SlideShare a Scribd company logo
Using an Intranet Within a Company



  Firewall
●

● Internal email system

● Corporate databases

● Advantage of Intranet
Firewall
        Intranet within a
    ●

        company is protected
        from snooping eyws
        and malicious attacks
        by firewall
Internal email system
               A key componet of an
           ●

               intranet is an internal
               email system.
               The internal system is
           ●

               built to route traffic
               wit-hin an
               organization.
               The email don't need
           ●

               to go through outside
               the intranet.
Using an Intranet Within a Company
Using an Intranet Within a Company
Using an Intranet Within a Company

More Related Content

What's hot

Intranet 47
Intranet 47Intranet 47
Intranet 47
myrajendra
 
Intranet & Extranet
Intranet & ExtranetIntranet & Extranet
CHAP 3 - NETWORK, INTRANET & INTERNET
CHAP 3 - NETWORK, INTRANET & INTERNETCHAP 3 - NETWORK, INTRANET & INTERNET
CHAP 3 - NETWORK, INTRANET & INTERNET
Cikgu Johan Johari
 
Intranet & Extranet
Intranet & ExtranetIntranet & Extranet
Intranet & ExtranetRahul Kumar
 
Presentation Week13
Presentation Week13Presentation Week13
Presentation Week13guest052692
 
Internet and intranet
Internet and intranetInternet and intranet
Internet and intranetRohit Kumar
 
Internet_Interanet_Extranet
Internet_Interanet_ExtranetInternet_Interanet_Extranet
Internet_Interanet_Extranet
vikashchauhan908
 
Week13_Web_Presentation
Week13_Web_PresentationWeek13_Web_Presentation
Week13_Web_Presentationguestb64a7e
 
Week13presentation
Week13presentationWeek13presentation
Week13presentations1160163
 
Basic Internet_Baabtra.com template
Basic Internet_Baabtra.com templateBasic Internet_Baabtra.com template
Basic Internet_Baabtra.com templateJijo Joseph
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Unit 1 Webtechnology
Unit 1 WebtechnologyUnit 1 Webtechnology
Unit 1 Webtechnology
Abhishek Kesharwani
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
Universitas Pembangunan Panca Budi
 
Internet - R D Sivakumar.
Internet - R D Sivakumar.Internet - R D Sivakumar.
Internet - R D Sivakumar.
Sivakumar R D .
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
Fizaril Amzari Omar
 

What's hot (19)

Intranet 47
Intranet 47Intranet 47
Intranet 47
 
Intranet & Extranet
Intranet & ExtranetIntranet & Extranet
Intranet & Extranet
 
CHAP 3 - NETWORK, INTRANET & INTERNET
CHAP 3 - NETWORK, INTRANET & INTERNETCHAP 3 - NETWORK, INTRANET & INTERNET
CHAP 3 - NETWORK, INTRANET & INTERNET
 
Intranet & Extranet
Intranet & ExtranetIntranet & Extranet
Intranet & Extranet
 
Presentation Week13
Presentation Week13Presentation Week13
Presentation Week13
 
W13poster
W13posterW13poster
W13poster
 
w13presen
w13presenw13presen
w13presen
 
Internet and intranet
Internet and intranetInternet and intranet
Internet and intranet
 
Akshita
AkshitaAkshita
Akshita
 
Internet_Interanet_Extranet
Internet_Interanet_ExtranetInternet_Interanet_Extranet
Internet_Interanet_Extranet
 
Week13_Web_Presentation
Week13_Web_PresentationWeek13_Web_Presentation
Week13_Web_Presentation
 
Week13presentation
Week13presentationWeek13presentation
Week13presentation
 
Basic Internet_Baabtra.com template
Basic Internet_Baabtra.com templateBasic Internet_Baabtra.com template
Basic Internet_Baabtra.com template
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Unit 1 Webtechnology
Unit 1 WebtechnologyUnit 1 Webtechnology
Unit 1 Webtechnology
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 
Internet - R D Sivakumar.
Internet - R D Sivakumar.Internet - R D Sivakumar.
Internet - R D Sivakumar.
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
 

Viewers also liked

CurríCulo Y CoordinacióN PedagóGica 2007 2008
CurríCulo Y CoordinacióN PedagóGica 2007 2008CurríCulo Y CoordinacióN PedagóGica 2007 2008
CurríCulo Y CoordinacióN PedagóGica 2007 2008
ManuelLopezC
 
Deforestation Stuart And Billy
Deforestation Stuart And BillyDeforestation Stuart And Billy
Deforestation Stuart And Billywebman
 
Lagrimasdemujer
LagrimasdemujerLagrimasdemujer
Lagrimasdemujer
guest05782b
 
Figure1 . PathogéNicité De L‘Infection AssociéE à C. Difficile [D’AprèS Rebec...
Figure1 . PathogéNicité De L‘Infection AssociéE à C. Difficile [D’AprèS Rebec...Figure1 . PathogéNicité De L‘Infection AssociéE à C. Difficile [D’AprèS Rebec...
Figure1 . PathogéNicité De L‘Infection AssociéE à C. Difficile [D’AprèS Rebec...afiavi
 
