SlideShare a Scribd company logo
COMPUTER MANAGEMENT
ASSIGNMENT
NAME : AYUSH JADON
PROGRAMME : BBA
SEMESTER : 1ST
SECTION : A
COURSECODE : CSE101
INTRODUCTION TO
INTERNET , INTRANET
AND EXTRANET, MYTHS
ABOUT THE INTERNET.
INTERNET
WHAT IS INTERNET ?
 It is a Global network of computers,
(servers or clients).
to exchange information .
 It is a “network of computer” that includes millions of
private and public, academic, business, and government
networks (local or global),
linked by copper wires, wireless connections, and other
technologies.
Hardware and software of internet
Variety of Hardware and Software are used
to make internet functional.
MODEM
Device that enables computers to
communicate through phone lines.
When we start internet the our modem
communicates to modem of ISP.
 COMPUTER
In addition to a modem, you need a client capable of handling
multiple data types.
 SOFTWARE
Two types of software’s required to enable your PC as an
internet PC .
 Communication software to establish connection
 Client software for browsing, e-mail , news
these software’s are provided with windows itself.
Applications of internet
 Download programs and files
 E-mail
 Voice and video conferencing
 E- commerce
 File sharing
 Information browsing
 Search the web addresses for access through search engine
 Chatting and many more….
Disadvantages of internet
 Theft of personal information such as name, address, credit card
number etc.
 Virus threats nothing but a program which disrupts the normal
functioning of your system.
 Spamming refers to receiving unwanted e-mails in bulk, which provide
no purpose and needlessly obstruct the entire system.
 Pornography this is perhaps the biggest threat related to children’s
healthy mental life. A very serious issue concerning the internet.
Through, internet can also create havoc , destruction and its misuse can
be very fatal.
The advantages of it outweigh its disadvantages..
INTRANET
What is intranet ?
 Internal company network that uses internet
standards (HTML , HTTP & TCPIP protocols )
& software.
 Accessed only by authorized persons,
especially members or employees of the
organization
INTRANET SECURITY
Two levels of security required:
INTERNAL
It can be imposed by public key security &
encryption key.
EXTERNAL
Through Firewall.
What is firewall ?
 Security device located between firm’s internal network
(intranet)& external network (internet).
 Regulates access into & out of a company’s network based
on a set of rules.
NOTE : needs to be upgraded from time to time to check
latest potential security problems.
Applications of intranet
 Sharing of company policies rules and regulations.
 Access employee database
 Distribution of circulars office orders
 Access product & customer data
 Sharing of information of common interest
 Launching of personal departmetal home pages
 Submission of repots
 Corporate telephone director
Management problem
Security problem
Productivity problem
 A company may not have person to update
their intranet on a routine basis .
 Fear of sharing information and the loss
control.
 Limited bandwidth for the business.
 Unauthorized access
 Abuse of access
 Denial of service
 Information overload lowers productivity
 True purpose of the intranet is unknown to
many employeesdepartments
 Hidden or unknown complexity and costs
EXTRANET
WHAT IS EXTRANET ?
 Extranet is an intranet for outside authorized users
using same internet technology.
 Inter-organizational information system.
 Enable outsiders to work together with company’s
employees.
 Open to selected suppliers, customers & other
business partners.
examples
 Dealers/distributors have access to product
files such as :-
1. Product specification ,
2. Pictures,
3. Images, etc...
To answer the queries of the customer .
Components of extranets..
Some basis infrastructure components such as the
internet including:-
 TCP/IP protocols,
 E-mail,
 Web browsers,
 External business partners &
 Tele-commuting employees place order, check status
& send E-mail.
Benefits of extranet
 Improved quality.
 Lower level costs.
 Lower administrative & other overhead costs.
 Reduction in paperwork.
 Delivery of accurate information on time.
 Improved customer service.
 Better communication.
 Overall improvement in business effectiveness.
Disadvantages
 The suppliers & customer who don’t have technical
knowledge feel problem.
 Faceless contact.
 Information can be misused by other competitors.
 Fraud may be possible.
 Technical Employees are required.
Layered system view
E
INTRANET
EXTRANET
INTERNET
CORPORATE MEMBERS
CLIENTS,PARTNERS,CUSTOME
RS
GLOBAL SOCIETY:COMPETITORS
Myths about internet
 Your move in being tracked by your ISP
 Everything on the internet is true
 Security programs are not required for safe location on the internet
 Complex and strong passwords are best for suffering the internet
 Internet security is an expensive deal
THANKYOU

More Related Content

What's hot

Data Protection, Humans and Common Sense
Data Protection, Humans and Common SenseData Protection, Humans and Common Sense
Data Protection, Humans and Common Sense
usbcopynotify
 
I.T Administrator
I.T AdministratorI.T Administrator
I.T Administrator
saiyad_altaf
 
Over view of internet computer studies lesson
Over view of internet  computer studies lessonOver view of internet  computer studies lesson
Over view of internet computer studies lesson
Mukalele Rogers
 
Chapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual PropertyChapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual Propertymanagement 2
 
Proxy
ProxyProxy
La3 Intranet
La3 IntranetLa3 Intranet
La3 IntranetCma Mohd
 
Presen15
Presen15Presen15
Presen15
guest83c90cf6
 

What's hot (20)

Byod
ByodByod
Byod
 
Resume (2)
Resume (2)Resume (2)
Resume (2)
 
Data Protection, Humans and Common Sense
Data Protection, Humans and Common SenseData Protection, Humans and Common Sense
Data Protection, Humans and Common Sense
 
Mark CV
Mark CVMark CV
Mark CV
 
I.T Administrator
I.T AdministratorI.T Administrator
I.T Administrator
 
Resume_Terrence
Resume_TerrenceResume_Terrence
Resume_Terrence
 
Over view of internet computer studies lesson
Over view of internet  computer studies lessonOver view of internet  computer studies lesson
Over view of internet computer studies lesson
 
CV
CV CV
CV
 
Chapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual PropertyChapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual Property
 
Proxy
ProxyProxy
Proxy
 
Akshita
AkshitaAkshita
Akshita
 
La3 Intranet
La3 IntranetLa3 Intranet
La3 Intranet
 
Muhanned ahmed-cv
Muhanned ahmed-cvMuhanned ahmed-cv
Muhanned ahmed-cv
 
My_CV(2)
My_CV(2)My_CV(2)
My_CV(2)
 
MY CV
MY CVMY CV
MY CV
 
M M Rabea 2
M M Rabea 2M M Rabea 2
M M Rabea 2
 
SALMANB
SALMANBSALMANB
SALMANB
 
Presen15
Presen15Presen15
Presen15
 
C.V
C.VC.V
C.V
 
Paul.J.Garcia_ResumeNew
Paul.J.Garcia_ResumeNewPaul.J.Garcia_ResumeNew
Paul.J.Garcia_ResumeNew
 

Similar to Introduction to internet, intranet and Extranet . Myths about internet

internet intranet and extranet
internet intranet and extranetinternet intranet and extranet
internet intranet and extranet
FLYMAN TECHNOLOGY LIMITED
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt
Dizzi1
 
Intranet and Extranet ppt.pptx
Intranet and Extranet ppt.pptxIntranet and Extranet ppt.pptx
Intranet and Extranet ppt.pptx
AnshikaGoel42
 
Intranet And extranet.pptx
Intranet And extranet.pptxIntranet And extranet.pptx
Intranet And extranet.pptx
MishraAbhishekSunilK
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranetNadeem Khazi
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...adeel hamid
 
Internet intranet extranet aaa
Internet intranet extranet aaaInternet intranet extranet aaa
Internet intranet extranet aaa
Dhani Ahmad
 
H1N1 & IT Continuity
H1N1 & IT ContinuityH1N1 & IT Continuity
H1N1 & IT Continuity
Christopher Duffy
 
IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3Rexon Calub
 
Cois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icCois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icRexon Calub
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
karthikvcyber
 
Intranet Presentation
Intranet PresentationIntranet Presentation
Intranet Presentationrenaglasser
 
Networking
NetworkingNetworking
Networking
kameeradissanayake
 
Internetintranetandextranet..
Internetintranetandextranet..Internetintranetandextranet..
Internetintranetandextranet..
Paulo Sambo
 
Services and Products
Services and ProductsServices and Products
Services and Products
Technecessities
 

Similar to Introduction to internet, intranet and Extranet . Myths about internet (20)

internet intranet and extranet
internet intranet and extranetinternet intranet and extranet
internet intranet and extranet
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt
 
Intranet and Extranet ppt.pptx
Intranet and Extranet ppt.pptxIntranet and Extranet ppt.pptx
Intranet and Extranet ppt.pptx
 
Intranet And extranet.pptx
Intranet And extranet.pptxIntranet And extranet.pptx
Intranet And extranet.pptx
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranet
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...
 
E-Commerce 07
E-Commerce 07E-Commerce 07
E-Commerce 07
 
Internet intranet extranet aaa
Internet intranet extranet aaaInternet intranet extranet aaa
Internet intranet extranet aaa
 
H1N1 & IT Continuity
H1N1 & IT ContinuityH1N1 & IT Continuity
H1N1 & IT Continuity
 
IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3
 
Cois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icCois20024 lec06 2002w_ic
Cois20024 lec06 2002w_ic
 
Protocol & Type of Networks
Protocol & Type of NetworksProtocol & Type of Networks
Protocol & Type of Networks
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
Technology
TechnologyTechnology
Technology
 
Ecommerce Chap 07
Ecommerce Chap 07Ecommerce Chap 07
Ecommerce Chap 07
 
Intranet Presentation
Intranet PresentationIntranet Presentation
Intranet Presentation
 
Networking
NetworkingNetworking
Networking
 
Internetintranetandextranet..
Internetintranetandextranet..Internetintranetandextranet..
Internetintranetandextranet..
 
