answersLogoWhite

0

As the use of Intranets and Extranets has grown, so has the need for security. Intranet and Extranet security breaches can take a variety of forms. For example, (!) An unauthorized person, such as a contractor or visitor, might gain access to a company’s computer system. (!) An employee or supplier authorized to use the system for one purpose might use it for another. For example, an engineer might break into the HR database to obtain confidential salary information. (!) Confidential information might be intercepted as it is being sent to an authorized user. For example, an intruder might attach a network sniffing device to the network. While sniffers are normally used for network diagnostics, they can also be used to intercept data coming over the wire. (!) Users may share documents between geographically separated offices over the internet or Extranet, or telecommuters accessing the corporate Intranet from their home computer can expose sensitive data as it is sent over the wire. (!) Electronic mail can be intercepted in transit.

Fortunately, there are a variety of techniques available to address these security holes within Extranets and Intranets. Keep in mind five fundamental goals of a security system: Privacy, Authentication, Content Integrity, Non-repudiation, and Ease-of-use, a set of technologies have been developed over the past fifteen years that are particular well suited to meeting these five security goals. Broadly called Public Key Infrastructure (PKI), this technology allows organizations using open networks, such as TCP/IP Intranets and Extranets, to replicate or even improve on the mechanisms used to ensure security in the physical world. Envelopes and secure couriers are replaced with sophisticated methods of data encryption, which can ensure that messages are only read by their intended recipients. Physical signatures and seals are replaced with digital signatures which, in addition to ensuring that messages came from a particular entity, can also ensure that message was not altered by as much as one bit during transit. Identity documents, such as passports, employee ID cards, and business licenses, can be replaced with digital certificates (also known as Digital IDs). Finally, the various mechanisms for centralized control, audit, and authorization, such as those provided by corporate governance structures, industry boards, or trusted third parties such as Accountants, can be replicated in the digital world through the infrastructure used to managed encryption, digital signatures, and Digital IDs.

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

How is the trend to open systems connectivity and interoperability related to business use of Internet Intranets and extranets?

How is the trend toward open systems, connectivity, and interoperability related to business use of the internet,


How is the trend toward open systems connectivity and interoperability related to business use of the Internet intranets and extranets?

How is the trend toward open systems, connectivity, and interoperability related to business use of the Internet,


Secure network used for electronic commerce by authorized users are called?

An extranet provides controlled access to selected company resources for trusted users outside the organization, supporting safe online transactions and data exchange. Security-focused companies like SafeAeon help maintain the integrity of such networks through advanced encryption, firewalls, and continuous monitoring to ensure confidential and reliable communication.


What connects parts of the intranets or different organizations and allows secure communications among business partners?

A Global Network


What is Savvion?

Savvion is a leading global provider of automated business process management solutions. Savvion Business Manager, is a comprehensive business process management platform, which enables to quickly transform business processes into flexible and manageable Web applications which can be distributed over intranets, extranets, and Internet. BusinessManager can address all the stages in the business life cycle: Define, Integrate, Deploy, Monitor, Analyze, Improve, and Control. Using Savvion, the business users and project team members define and share the current processes, collaborate on process improvements and the application can be rapidly developed and deployed which can deliver real-time visibility. Savvion is an automated business process management tool.


What has the author Mellanie Hills written?

Mellanie Hills has written: 'Intranet business strategies' -- subject(s): Intranets (Computer networks) 'Intranet Para Groupware' 'Intranet as Groupware' -- subject(s): Groupware (Computer software), Intranets (Computer networks)


Is Microsoft SharePoint a software suite?

SharePoint itself is better described as a platform which offers a lot of possibilities after installation and which can be enhanced. Let's explain in detail... customers need internet web sites, intranets and extranets. Within each web site there are different requirements: web content management (CMS), document management, search, business intelligence, forms and business processes. All of these requirements can be added to each web site. And instead of implementing everything from the scratch and with different solutions or service providers SharePoint offers an all in one platform.


What is intra business ecommerce?

All internal organizational activities involving exchange of goods, services or-information usually performed on intranets are included in this category.


What is the business value driving so many companies to rapidly install and extend intranets throughout their organization?

The rapid installation and extension of intranets in organizations is primarily driven by the need for improved communication and collaboration among employees. Intranets facilitate efficient information sharing, streamline workflows, and enhance team collaboration, ultimately leading to increased productivity. Additionally, they support better knowledge management and foster a more cohesive corporate culture, which can enhance employee engagement and retention. Overall, the business value lies in optimizing operational efficiency and driving innovation through connectedness.


What has the author Kevin Pagan written?

Kevin Pagan has written: 'Intranet firewalls' -- subject(s): Security measures, Computer networks, Business enterprises, Intranets (Computer networks)


How should the In union movement respond structurally to the increasing globalization of business?

How should the union movement respond structurally to the increasing globalization of business?


How should unions deal with increasing globalization of business?

How should the union movement respond structurally to the increasing globalization of business?