QUES.24 - What Is Intranet? Discuss The Features and Architecture of Intranet With The Help of A Diagram
QUES.24 - What Is Intranet? Discuss The Features and Architecture of Intranet With The Help of A Diagram
90
Providing personalized content to employees based on their role within the
company.
A secure and reliable intranet requires a web server that is responsible for
managing all requests for files hosted on the server, finding the requested file and
delivering it to the appropriate computer. A content management system (CMS)
should also be set up to control the creation, publication and management of
content on the intranet.
An intranet may also consist of many interlinked local area networks (LANs) as
well as leased lines in the wide area network (WAN). It uses TCP/IP, HTTP, and
other Internet protocols (IP). Typically, an intranet includes connections through
one or more gateway computers to the outside Internet.
An employee who wants to access the intranet must have a special network
password and be connected to the LAN. However, an employee working remotely
can gain access to the intranet through a virtual private network (VPN). The VPN
allows users who are not actually connected to the required LAN to sign into the
intranet and access all the same information and functions that would be available
had they been connected to the LAN.
91
an extranet. The firewall is especially important for intranet networks that include
extranet extensions.
The intranet generally looks like a private version of the Internet. With tunneling,
companies can send private messages through the public network while using
special encryption/decryption and other security safeguards to connect one part of
their intranet to another.
The ability for human resources to manage employee records and for
customer service representatives to track help requests.
The use of the intranet as a testing environment for new ideas before they
are implemented on the company's Internet webpage.
A loss of interest amongst users after the initial excitement and novelty of
the intranet has worn off, also resulting in a lack of content.
92
QUES.25 – Write short note on:
Information Management:
Travel system
93
Marketing:
Customer support
Customer surveys
Workflow:
Process control
Productivity monitoring
Activity-Based Costing
Communications enhancement:
Secure communications
Registration form
Internet telephone
Threaded discussions
Chat server
94
Push technology
Web email
Document Management:
News
File servers
Forms server
Search tools
Training:
Online training
Collaborative training
Advantages of Intranet
Intranets offering workforce productivity which can help user to find and
observe information very fast. User may also use applications according to
their roles and tasks. Through web browser a user can get access to entire
contents of any website from anywhere or any time. Intranet also increase
95
the ability of employee’s by performing their job confidently very fast, and
accurately.
Now intranet facilitates their user o view and gets information and data via
web browser. Intranet also save the money of any organization on printing,
publishing and overall maintenance.
Through Intranet common corporate culture every user can view the similar
information.
96
Intranet offer improve teamwork through which teamwork is enabled and all
certified users can get access to information.
Disadvantages of Intranet
Intranet has great features for interconnected manners but has some
disadvantages too
The cost of intranet is very high but has lots of advantages after
implementing.
97
Q26 – Give a brief description on intranet security design. Also
discuss various threats in an Intranet.
ANS The Security Features & Design practice is charged with creating usable
security patterns for major security controls (meeting the standards defined in the
Standards and Requirements practice), building middleware frameworks for those
controls, and creating and publishing other proactive security guidance.
Rather than having each project team implement its own security features (e.g.,
authentication, role management, key management, audit/log, cryptography,
protocols), the SSG provides proactive guidance by acting as a clearinghouse of
security features for development groups to use. These features might be
discovered during code review, created by the SSG or a specialized development
team, or be part of a library provided by a vendor, such as a cloud service provider.
Generic security features often have to be tailored for specific platforms. A mobile
crypto feature will likely need at least two versions to cover Android and iOS,
while managing identity in the cloud might require versions specific to AWS,
Google, and Azure. Project teams benefit from implementations that come
preapproved by the SSG, and the SSG benefits by not having to repeatedly track
down the kinds of subtle errors that often creep into security features.
98
Security Features & Design Level 2
The SSG contributes to new architecture and solves difficult design problems,
minimizing the negative impact that security has on other constraints (time to
market, price, etc.). If a skilled security architect from the SSG is involved in the
design of a new protocol, he or she can analyze the security implications of
existing protocols and identify elements that should be duplicated or avoided.
Likewise, having a security architect understand the security implications of
moving a seemingly well-understood application to the cloud saves a lot of
headaches later. Designing for security up front is more efficient than analyzing an
existing design for security and refactoring when flaws are uncovered, so the SSG
should be involved early in the new project process. Note that some design
problems will require specific expertise outside of the SSG: even the best expert
can’t scale to cover the needs of an entire software portfolio.
