranetRohit Kumar
 
Information System Development
Information System DevelopmentInformation System Development
Information System DevelopmentIamPe Khamkhum
 
Powerpoint presentation on internet and its uses
Powerpoint presentation on internet and its usesPowerpoint presentation on internet and its uses
Powerpoint presentation on internet and its usessumitsc
 
01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure
Muhammad Ahad
 
Communication protocol presentation
Communication protocol presentationCommunication protocol presentation
Communication protocol presentation
Gopi A
 
Common Network Services
Common Network ServicesCommon Network Services
Common Network Services
ŐŔaṉģ Zaib
 
It infrastructure
It infrastructureIt infrastructure
It infrastructure
Rashed Kamrul
 
PPT-Internet growth, IP, Anatomy.pptx
PPT-Internet growth, IP, Anatomy.pptxPPT-Internet growth, IP, Anatomy.pptx
PPT-Internet growth, IP, Anatomy.pptx
VijayaLakshmiPS3
 
An introduction to the Internet
An introduction to the InternetAn introduction to the Internet
An introduction to the Internet
MusTufa Nullwala
 
Introduction to Website Design and Development
Introduction to Website Design and DevelopmentIntroduction to Website Design and Development
Introduction to Website Design and Development
Nana Kofi Annan PhD
 
Enterprise application
Enterprise applicationEnterprise application
Enterprise application
ancientsoul90
 
The internet
The internetThe internet
The internet
6336Zeelvora
 

What's hot (20)

Internet
InternetInternet
Internet
 
Information system
Information systemInformation system
Information system
 
Information system architecture
Information system architectureInformation system architecture
Information system architecture
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information system
 
What is an intranet
What is an intranetWhat is an intranet
What is an intranet
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technology
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranet
 
INFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESSINFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESS
 
Internet and intranet
Internet and intranetInternet and intranet
Internet and intranet
 
Information System Development
Information System DevelopmentInformation System Development
Information System Development
 
Powerpoint presentation on internet and its uses
Powerpoint presentation on internet and its usesPowerpoint presentation on internet and its uses
Powerpoint presentation on internet and its uses
 
01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure
 
Communication protocol presentation
Communication protocol presentationCommunication protocol presentation
Communication protocol presentation
 
Common Network Services
Common Network ServicesCommon Network Services
Common Network Services
 
It infrastructure
It infrastructureIt infrastructure
It infrastructure
 
PPT-Internet growth, IP, Anatomy.pptx
PPT-Internet growth, IP, Anatomy.pptxPPT-Internet growth, IP, Anatomy.pptx
PPT-Internet growth, IP, Anatomy.pptx
 
An introduction to the Internet
An introduction to the InternetAn introduction to the Internet
An introduction to the Internet
 
Introduction to Website Design and Development
Introduction to Website Design and DevelopmentIntroduction to Website Design and Development
Introduction to Website Design and Development
 
Enterprise application
Enterprise applicationEnterprise application
Enterprise application
 
The internet
The internetThe internet
The internet
 

Viewers also liked

Planning Extranet Environments with SharePoint 2010
Planning Extranet Environments with SharePoint 2010Planning Extranet Environments with SharePoint 2010
Planning Extranet Environments with SharePoint 2010
Michael Noel
 
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
Michael Noel
 
How to create a secure efficient extranet user experience
How to create a secure efficient extranet user experienceHow to create a secure efficient extranet user experience
How to create a secure efficient extranet user experience
Jeremy Thake
 
internet, intranet, extranet y VOIP
internet, intranet, extranet y VOIP internet, intranet, extranet y VOIP
internet, intranet, extranet y VOIP
yanine miranda benavides
 
Airlines 2.0: Using technology for innovative branding through the recession
Airlines 2.0: Using technology for innovative branding through the recessionAirlines 2.0: Using technology for innovative branding through the recession
Airlines 2.0: Using technology for innovative branding through the recession
SimpliFlying
 
Unit 2
Unit 2Unit 2
How To Govern An Intranet
How To Govern An IntranetHow To Govern An Intranet
How To Govern An Intranet
Prescient Digital Media
 
Internet, intranet, extranet
Internet, intranet, extranetInternet, intranet, extranet
Internet, intranet, extranet
Pricila Yessayan
 
