Fastip Intranet Security Presentation by :- Erjon Duka, Msc

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

FIREWALLS Chapter 11.
Principles of Information Systems, Sixth Edition The Internet, Intranets, and Extranets Chapter 7.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Internet, Intranet and Extranets
HIPAA Security Standards What’s happening in your office?
Security Firewall Firewall design principle. Firewall Characteristics.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Electronic Commerce 2. Definition Ecommerce is the process of buying and selling products and services via distributed electronic media, usually the World.
Circuit & Application Level Gateways CS-431 Dick Steflik.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
The Internet, Intranets, and Extranets
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
1 Telecommunications, the Internet, Intranets, and Extranets CSC101 SECTIONS 01 & 02.
Principles of Information Systems, Sixth Edition The Internet, Intranets, and Extranets Chapter 7.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
CONTENTS  INTRODUCTION.  KEYWORDS  WHAT IS FIREWALL ?  WHY WE NEED FIREWALL ?  WHY NOT OTHER SECURITY MECHANISM ?  HOW FIREWALL WORKS ?  WHAT IT.
 What is intranet What is intranet  FeaturesFeatures  ArchitectureArchitecture  MeritsMerits  applicationsapplications  What is ExtranetWhat is.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
ACM 511 Introduction to Computer Networks. Computer Networks.
Internet,Intranet and Extranet Introduction Key Definitions: Internet: The internet is a global network of interconnected networks. Intranet: An intranet.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
The Intranet.
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
Internet, Intranet and extranet. By Ghazia Sohail And Elliot Goulding.
FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Defining Network Infrastructure and Network Security Lesson 8.
E-Business Infrastructure PRESENTED BY IKA NOVITA DEWI, MCS.
Chapter 5 Electronic Commerce | Security Threats - Solution
Firewall Techniques Matt Cupp.
The Intranet.
What is a Firewall?.
Network Security (the Internet Security)
Internet, Intranet and Extranets
Internet and Intranet.
Internet, Intranet and Extranets
Computer Data Security & Privacy
Chapter 5 Electronic Commerce | Security Threats - Solution
Security in Networking
Internet and Intranet.
Internet, Intranet and Extranets
Firewalls Jiang Long Spring 2002.
Internet and Intranet.
Firewalls Chapter 8.
Internet and Intranet.
Hosted Security.
Presentation transcript:

Fastip Intranet Security Presentation by :- Erjon Duka, Msc

Why Intranet Security ?

Fastip Fedora 13.1 Netork –File Browser

What is Intranet ? Internal company network that uses Internet standards (HTML, HTTP & TCP/IP protocols) & software. Accessed only by authorized persons, especially members or employees of the organization An internal corporate network built using Internet and World Wide Web standards and products that allows employees of an organization to gain access to corporate information

Log In

URL :

Fastip Fedora 13 Server ( Intranet Aplication is here

Fastip File Server

Why Intranet ? Ubiquitous access to staff Improved internal communication Improved access to information Improved productivity Promote user participation Improved management Open platform architecture - plenty of add-on applications available Existing information sources can be easily migrated to the desktop using Web technology Faster information delivery at lower costs Relatively quick and easy to set up Scaleable: start small, and grow as needed End User training - most users are familiar with browser operation

Fastip Server Active Network Connections

Super User Administrator

Other User Structure

Intranet User Categories

Fedora Server User Menager

Intranet Security Two levels of Security required: Internal It can be imposed by Public Key Security & Encryption Key. External Through Firewall.

Some interesting Intranet Links Library of Congress PointCast In-Box Direct Online Career Center New York Times Project Gutenberg Sportsline USA White House MIT Lab for Computer Science The Wall Street Journal

UAMD and FASTIP links :

Personal File Sharing Preferences

Search Engine Links In Fastip Intranet : Altavista Excite Galaxy Hotbot Infoseek Lycos Webcrawler Yahoo!

Joomla 16 Vmware Player Aplication

Opening Joomla

Kerberos Authentication Configuration

Network Proxy Preferences Fedora Server 13.1

SELinux Administration ( Fedora ) HDD : 900GB, RAM:8GB 8Processors

Samba Server Configuration

Samba Server Configuration 2

FTP Fastip FTP File Transfer Protocol is used to access websites via a different door to download files.

What is Firewall ? Security device located between firm’s internal network (intranet) & external network (internet). Regulates access into & out of a company’s network based on a set of rules. Note : needs to be upgraded from time to time to check latest potential security problems. A device that sits between your internal network and the outside Internet and limits access into and out of your network based on your organization’s access policy

Firewall A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. There are several types of firewall techniques: – Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing. – Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation. – Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking. – Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.

32 Firewalls Intranet DMZ Internet Firewall Web server, server, web proxy, etc

Fastip Firewall

Network Device Control

Applications of Intranet Sharing of company policies/rules & regulations Access employee database Distribution of circulars/Office Orders Access product & customer data Sharing of information of common interest Launching of personal/departmental home pages Submission of reports Corporate telephone directories

Messaging and VoIP Assistant

Disadvantages of Internet Theft of personal information such as name, address, credit card number etc. Virus threats nothing but a program which disrupts the normal functioning of your system. Spamming refers to receiving unwanted s in bulk, which provide no purpose and needlessly obstruct the entire system. Pornography This is perhaps the biggest threat related to children’s healthy mental life. A very serious issue concerning the Internet. Though, internet can also create havoc, destruction and its misuse can be very fatal, the advantages of it outweigh its disadvantages.

Disadvantages Information overload lowers productivity True purpose of the Intranet is unknown to many employees/departments Hidden or unknown complexity and costs Productivity problem Unauthorized access Abuse of access Denial of service Security problem A company may not have person to update their Fear of sharing information and the loss of control Limited bandwidth for the business Management problem Intranet on a routine basis

Clients, partners, customers Layered System View Intranet Extranet Internet Corporate members Global society: competitors

Networks Fall Security related URLs intrusion-detection.html intrusion-detection.html

Questions ? THE END Thank You