Spreadsheet review. Primary key (also called key field): A field which is different for every record in the table Composite key When two fields together.

Slides:



Advertisements
Similar presentations
Computer networks Fundamentals of Information Technology Session 6.
Advertisements

VCE IT Theory Slideshows By Mark Kelly McKinnon Secondary College Vceit.com Intranet, Internet, VPN.
Windows Remote Desktop Services for Cloud Applications.
ICT & Crime Cyberslacking. What is Cyberslacking? Cyberslacking is wasting time (usually online) when you should be working Either at work or at school.
Internet, Intranet and Extranets
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Remote Desktop Connection Techniques Wireless Communication Networks.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
Communications and Networks
Sarah Showalter Summer Utilizing the school computers, network, and storage space is a privilege! Each year all users are expected to review.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Remote Networking Architectures
Back to Start 1 of 10 Connect with a Mobile Device You can use your company’s Windows SBS computer network to extend your connectivity by using mobile.
Introduction to Microsoft Office Web Apps with Jim Mollé Learn iT! Computer Software Training.
Virtual Private Network
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Working for a hospital at home (Teleworking). Teleworking Home working or teleworking for hospitals staff is the process where they work from home using.
Chapter 4 Computer Networks – Part 1
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
By Julia Nguyen B2. What is it?  Networking is two or more computers linked together  Two common types are Local Area Network (LAN) and Wide Area Network.
Chapter 9: Novell NetWare
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
Chapter 3.  The characteristics and purpose of: ◦ Intranets ◦ Internet ◦ Extranets.
 What is intranet What is intranet  FeaturesFeatures  ArchitectureArchitecture  MeritsMerits  applicationsapplications  What is ExtranetWhat is.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
1 Windows 2008 Configuring Server Roles and Services.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Introduction to the Schoolteam system 2/2000 Intranet  Differences between Internet and Intranet  Usually, when we want to visit web pages, we are.
The Intranet.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
COMPUTER INTERNET, INTRANET & EXTRANET. INTERNET 1) It is a worldwide system which has the following characteristics: 2) Internet is a world-wide / global.
Microsoft Access 4 Database Creation and Management.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network (VPN) 1. A corporation with multiple geographic sites can use one of two approaches to building a corporate intranet. – Private.
Internet, Intranet and extranet. By Ghazia Sohail And Elliot Goulding.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
G063 - Intranets, the Internet and Extranet. Learning Objectives: At the end of this topic you should be able to: describe the characteristics and purpose.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
The Intranet.
Internet Business Associate v2.0
Virtual Private Network
Virtual Private Networks
Case Management System
Topic 5: Online Communities Press F5 to view!
Unit 27: Network Operating Systems
Virtual Private Network
Firewalls Routers, Switches, Hubs VPNs
VPN What, where, who, why when?.
Networking and Security
By Elizabeth Goldstein ‘19
Employee Monitoring Solution
COMPLETE BUSINESS TEXTING SOLUTION
Presentation transcript:

Spreadsheet review

Primary key (also called key field): A field which is different for every record in the table Composite key When two fields together are used because no single record is unique Primary and composite keys

Traditional Business Employee monitoring: in the US, 76% of major companies monitor their employees’ use of internet and US employees wasted just over 2 hours of each 8 hour work day, with 44% rating the internet as their major distraction Companies can be held legally responsible for inappropriate content sent by employees Employee monitoring

Solutions Filter internet connections to block common sources of distraction such as social networks, pornography and games Internet monitoring software and monitoring to make sure that companies’ acceptable use policies are followed Network administrators can easily monitor websites, downloaded files and blocked pages employees have tried to access Filter, internet monitoring software

Since most is not encrypted, both ingoing and outgoing can be read because it passes through a gateway server on the company LAN Desktop monitoring software Programs that can produce detailed reports about almost any aspect of a computer’s use remote viewing and remote desktop features Allow a remote user to view and interact with the screen of another computer respectively Desktop monitoring software

Teleworking ( or telecommuting) – when employees work away from the office and use information technology to stay in touch with colleagues While traveling, hotel or airport wireless networks are insecure, so it is better to use VPN software Virtual Private Networks (VPN) – use encryption to create an encrypted tunnel from one computer to a local network in another location, over a public network Teleworking, VPNs

Collaborative software allows people to work together on documents and projects from anywhere with an internet connection Mail merge Most word-processing and DTP software allows the user to insert fields of data into documents from a source such as a database table Macros – a software feature that lets users record a sequence of actions or instuctions that can be played back later Collaborative software, mail merge, macros

Macros also have the potential to be harmful, altering data and sending volume s because of this, you can disable these Intranet – a network that shares information privately among the employees of an organization Information on an intranet is usually web pages or Information that only people in the organization need to know is distributed here Extranet – sharing part of the company’s information with with a selected few people outside of the organization Macros, intranet, extranet

When using an extranet, authentication is required Deskilling – in many areas, IT is capable of doing the work that several people have been doing, leading to the replacement of a skilled worker by someone who is semi-skilled or unskilled Reskilling – replacing jobs with new jobs that require working with new technology Macros, intranet, extranet