Social Media and Promoting your Crowdfunding Campaign
Social Media and Promoting your Crowdfunding CampaignSocial Media and Promoting your Crowdfunding Campaign
Social Media and Promoting your Crowdfunding Campaign
Patch of Land
 
The Social Intranet
The Social IntranetThe Social Intranet
The Social Intranet
Acando Consulting
 
GTM's Evolution Demo
GTM's Evolution DemoGTM's Evolution Demo
GTM's Evolution Demo
GTMmarketing
 
IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3Rexon Calub
 
IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2Rexon Calub
 
Cois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icCois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icRexon Calub
 
Chapter 7 - Desining CSCW applications
Chapter 7 - Desining CSCW applicationsChapter 7 - Desining CSCW applications
Chapter 7 - Desining CSCW applications
pichiliani
 
It in hr
It in hrIt in hr
It in hr
reachrubi27
 

Viewers also liked (18)

Planning Extranet Environments with SharePoint 2010
Planning Extranet Environments with SharePoint 2010Planning Extranet Environments with SharePoint 2010
Planning Extranet Environments with SharePoint 2010
 
Extranet..
Extranet..Extranet..
Extranet..
 
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
 
How to create a secure efficient extranet user experience
How to create a secure efficient extranet user experienceHow to create a secure efficient extranet user experience
How to create a secure efficient extranet user experience
 
internet, intranet, extranet y VOIP
internet, intranet, extranet y VOIP internet, intranet, extranet y VOIP
internet, intranet, extranet y VOIP
 
Airlines 2.0: Using technology for innovative branding through the recession
Airlines 2.0: Using technology for innovative branding through the recessionAirlines 2.0: Using technology for innovative branding through the recession
Airlines 2.0: Using technology for innovative branding through the recession
 
Unit 2
Unit 2Unit 2
Unit 2
 
How To Govern An Intranet
How To Govern An IntranetHow To Govern An Intranet
How To Govern An Intranet
 
Internet, intranet, extranet
Internet, intranet, extranetInternet, intranet, extranet
Internet, intranet, extranet
 
Social Media and Promoting your Crowdfunding Campaign
Social Media and Promoting your Crowdfunding CampaignSocial Media and Promoting your Crowdfunding Campaign
Social Media and Promoting your Crowdfunding Campaign
 
The Social Intranet
The Social IntranetThe Social Intranet
The Social Intranet
 
Ch07 the internet intranets and extranets
Ch07 the internet  intranets and extranetsCh07 the internet  intranets and extranets
Ch07 the internet intranets and extranets
 
GTM's Evolution Demo
GTM's Evolution DemoGTM's Evolution Demo
GTM's Evolution Demo
 
IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3
 
IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2
 
Cois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icCois20024 lec06 2002w_ic
Cois20024 lec06 2002w_ic
 
Chapter 7 - Desining CSCW applications
Chapter 7 - Desining CSCW applicationsChapter 7 - Desining CSCW applications
Chapter 7 - Desining CSCW applications
 
It in hr
It in hrIt in hr
It in hr
 

Similar to Internet intranet extranet aaa

Internetintranetandextranet..
Internetintranetandextranet..Internetintranetandextranet..
Internetintranetandextranet..
Paulo Sambo
 
Internet
InternetInternet
Internet
Vasu Dev
 
Over view of internet computer studies lesson
Over view of internet  computer studies lessonOver view of internet  computer studies lesson
Over view of internet computer studies lesson
Mukalele Rogers
 
Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet
AyushJadon5
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranetNadeem Khazi
 
Internet
InternetInternet
Internet
mohitrajpanday1
 
Networking
NetworkingNetworking
Networking
kameeradissanayake
 
Cibm workshop2 chapter nine
Cibm  workshop2 chapter nineCibm  workshop2 chapter nine
Cibm workshop2 chapter nineShaheen Khan
 
Internet2007
Internet2007Internet2007
Internet2007
marianavigato0
 
Internetnuovo1
Internetnuovo1Internetnuovo1
Internetnuovo1
mariagabrielladistasi
 
Internet
InternetInternet
Internet
marianavigato0
 
Internet
InternetInternet
Internet
marianavigato0
 
What is a Computer Network.pdf
What is a Computer Network.pdfWhat is a Computer Network.pdf
What is a Computer Network.pdf
raufkhalid104
 
Internetnuovo1
Internetnuovo1Internetnuovo1
Internetnuovo1
luciaguglielmi4
 
Internetnuovo1
Internetnuovo1Internetnuovo1
Internetnuovo1
maristella1956
 
La3 Intranet
La3 IntranetLa3 Intranet
La3 IntranetCma Mohd
 
6 sop
6 sop6 sop
6 sop
idspak
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
Arti Parab Academics
 

Similar to Internet intranet extranet aaa (20)

Internetintranetandextranet..
Internetintranetandextranet..Internetintranetandextranet..
Internetintranetandextranet..
 
