Presentation is loading. Please wait.

Presentation is loading. Please wait.

Fastip Intranet Security Presentation by :- Erjon Duka, Msc

Similar presentations


Presentation on theme: "Fastip Intranet Security Presentation by :- Erjon Duka, Msc"— Presentation transcript:

1 Fastip Intranet Security Presentation by :- Erjon Duka, Msc eduka@fastip.edu.al www.fastip.edu.al www.uamd.edu.al

2 Why Intranet Security ?

3 Fastip Fedora 13.1 Netork –File Browser

4 What is Intranet ? Internal company network that uses Internet standards (HTML, HTTP & TCP/IP protocols) & software. Accessed only by authorized persons, especially members or employees of the organization An internal corporate network built using Internet and World Wide Web standards and products that allows employees of an organization to gain access to corporate information

5 Log In

6 URL : 192.168.1.187

7 http://192.168.1.187

8 Fastip Fedora 13 Server ( Intranet Aplication is here

9 Fastip File Server

10 Why Intranet ? Ubiquitous access to staff Improved internal communication Improved access to information Improved productivity Promote user participation Improved management Open platform architecture - plenty of add-on applications available Existing information sources can be easily migrated to the desktop using Web technology Faster information delivery at lower costs Relatively quick and easy to set up Scaleable: start small, and grow as needed End User training - most users are familiar with browser operation

11 Fastip Server Active Network Connections

12 Super User Administrator

13 Other User Structure

14 Intranet User Categories

15 Fedora Server User Menager

16 Intranet Security Two levels of Security required: Internal It can be imposed by Public Key Security & Encryption Key. External Through Firewall.

17 Some interesting Intranet Links Library of Congress http://lcweb.loc.gov PointCast http://www.pointcast.com In-Box Direct http://www.netscape.com Online Career Center http://occ.com New York Times http://www.nytimes.com Project Gutenberg http://www.gutenberg.org Sportsline USA http://www.sportsline.com White House http://www.whitehouse.gov MIT Lab for Computer Science http://www.lcs.mit.edu The Wall Street Journal http://www.wsj.com http://www.wsj.com

18 UAMD and FASTIP links :

19 Personal File Sharing Preferences

20 Search Engine Links In Fastip Intranet : Altavista http://www.altavista.digital.com Excite http://www.excite.com Galaxy http://www.einet.net Hotbot http://www.hotbot.com Infoseek http://www.infoseek.com Lycos http://www.lycos.com Webcrawler http://www.webcrawler.com Yahoo! http://www.yahoo.com

21 Joomla 16 Vmware Player Aplication

22 Opening Joomla

23 Kerberos Authentication Configuration

24 Network Proxy Preferences Fedora Server 13.1

25 SELinux Administration ( Fedora ) HDD : 900GB, RAM:8GB 8Processors

26 Samba Server Configuration

27 Samba Server Configuration 2

28 FTP Fastip FTP File Transfer Protocol is used to access websites via a different door to download files.

29

30 What is Firewall ? Security device located between firm’s internal network (intranet) & external network (internet). Regulates access into & out of a company’s network based on a set of rules. Note : needs to be upgraded from time to time to check latest potential security problems. A device that sits between your internal network and the outside Internet and limits access into and out of your network based on your organization’s access policy

31 Firewall A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. There are several types of firewall techniques: – Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing. – Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation. – Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking. – Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.

32 32 Firewalls Intranet DMZ Internet Firewall Web server, email server, web proxy, etc

33 Fastip Firewall

34 Network Device Control

35 Applications of Intranet Sharing of company policies/rules & regulations Access employee database Distribution of circulars/Office Orders Access product & customer data Sharing of information of common interest Launching of personal/departmental home pages Submission of reports Corporate telephone directories

36 Messaging and VoIP Assistant

37 Disadvantages of Internet Theft of personal information such as name, address, credit card number etc. Virus threats nothing but a program which disrupts the normal functioning of your system. Spamming refers to receiving unwanted e-mails in bulk, which provide no purpose and needlessly obstruct the entire system. Pornography This is perhaps the biggest threat related to children’s healthy mental life. A very serious issue concerning the Internet. Though, internet can also create havoc, destruction and its misuse can be very fatal, the advantages of it outweigh its disadvantages.

38 Disadvantages Information overload lowers productivity True purpose of the Intranet is unknown to many employees/departments Hidden or unknown complexity and costs Productivity problem Unauthorized access Abuse of access Denial of service Security problem A company may not have person to update their Fear of sharing information and the loss of control Limited bandwidth for the business Management problem Intranet on a routine basis

39 Clients, partners, customers Layered System View Intranet Extranet Internet Corporate members Global society: competitors

40 15-441 Networks Fall 2002 40 Security related URLs http://www.robertgraham.com/pubs/network- intrusion-detection.html http://www.robertgraham.com/pubs/network- intrusion-detection.html http://online.securityfocus.com/infocus/1527 http://www.snort.org/ http://www.cert.org/ http://www.nmap.org/ http://grc.com/dos/grcdos.htm http://lcamtuf.coredump.cx/newtcp/

41 Questions ? THE END Thank You


Download ppt "Fastip Intranet Security Presentation by :- Erjon Duka, Msc"

Similar presentations


Ads by Google