Download presentation
Presentation is loading. Please wait.
Published byJordan Chapman Modified over 8 years ago
1
Fastip Intranet Security Presentation by :- Erjon Duka, Msc eduka@fastip.edu.al www.fastip.edu.al www.uamd.edu.al
2
Why Intranet Security ?
3
Fastip Fedora 13.1 Netork –File Browser
4
What is Intranet ? Internal company network that uses Internet standards (HTML, HTTP & TCP/IP protocols) & software. Accessed only by authorized persons, especially members or employees of the organization An internal corporate network built using Internet and World Wide Web standards and products that allows employees of an organization to gain access to corporate information
5
Log In
6
URL : 192.168.1.187
7
http://192.168.1.187
8
Fastip Fedora 13 Server ( Intranet Aplication is here
9
Fastip File Server
10
Why Intranet ? Ubiquitous access to staff Improved internal communication Improved access to information Improved productivity Promote user participation Improved management Open platform architecture - plenty of add-on applications available Existing information sources can be easily migrated to the desktop using Web technology Faster information delivery at lower costs Relatively quick and easy to set up Scaleable: start small, and grow as needed End User training - most users are familiar with browser operation
11
Fastip Server Active Network Connections
12
Super User Administrator
13
Other User Structure
14
Intranet User Categories
15
Fedora Server User Menager
16
Intranet Security Two levels of Security required: Internal It can be imposed by Public Key Security & Encryption Key. External Through Firewall.
17
Some interesting Intranet Links Library of Congress http://lcweb.loc.gov PointCast http://www.pointcast.com In-Box Direct http://www.netscape.com Online Career Center http://occ.com New York Times http://www.nytimes.com Project Gutenberg http://www.gutenberg.org Sportsline USA http://www.sportsline.com White House http://www.whitehouse.gov MIT Lab for Computer Science http://www.lcs.mit.edu The Wall Street Journal http://www.wsj.com http://www.wsj.com
18
UAMD and FASTIP links :
19
Personal File Sharing Preferences
20
Search Engine Links In Fastip Intranet : Altavista http://www.altavista.digital.com Excite http://www.excite.com Galaxy http://www.einet.net Hotbot http://www.hotbot.com Infoseek http://www.infoseek.com Lycos http://www.lycos.com Webcrawler http://www.webcrawler.com Yahoo! http://www.yahoo.com
21
Joomla 16 Vmware Player Aplication
22
Opening Joomla
23
Kerberos Authentication Configuration
24
Network Proxy Preferences Fedora Server 13.1
25
SELinux Administration ( Fedora ) HDD : 900GB, RAM:8GB 8Processors
26
Samba Server Configuration
27
Samba Server Configuration 2
28
FTP Fastip FTP File Transfer Protocol is used to access websites via a different door to download files.
30
What is Firewall ? Security device located between firm’s internal network (intranet) & external network (internet). Regulates access into & out of a company’s network based on a set of rules. Note : needs to be upgraded from time to time to check latest potential security problems. A device that sits between your internal network and the outside Internet and limits access into and out of your network based on your organization’s access policy
31
Firewall A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. There are several types of firewall techniques: – Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing. – Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation. – Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking. – Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.
32
32 Firewalls Intranet DMZ Internet Firewall Web server, email server, web proxy, etc
33
Fastip Firewall
34
Network Device Control
35
Applications of Intranet Sharing of company policies/rules & regulations Access employee database Distribution of circulars/Office Orders Access product & customer data Sharing of information of common interest Launching of personal/departmental home pages Submission of reports Corporate telephone directories
36
Messaging and VoIP Assistant
37
Disadvantages of Internet Theft of personal information such as name, address, credit card number etc. Virus threats nothing but a program which disrupts the normal functioning of your system. Spamming refers to receiving unwanted e-mails in bulk, which provide no purpose and needlessly obstruct the entire system. Pornography This is perhaps the biggest threat related to children’s healthy mental life. A very serious issue concerning the Internet. Though, internet can also create havoc, destruction and its misuse can be very fatal, the advantages of it outweigh its disadvantages.
38
Disadvantages Information overload lowers productivity True purpose of the Intranet is unknown to many employees/departments Hidden or unknown complexity and costs Productivity problem Unauthorized access Abuse of access Denial of service Security problem A company may not have person to update their Fear of sharing information and the loss of control Limited bandwidth for the business Management problem Intranet on a routine basis
39
Clients, partners, customers Layered System View Intranet Extranet Internet Corporate members Global society: competitors
40
15-441 Networks Fall 2002 40 Security related URLs http://www.robertgraham.com/pubs/network- intrusion-detection.html http://www.robertgraham.com/pubs/network- intrusion-detection.html http://online.securityfocus.com/infocus/1527 http://www.snort.org/ http://www.cert.org/ http://www.nmap.org/ http://grc.com/dos/grcdos.htm http://lcamtuf.coredump.cx/newtcp/
41
Questions ? THE END Thank You
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.