Internet
InternetInternet
Internet
 
Over view of internet computer studies lesson
Over view of internet  computer studies lessonOver view of internet  computer studies lesson
Over view of internet computer studies lesson
 
Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranet
 
Internet
InternetInternet
Internet
 
Networking
NetworkingNetworking
Networking
 
Cibm workshop2 chapter nine
Cibm  workshop2 chapter nineCibm  workshop2 chapter nine
Cibm workshop2 chapter nine
 
Internet2007
Internet2007Internet2007
Internet2007
 
Internet
InternetInternet
Internet
 
Akshita
AkshitaAkshita
Akshita
 
Internetnuovo1
Internetnuovo1Internetnuovo1
Internetnuovo1
 
Internet
InternetInternet
Internet
 
Internet
InternetInternet
Internet
 
What is a Computer Network.pdf
What is a Computer Network.pdfWhat is a Computer Network.pdf
What is a Computer Network.pdf
 
Internetnuovo1
Internetnuovo1Internetnuovo1
Internetnuovo1
 
Internetnuovo1
Internetnuovo1Internetnuovo1
Internetnuovo1
 
La3 Intranet
La3 IntranetLa3 Intranet
La3 Intranet
 
6 sop
6 sop6 sop
6 sop
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 

More from Dhani Ahmad

Strategic planning
Strategic planningStrategic planning
Strategic planning
Dhani Ahmad
 
Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planning
Dhani Ahmad
 
Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisDhani Ahmad
 
Information system
Information systemInformation system
Information systemDhani Ahmad
 
Information resource management
Information resource managementInformation resource management
Information resource managementDhani Ahmad
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and records
Dhani Ahmad
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behavior
Dhani Ahmad
 
Islamic information management
Islamic information managementIslamic information management
Islamic information management
Dhani Ahmad
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islam
Dhani Ahmad
 
The need for security
The need for securityThe need for security
The need for security
Dhani Ahmad
 
The information security audit
The information security auditThe information security audit
The information security audit
Dhani Ahmad
 
Security technologies
Security technologiesSecurity technologies
Security technologies
Dhani Ahmad
 
Security policy
Security policySecurity policy
Security policy
Dhani Ahmad
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnel
Dhani Ahmad
 
Secure
SecureSecure
Secure
Dhani Ahmad
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
Dhani Ahmad
 
Risk management i
Risk management iRisk management i
Risk management i
Dhani Ahmad
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care it
Dhani Ahmad
 
Physical security
Physical securityPhysical security
Physical security
Dhani Ahmad
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
Dhani Ahmad
 

More from Dhani Ahmad (20)

Strategic planning
Strategic planningStrategic planning
Strategic planning
 
Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planning
 
Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysis
 
Information system
Information systemInformation system
Information system
 
Information resource management
Information resource managementInformation resource management
Information resource management
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and records
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behavior
 
Islamic information management
Islamic information managementIslamic information management
Islamic information management
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islam
 
The need for security
The need for securityThe need for security
The need for security
 
The information security audit
The information security auditThe information security audit
The information security audit
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Security policy
Security policySecurity policy
Security policy
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnel
 
Secure
SecureSecure
Secure
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
 
Risk management i
Risk management iRisk management i
Risk management i
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care it
 
Physical security
Physical securityPhysical security
Physical security
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

