Professional Documents
Culture Documents
02 Internet, Intranet, Extranet
02 Internet, Intranet, Extranet
ERP
Servers
Clients
Legacy
systems
Public/External Intranet E-mail
Internet Users servers
Web
Firewalls
servers
Databases
The Extranet
Extranet
Suppliers Intranet
VPN Firewall
Distributors VPN
Tunneling Internet
Intranet
VPN
Customers Firewall
Summary : Internet, Intranet, and Extranet
Extranet
Private and
Authorized groups
outside Shared in authorized
from collaborating
authorized collaborating group
companies
partners
Firewalls
• Definition of Firewall
•Enhanced Communications
• Improved internal communications
• Improved business partnership channels
• Effective marketing, sales and customer support
• Enhanced Productivity
• Just-in-time (JIT) information delivery
• Reduction of information overload
• Productive Collaboration between workgroups
Benefits of Extranet Application
•Business Enhancements
• Faster time to market
• Simultaneous engineering potential
• Lower design and production costs
• Improved client relationships
• Cost Reduction
• Reduced travel and meetings expenses
• Reduced administrative and operational costs
• Elimination of paper publishing costs
Information Systems Security & Threats
Security in e-business and e-commerce typically entails
setting in place systems that ensure:
• Authenticity - ensures that the parties to a transaction are
who they say they are.
• Integrity - ensures that data has not been modified or
altered or interfered with during transmission over the
internet.
• Confidentiality – Ensures that only the people exchanging
information are privy to the information exchanged, in
otherwords, only the recipient can view the material.
• Availability – Ensures that the transaction systems are
always reachable and can service customer requests at any
time, i.e. continuity and accessibility of internet services.
Information Systems Security & Threats
• Most Common threat on the net is Malicious
Software (malware).
• This is software designed to damage, destroy, or
deny service to the target system.
• Examples of malicious software include: virus,
worm, trojan horse, bot etc..
Types of Malware
• Virus – They have the ability to replicate themselves
by hooking them to the program on the host
computer like songs, videos etc and then they travel
all over the Internet.
• Worms – Worms are also self replicating in nature
but they don’t hook themselves to a program on
host computer. Worm can easily travel from one
computer to another if network is available and on
the target machine they will not do much harm,
they will for example consume hard disk space thus
slowing down the computer.
Types of Malware
• Trojan – The Trojan is different from the
viruses and worms in that heir purpose is to
conceal themselves inside the software that
seem legitimate and when that software is
executed they will do their task of either
stealing information or any other purpose for
which they are designed. They often provide
backdoor gateway for malicious programs or
users to enter your system and steal your
valuable data without your knowledge and
permission.
Types of Malware
• Bots –: They are automated processes that are
designed to interact over the internet without the
need of human interaction. Malicious bot can infect
one host and after infecting will create connection
to the central server which will provide commands
to all infected hosts attached to that network
called Botnet.
• Other malware include adware, spyware,
scareware, ransomware, rootkits etc.
Other Security Threats
• Theft of intellectual property means violation of intellectual
property rights like copyrights, patents etc.
• Identity theft means to act as someone else to obtain
person’s personal information or to access vital information
they have like accessing the computer or social media
account of a person by login into the account by using their
login credentials.
• Theft of equipment and information is increasing these days
due to the mobile nature of devices and increasing
information capacity.
• Sabotage means destroying company’s website and other
computing resources to cause loss of confidence on part of
its customer.
Security Measures
Security measures can include:
• Anti-virus and anti-malware solutions that ensure
systems are not infected by malicious code
• Firewall systems which keep out unwanted traffic
• Secure mail services with spam filters to reject
unwanted email messages
• Backup systems to take backup of all company data.
• Strong physical security measures like access control
to sensitive areas, biometric authentication and
many others