99
Security Features & Design Level 3
Implementers take their security features and frameworks from an approved list or
repository. There are two benefits to this activity: developers don’t spend time
reinventing existing capabilities, and review teams don’t have to contend with
finding the same old defects in new projects or when new platforms are adopted.
Essentially, the more a project uses proven components, the easier testing, code
review, and architecture analysis become (see [AA1.1 Perform security feature
review]). Reuse is a major advantage of consistent software architecture and is
particularly helpful for agile development and velocity maintenance in CI/CD
pipelines. Container-based approaches make it especially easy to package and
reuse approved features and frameworks (see [SE3.4 Use application containers]).
[SFD3.3: 4] Find and publish mature design patterns from the organization.
The SSG fosters centralized design reuse by collecting design patterns (sometimes
referred to as security blueprints) from across the organization and publishing them
for everyone to use. A section of the SSG website could promote positive elements
identified during architecture analysis so that good ideas are spread. This process is
formalized: an ad hoc, accidental noticing isn’t sufficient. In some cases, a central
architecture or technology team can facilitate and enhance this activity. Common
design patterns accelerate development, so it’s important to use secure design
100
patterns not just for applications but for all software (microservices, APIs,
frameworks, infrastructure, and automation).
The issue of intranet security is usually met with stifled yawns or glazed eyes when
it’s mentioned in the office. Often there’s an assumption that because it’s an
internal network, the intranet site is somehow magically secure from viruses and
hacking. But the issue of intranet security goes beyond external threats. Ensuring
that the right staff are accessing the right information is also an important part of
intranet security. In this article, we look at what you need to be doing to ensure the
security of the office intranet.
It’s best to use a firewall to mitigate against external threats. In simple terms,
a firewall is a protective barrier between the intranet and the internet. It is a
software program or a hardware device that filters the information coming through
to the intranet from the internet. Firewalls may decide to allow or block network
traffic between devices based on the rules that are pre-configured or set by the
firewall administrator.
Firewalls provide security for a number of online threats, and while they cannot
guarantee against all threats, they are an essential first line of defence.
Security Breaches
From time to time, the intranet may encounter suspicious traffic such as spam,
phishing, spyware or malware. Using an effective email filter and firewall will help
to block this suspicious traffic.
Viruses
101
Most organizations understand they need to have anti-virus software installed.
However, the threat from viruses is constantly changing, and so it is vital that you
regularly update the software with the latest versions.
Weak Passwords
Too often users have weak passwords, share them with colleagues, never change
them and sometimes they even write them down or tape them to their PCs. The
intranet should be set up so that employees are required to change their passwords
on a regular basis (every 60 days should be standard) and to use passwords of a
minimum length and a combination of letters, numbers and keyboard symbols (for
example, H2pl#5%).
Access Control
Are the right employees accessing the right information? Brian in Sales should not
be able to access sensitive boardroom minutes. Similarly, Jenny in Marketing
should not be able to view employees’ pay details. Access to information can be
secured on the intranet via a series of file permissions and page permissions. These
permissions can be set by a job title, team function, geographic location – whatever
is appropriate for that data.
Allied to this is the need to ensure that permissions are reviewed on a regular basis.
There have been instances where employees have been able to access sensitive
information by a job role they had some ten years ago! Likewise, employees who
no longer work for the company must have their access deleted as soon as they
leave.
102
Q27 – What is a communication protocol? Discuss its types with the
help of diagrams.
ANS. In telecommunication, a communication protocol is a system of rules that
allow two or more entities of a communications system to transmit information via
any kind of variation of a physical quantity. The protocol defines the rules, syntax,
semantics and synchronization of communication and possible error recovery
methods. Protocols may be implemented by hardware, software, or a combination
of both.
103
Types of Communication Protocols :-
6. File Transfer Protocol (FTP): FTP allows users to transfer files from one
machine to another. Types of files may include program files, multimedia
files, text files, and documents, etc.
104
7. Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a
hypertext among two or more systems. HTML tags are used for creating
links. These links may be in any form like text or images. HTTP is designed
on Client-server principles which allow a client system for establishing a
connection with the server machine for making a request. The server
acknowledges the request initiated by the client and responds accordingly.
9. Telnet: Telnet is a set of rules designed for connecting one system with
another. The connecting process here is termed as remote login. The system
which requests for connection is the local computer, and the system which
accepts the connection is the remote computer.
Some other popular protocols act as co-functioning protocols associated with these
primary protocols for core functioning. These are:
105
106