Internet intranet extranet aaa

  • 1. Internet The Internet is a worldwide, publicly accessible network of interconnected computer networks that transmit data using the standard Internet Protocol (IP).
  • 2. It is a "network of networks" that consists of millions of smaller domestic, academic, business, and government networks, which together carry various information and services, such as electronic mail, online chat, file transfer, and the interlinked Web pages and other documents of the World Wide Web.
  • 3. Internet and the workplace The Internet is allowing greater flexibility in working hours and location, especially with the spread of unmetered high-speed connections and Web applications.
  • 4. The mobile Internet The Internet can now be accessed virtually anywhere by numerous means. Mobile phones, handheld game consoles and cellular routers allow users to connect to the Internet from anywhere
  • 5. E-mail Concept of sending electronic text messages between parties in a way analogous to mailing letters or memos.
  • 6. Remote access The Internet allows computer users to connect to other computers and information stores easily, wherever they may be across the world.
  • 7. Collaboration The low cost and nearly instantaneous sharing of ideas, knowledge, and skills has made collaborative work dramatically easier.
  • 8. File sharing A computer file can be e-mailed to customers, colleagues and friends as an attachment. It can be uploaded to a Web site or FTP server for easy download by others
  • 9. Voice telephony (VoIP) VoIP stands for Voice over IP, where IP refers to the Internet Protocol that underlies all Internet communication.
  • 10. IP address An IP address (Internet Protocol address) is a unique address that certain electronic devices use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard (IP)
  • 11. Any participating network device—including routers, computers, printers, Internet fax machines, and some telephones—can have their own unique address.
  • 12. Intranet An intranet is a private computer network that uses Internet protocols , network connectivity to securely share part of an organization's information or operations with its employees.
  • 13. intranet can be understood as "a private version of the Internet," or as a version of the Internet confined to an organization The term first appeared in print on April 19, 1995, in Digital News & Review in an article authored by Technical Editor Stephen Lawton [1] .
  • 14. Industry examples: Ford Motor Co has more than 175,000 employees in 950 locations worldwide, each of whom had access to the company’s intranet. The intranet gave employees information about benefits, demographics, salary, history etc
  • 15. The Australian National University uses an Intranet called Claromentis to maintain one of its external sites.
  • 16. “The success of Cisco Systems has been largely attributed to its innovative corporate intranet” North Korea controls access to the internet among its people by using a country-wide intranet called "Kwangmyong"
  • 17. Advantages: Workforce productivity: Intranets can help users to locate and view information faster and use applications relevant to their roles and responsibilities. Time: organizations can make more information available to employees on a "pull" basis (i.e: employees can link to relevant information at a time which suits them)
  • 18. Communication: Intranets can serve as powerful tools for communication within an organization, vertically and horizontally. Business operations and management: Intranets are also being used as a platform for developing and deploying applications to support business operations and decisions across the internetworked enterprise.
  • 19. Cost-effective: Users can view information and data via web-browser rather than maintaining physical documents such as procedure manuals, internal phone list and requistion forms. Promote common corporate culture: Every user is viewing the same information within the Intranet.
  • 20. Enhance Collaboration: With information easily accessible by all authorized users, teamwork is enabled.
  • 21. Disadvantages Inappropriate or incorrect information can be posted on an intranet which can reduce its credibility and effectiveness. In a devolved and highly interactive intranet there is freedom to post abusive and possibly illegal materials.
  • 22. Training is required to educate people of what intranet can do. Need expertise in field to administer and develop Intranet information within the organization. Security of the intranet becomes an issue. Other users may post sensitive information which may appear to another user.
  • 23. As information can be posted by any user, information overload may occur during the cause if it is not controlled well.
  • 24. Extranet "Extranet" is generally restricted to employees of the organization: can be accessed by customers, suppliers, or other approved parties
  • 25. An extranet is a private network that uses Internet protocols, network connectivity, and possibly the public telecommunication system to securely share part of an organization's information or operations with suppliers, vendors, partners, customers or other businesses.
  • 26. An extranet can be viewed as part of a company's Intranet that is extended to users outside the company
  • 27. Security An extranet requires security and privacy. These can include firewalls, server management, the issuance and use of digital certificates or similar means of user authentication, encryption of messages, and the use of virtual private networks (VPNs) that tunnel through the public network.
  • 28. 1. Disadvantages Extranets can be expensive to implement and maintain within an organization (e.g.: hardware, software, employee training costs) — if hosted internally instead of via an ASP *. *Application Service Provider
  • 29. Security of extranets can be a big concern when dealing with valuable information. System access needs to be carefully controlled to avoid sensitive information falling into the wrong hands.
  • 30. Extranets can reduce personal contact (face-to- face meetings) with customers and business partners.