Fastip Intranet Security Presentation by :- Erjon Duka, Msc
Why Intranet Security ?
Fastip Fedora 13.1 Netork –File Browser
What is Intranet ? Internal company network that uses Internet standards (HTML, HTTP & TCP/IP protocols) & software. Accessed only by authorized persons, especially members or employees of the organization An internal corporate network built using Internet and World Wide Web standards and products that allows employees of an organization to gain access to corporate information
Log In
URL :
Fastip Fedora 13 Server ( Intranet Aplication is here
Fastip File Server
Why Intranet ? Ubiquitous access to staff Improved internal communication Improved access to information Improved productivity Promote user participation Improved management Open platform architecture - plenty of add-on applications available Existing information sources can be easily migrated to the desktop using Web technology Faster information delivery at lower costs Relatively quick and easy to set up Scaleable: start small, and grow as needed End User training - most users are familiar with browser operation
Fastip Server Active Network Connections
Super User Administrator
Other User Structure
Intranet User Categories
Fedora Server User Menager
Intranet Security Two levels of Security required: Internal It can be imposed by Public Key Security & Encryption Key. External Through Firewall.
Some interesting Intranet Links Library of Congress PointCast In-Box Direct Online Career Center New York Times Project Gutenberg Sportsline USA White House MIT Lab for Computer Science The Wall Street Journal
UAMD and FASTIP links :
Personal File Sharing Preferences
Search Engine Links In Fastip Intranet : Altavista Excite Galaxy Hotbot Infoseek Lycos Webcrawler Yahoo!
Joomla 16 Vmware Player Aplication
Opening Joomla
Kerberos Authentication Configuration
Network Proxy Preferences Fedora Server 13.1
SELinux Administration ( Fedora ) HDD : 900GB, RAM:8GB 8Processors
Samba Server Configuration
Samba Server Configuration 2
FTP Fastip FTP File Transfer Protocol is used to access websites via a different door to download files.
What is Firewall ? Security device located between firm’s internal network (intranet) & external network (internet). Regulates access into & out of a company’s network based on a set of rules. Note : needs to be upgraded from time to time to check latest potential security problems. A device that sits between your internal network and the outside Internet and limits access into and out of your network based on your organization’s access policy
Firewall A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. There are several types of firewall techniques: – Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing. – Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation. – Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking. – Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.
32 Firewalls Intranet DMZ Internet Firewall Web server, server, web proxy, etc
Fastip Firewall
Network Device Control
Applications of Intranet Sharing of company policies/rules & regulations Access employee database Distribution of circulars/Office Orders Access product & customer data Sharing of information of common interest Launching of personal/departmental home pages Submission of reports Corporate telephone directories
Messaging and VoIP Assistant
Disadvantages of Internet Theft of personal information such as name, address, credit card number etc. Virus threats nothing but a program which disrupts the normal functioning of your system. Spamming refers to receiving unwanted s in bulk, which provide no purpose and needlessly obstruct the entire system. Pornography This is perhaps the biggest threat related to children’s healthy mental life. A very serious issue concerning the Internet. Though, internet can also create havoc, destruction and its misuse can be very fatal, the advantages of it outweigh its disadvantages.
Disadvantages Information overload lowers productivity True purpose of the Intranet is unknown to many employees/departments Hidden or unknown complexity and costs Productivity problem Unauthorized access Abuse of access Denial of service Security problem A company may not have person to update their Fear of sharing information and the loss of control Limited bandwidth for the business Management problem Intranet on a routine basis
Clients, partners, customers Layered System View Intranet Extranet Internet Corporate members Global society: competitors
Networks Fall Security related URLs intrusion-detection.html intrusion-detection.html
Questions ? THE END Thank You