Beekman5 std ppt_11
Beekman5 std ppt_11Beekman5 std ppt_11
Beekman5 std ppt_11
 
Services and Products
Services and ProductsServices and Products
Services and Products
 

Recently uploaded

Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
Sharepoint Designs
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Hivelance Technology
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
ayushiqss
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
NaapbooksPrivateLimi
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 

Recently uploaded (20)

Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 

Introduction to internet, intranet and Extranet . Myths about internet

  • 1. COMPUTER MANAGEMENT ASSIGNMENT NAME : AYUSH JADON PROGRAMME : BBA SEMESTER : 1ST SECTION : A COURSECODE : CSE101
  • 2. INTRODUCTION TO INTERNET , INTRANET AND EXTRANET, MYTHS ABOUT THE INTERNET.
  • 4. WHAT IS INTERNET ?  It is a Global network of computers, (servers or clients). to exchange information .  It is a “network of computer” that includes millions of private and public, academic, business, and government networks (local or global), linked by copper wires, wireless connections, and other technologies.
  • 5. Hardware and software of internet Variety of Hardware and Software are used to make internet functional. MODEM Device that enables computers to communicate through phone lines. When we start internet the our modem communicates to modem of ISP.
  • 6.  COMPUTER In addition to a modem, you need a client capable of handling multiple data types.  SOFTWARE Two types of software’s required to enable your PC as an internet PC .  Communication software to establish connection  Client software for browsing, e-mail , news these software’s are provided with windows itself.
  • 7. Applications of internet  Download programs and files  E-mail  Voice and video conferencing  E- commerce  File sharing  Information browsing  Search the web addresses for access through search engine  Chatting and many more….
  • 8. Disadvantages of internet  Theft of personal information such as name, address, credit card number etc.  Virus threats nothing but a program which disrupts the normal functioning of your system.  Spamming refers to receiving unwanted e-mails in bulk, which provide no purpose and needlessly obstruct the entire system.  Pornography this is perhaps the biggest threat related to children’s healthy mental life. A very serious issue concerning the internet. Through, internet can also create havoc , destruction and its misuse can be very fatal. The advantages of it outweigh its disadvantages..
  • 10. What is intranet ?  Internal company network that uses internet standards (HTML , HTTP & TCPIP protocols ) & software.  Accessed only by authorized persons, especially members or employees of the organization
  • 11. INTRANET SECURITY Two levels of security required: INTERNAL It can be imposed by public key security & encryption key. EXTERNAL Through Firewall.
  • 12. What is firewall ?  Security device located between firm’s internal network (intranet)& external network (internet).  Regulates access into & out of a company’s network based on a set of rules. NOTE : needs to be upgraded from time to time to check latest potential security problems.
  • 13. Applications of intranet  Sharing of company policies rules and regulations.  Access employee database  Distribution of circulars office orders  Access product & customer data  Sharing of information of common interest  Launching of personal departmetal home pages  Submission of repots  Corporate telephone director
  • 14. Management problem Security problem Productivity problem  A company may not have person to update their intranet on a routine basis .  Fear of sharing information and the loss control.  Limited bandwidth for the business.  Unauthorized access  Abuse of access  Denial of service  Information overload lowers productivity  True purpose of the intranet is unknown to many employeesdepartments  Hidden or unknown complexity and costs
  • 16. WHAT IS EXTRANET ?  Extranet is an intranet for outside authorized users using same internet technology.  Inter-organizational information system.  Enable outsiders to work together with company’s employees.  Open to selected suppliers, customers & other business partners.
  • 17. examples  Dealers/distributors have access to product files such as :- 1. Product specification , 2. Pictures, 3. Images, etc... To answer the queries of the customer .
  • 18. Components of extranets.. Some basis infrastructure components such as the internet including:-  TCP/IP protocols,  E-mail,  Web browsers,  External business partners &  Tele-commuting employees place order, check status & send E-mail.
  • 19. Benefits of extranet  Improved quality.  Lower level costs.  Lower administrative & other overhead costs.  Reduction in paperwork.  Delivery of accurate information on time.  Improved customer service.  Better communication.  Overall improvement in business effectiveness.
  • 20. Disadvantages  The suppliers & customer who don’t have technical knowledge feel problem.  Faceless contact.  Information can be misused by other competitors.  Fraud may be possible.  Technical Employees are required.
  • 21. Layered system view E INTRANET EXTRANET INTERNET CORPORATE MEMBERS CLIENTS,PARTNERS,CUSTOME RS GLOBAL SOCIETY:COMPETITORS
  • 22. Myths about internet  Your move in being tracked by your ISP  Everything on the internet is true  Security programs are not required for safe location on the internet  Complex and strong passwords are best for suffering the internet  Internet security is an expensive deal