Direcção - Geral do Desenvolvimento RegionalWorking Group Meeting in Brussels Maria Eduarda Lopes, 2000-06-22/23 PORTUGAL 2000 2006 COMMUNITY SUPPORT FRAMEWORK.

Slides:



Advertisements
Similar presentations
Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
Advertisements

All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
Basic Concepts of a Computer Network
By Glenn Z.  A network is 2 or more computers connected to each other.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
Human Computer Interaction - Fall 2010 Class project By Khang Nguyen Virtual Private Network Design for Remote Access Cambridge - SFO Airport.
Module 5: Configuring Access for Remote Clients and Networks.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Active Directory: Final Solution to Enterprise System Integration
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
© Copyright 1997, The University of New Mexico C-1 Internet Service Provider Services What to do once you’re connected.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networking Karlene R. Samuels COSC513.
Cyber Security – Our Approach James Clement Network Specialist ETS: Communications & Network Services
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Securing Insecure Networks SSL/TLS & IPSec. 4-1: Cryptographic System Copyright Pearson Prentice-Hall
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Network
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Kevin Kraemer Senior Director, Product Marketing
Technology Overview. Confidential & Proprietary Information System Unit Server Two-way Satellite network System includes units and server Units have built.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
 Sols Group 2002, Corporate Presentation. COMPANY PROFILE.
NETWORKS – NETWORK FUNDAMENTALS. How do computers connect to each other? Wired vs. Wireless Network cards Special device on computer that lets the computer.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
? INTERNET WHAT, WHY, HOW. DEFINITION The Internet is a massive public spiderweb of computer connections. It connects personal computers, laptops, tablets,
Intranet, Extranet, Firewall. Intranet and Extranet.
Computer Networks S3 Prepared by May Lau
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Lecture 4 Title: Network Components and Types By: Mr Hashem Alaidaros MIS 101.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Mainframe (Host) - Communications - User Interface - Business Logic - DBMS - Operating System - Storage (DB Files) Terminal (Display/Keyboard) Terminal.
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Agenda Midterm Notes Taco Bell Case Chapter 5 Computer Security.
The Intranet.
GREECE CSF III MONITORING INFORMATION SYSTEM (MIS)
Client/Server Model: A Business View The different Client/server implementations differ according to: 1.Where the processing for the presentation of information.
Computer networks Internet, Intranet, Extranet, Lan, Wan, characteristics and differences.
Module 10: Providing Secure Access to Remote Offices.
Management Information System
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
CHAPTER - 4 COMPUTER NETWORK Dr. BALAMURUGAN MUTHURAMAN
Introduction to Networking
NETWORKING COMPONENTS lLTEC 4550 JGuadalupe. HUB -THIS IS A HARDWARE DEVICE THAT IS USED TO NETWORK MULTIPLE COMPUTERS TOGETHER. IT IS A CENTRAL CONNECTION.
Virtual Private Network (VPN) 1. A corporation with multiple geographic sites can use one of two approaches to building a corporate intranet. – Private.
SCALABILITY AND SECURITY Presentation. 01 Scalability.
Chapter 7: Using Windows Servers
Module 3: Enabling Access to Internet Resources
Computer Data Security & Privacy
Virtual Private Networks (VPN)
Welcome To : Group 1 VC Presentation
Virtual Private Network
Department of Computer Science Course : Pre Computer Skills
Firewalls Routers, Switches, Hubs VPNs
السلوك التنظيمى المعاصر
Professional Network Services
How to install hotspot server in stand-alone pc
By Elizabeth Goldstein ‘19
Windows Active Directory Environment
Presentation transcript:

Direcção - Geral do Desenvolvimento RegionalWorking Group Meeting in Brussels Maria Eduarda Lopes, /23 PORTUGAL COMMUNITY SUPPORT FRAMEWORK III

Direcção - Geral do Desenvolvimento RegionalWorking Group Meeting in Brussels Maria Eduarda Lopes, /23 Standards ORACLE DBMS ORACLE Developer INTERNET Knowledge Compatibility Evolution Easy and inexpensive CSF III Information System

Direcção - Geral do Desenvolvimento RegionalWorking Group Meeting in Brussels Maria Eduarda Lopes, /23 Immediate update Immediate availability One single application installation One single database Centralization Immediate update Immediate availability CSF III Information System

Direcção - Geral do Desenvolvimento RegionalWorking Group Meeting in Brussels Maria Eduarda Lopes, /23 DSS Decision Support System GIS Geographic Information System CSF III Information System Extra modules

Direcção - Geral do Desenvolvimento RegionalWorking Group Meeting in Brussels Maria Eduarda Lopes, /23 Global Access According to “customer” profiles One Microcomputer One Internet connection One Browser Only demands: CSF III Information System

Direcção - Geral do Desenvolvimento RegionalWorking Group Meeting in Brussels Maria Eduarda Lopes, /23 CSF III European Commission ERDFEAGGFFIFGESF CSF III Information System

Direcção - Geral do Desenvolvimento RegionalWorking Group Meeting in Brussels Maria Eduarda Lopes, /23 CSF III European Commission ERDF CF Gateway APP2 Flat File APP1 APP3 CSF III Information System

Direcção - Geral do Desenvolvimento RegionalWorking Group Meeting in Brussels Maria Eduarda Lopes, /23 PC Users Firewall WWW Server Database Link DGDR Users DGDR Local Area Network DGDR Local Area Network Database Server Oracle DBMS PC System Administration LAN Administration CSF III Information System

Direcção - Geral do Desenvolvimento RegionalWorking Group Meeting in Brussels Maria Eduarda Lopes, /23 CSF III Information System SECURITY SYSTEM Access Control Authentication Encryption (PKI) Contents Security Open Security Management IP infrastructure Management Routers Security Management Users Management Reports and Consulting

Direcção - Geral do Desenvolvimento RegionalWorking Group Meeting in Brussels Maria Eduarda Lopes, /23 CSF III Information System SecuRemote and VPN 1 SecuRemote is installed on the user’s portable computer 2 SecuRemote server allows the user’s connection and decrypts their communication 3 The firewall passes the connection to the destination Servers within the network

Direcção - Geral do Desenvolvimento RegionalWorking Group Meeting in Brussels Maria Eduarda Lopes, /23 CSF III Information System Internet VPN-1 SecuRemote client ISP Corporate Network Certificate Authority Account Manager GUI LDAP Server Mail Server FIREWALL