answersLogoWhite

0


Best Answer

As the use of Intranets and Extranets has grown, so has the need for security. Intranet and Extranet security breaches can take a variety of forms. For example, (!) An unauthorized person, such as a contractor or visitor, might gain access to a company’s computer system. (!) An employee or supplier authorized to use the system for one purpose might use it for another. For example, an engineer might break into the HR database to obtain confidential salary information. (!) Confidential information might be intercepted as it is being sent to an authorized user. For example, an intruder might attach a network sniffing device to the network. While sniffers are normally used for network diagnostics, they can also be used to intercept data coming over the wire. (!) Users may share documents between geographically separated offices over the internet or Extranet, or telecommuters accessing the corporate Intranet from their home computer can expose sensitive data as it is sent over the wire. (!) Electronic mail can be intercepted in transit.

Fortunately, there are a variety of techniques available to address these security holes within Extranets and Intranets. Keep in mind five fundamental goals of a security system: Privacy, Authentication, Content Integrity, Non-repudiation, and Ease-of-use, a set of technologies have been developed over the past fifteen years that are particular well suited to meeting these five security goals. Broadly called Public Key Infrastructure (PKI), this technology allows organizations using open networks, such as TCP/IP Intranets and Extranets, to replicate or even improve on the mechanisms used to ensure security in the physical world. Envelopes and secure couriers are replaced with sophisticated methods of data encryption, which can ensure that messages are only read by their intended recipients. Physical signatures and seals are replaced with digital signatures which, in addition to ensuring that messages came from a particular entity, can also ensure that message was not altered by as much as one bit during transit. Identity documents, such as passports, employee ID cards, and business licenses, can be replaced with digital certificates (also known as Digital IDs). Finally, the various mechanisms for centralized control, audit, and authorization, such as those provided by corporate governance structures, industry boards, or trusted third parties such as Accountants, can be replicated in the digital world through the infrastructure used to managed encryption, digital signatures, and Digital IDs.

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What potential security problems do you see in the increasing use of intranets and extranets in business?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

How is the trend to open systems connectivity and interoperability related to business use of Internet Intranets and extranets?

How is the trend toward open systems, connectivity, and interoperability related to business use of the internet,


How is the trend toward open systems connectivity and interoperability related to business use of the Internet intranets and extranets?

How is the trend toward open systems, connectivity, and interoperability related to business use of the Internet,


Secure network used for electronic commerce by authorized users are called?

pg 220 extranets secure networks used for e business and accesible through the firms web site by authorized usuers :) if u use these answers you should also contribute right ones too! we all benifit


What connects parts of the intranets or different organizations and allows secure communications among business partners?

A Global Network


What is Savvion?

Savvion is a leading global provider of automated business process management solutions. Savvion Business Manager, is a comprehensive business process management platform, which enables to quickly transform business processes into flexible and manageable Web applications which can be distributed over intranets, extranets, and Internet. BusinessManager can address all the stages in the business life cycle: Define, Integrate, Deploy, Monitor, Analyze, Improve, and Control. Using Savvion, the business users and project team members define and share the current processes, collaborate on process improvements and the application can be rapidly developed and deployed which can deliver real-time visibility. Savvion is an automated business process management tool.


What has the author Mellanie Hills written?

Mellanie Hills has written: 'Intranet business strategies' -- subject(s): Intranets (Computer networks) 'Intranet Para Groupware' 'Intranet as Groupware' -- subject(s): Groupware (Computer software), Intranets (Computer networks)


Is Microsoft SharePoint a software suite?

SharePoint itself is better described as a platform which offers a lot of possibilities after installation and which can be enhanced. Let's explain in detail... customers need internet web sites, intranets and extranets. Within each web site there are different requirements: web content management (CMS), document management, search, business intelligence, forms and business processes. All of these requirements can be added to each web site. And instead of implementing everything from the scratch and with different solutions or service providers SharePoint offers an all in one platform.


What is intra business ecommerce?

All internal organizational activities involving exchange of goods, services or-information usually performed on intranets are included in this category.


What is potential to growth internally and externally for business production?

explain the potential for growth of a business internally


How should the In union movement respond structurally to the increasing globalization of business?

How should the union movement respond structurally to the increasing globalization of business?


What has the author Kevin Pagan written?

Kevin Pagan has written: 'Intranet firewalls' -- subject(s): Security measures, Computer networks, Business enterprises, Intranets (Computer networks)


How should unions deal with increasing globalization of business?

How should the union movement respond structurally to the increasing globalization of business?