Safety Awards2007
Safety Awards2007Safety Awards2007
Safety Awards2007comendador
 

Viewers also liked (7)

CurríCulo Y CoordinacióN PedagóGica 2007 2008
CurríCulo Y CoordinacióN PedagóGica 2007 2008CurríCulo Y CoordinacióN PedagóGica 2007 2008
CurríCulo Y CoordinacióN PedagóGica 2007 2008
 
Deforestation Stuart And Billy
Deforestation Stuart And BillyDeforestation Stuart And Billy
Deforestation Stuart And Billy
 
A Vidaem2070
A Vidaem2070A Vidaem2070
A Vidaem2070
 
Recall Notice
Recall NoticeRecall Notice
Recall Notice
 
Lagrimasdemujer
LagrimasdemujerLagrimasdemujer
Lagrimasdemujer
 
Figure1 . PathogéNicité De L‘Infection AssociéE à C. Difficile [D’AprèS Rebec...
Figure1 . PathogéNicité De L‘Infection AssociéE à C. Difficile [D’AprèS Rebec...Figure1 . PathogéNicité De L‘Infection AssociéE à C. Difficile [D’AprèS Rebec...
Figure1 . PathogéNicité De L‘Infection AssociéE à C. Difficile [D’AprèS Rebec...
 
Safety Awards2007
Safety Awards2007Safety Awards2007
Safety Awards2007
 

Similar to Using an Intranet Within a Company

Week13
Week13Week13
1150087w13 Intranet
1150087w13 Intranet1150087w13 Intranet
1150087w13 Intranets1150087
 
Intranets and Extranets
Intranets and Extranets Intranets and Extranets
E commerce 2018 and history of E-commerce
E commerce 2018 and history of E-commerce E commerce 2018 and history of E-commerce
E commerce 2018 and history of E-commerce
harsh rana
 
Week13 Presentation
Week13 PresentationWeek13 Presentation
Week13 Presentations1160247
 
Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet
AyushJadon5
 
internet intranet and extranet
internet intranet and extranetinternet intranet and extranet
internet intranet and extranet
FLYMAN TECHNOLOGY LIMITED
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt
Dizzi1
 
E business intranets inrernet extranet www
E business intranets inrernet extranet wwwE business intranets inrernet extranet www
E business intranets inrernet extranet www
Jayapal Jp
 
Intranet for Small Business – A Complete Guide.docx
Intranet for Small Business – A Complete Guide.docxIntranet for Small Business – A Complete Guide.docx
Intranet for Small Business – A Complete Guide.docx
Intranet Solutions
 
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
NilKhunt
 
An overview of cyberimes
An overview of cyberimesAn overview of cyberimes
An overview of cyberimes
Prof. (Dr.) Tabrez Ahmad
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
Ahmed Banafa
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
Rishabh Gupta
 
Assignment RequirementsYou have been working as a technology
Assignment RequirementsYou have been working as a technologyAssignment RequirementsYou have been working as a technology
Assignment RequirementsYou have been working as a technology
meghanthrelkeld256
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
prtabal_25
 

Similar to Using an Intranet Within a Company (20)

Week13
Week13Week13
Week13
 
1150087w13 Intranet
1150087w13 Intranet1150087w13 Intranet
1150087w13 Intranet
 
eng_hw
eng_hweng_hw
eng_hw
 
Intranets and Extranets
Intranets and Extranets Intranets and Extranets
Intranets and Extranets
 
E commerce 2018 and history of E-commerce
E commerce 2018 and history of E-commerce E commerce 2018 and history of E-commerce
E commerce 2018 and history of E-commerce
 
Week13 Presentation
Week13 PresentationWeek13 Presentation
Week13 Presentation
 
Presentation2
Presentation2Presentation2
Presentation2
 
Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet
 
week13
week13week13
week13
 
internet intranet and extranet
internet intranet and extranetinternet intranet and extranet
internet intranet and extranet
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt
 
E business intranets inrernet extranet www
E business intranets inrernet extranet wwwE business intranets inrernet extranet www
E business intranets inrernet extranet www
 
Intranet for Small Business – A Complete Guide.docx
Intranet for Small Business – A Complete Guide.docxIntranet for Small Business – A Complete Guide.docx
Intranet for Small Business – A Complete Guide.docx
 
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
 
Beekman5 std ppt_11
Beekman5 std ppt_11Beekman5 std ppt_11
Beekman5 std ppt_11
 
An overview of cyberimes
An overview of cyberimesAn overview of cyberimes
An overview of cyberimes
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Assignment RequirementsYou have been working as a technology
Assignment RequirementsYou have been working as a technologyAssignment RequirementsYou have been working as a technology
Assignment RequirementsYou have been working as a technology
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

Using an Intranet Within a Company

  • 1. Using an Intranet Within a Company Firewall ● ● Internal email system ● Corporate databases ● Advantage of Intranet
  • 2. Firewall Intranet within a ● company is protected from snooping eyws and malicious attacks by firewall
  • 3. Internal email system A key componet of an ● intranet is an internal email system. The internal system is ● built to route traffic wit-hin an organization. The email don't need ● to go through outside the intranet.