90 research outputs found

    Building a Secure Intranet

    Get PDF
    This thesis will explain the vulnerabilities of computers in a networking environment and demonstrate proper procedures for building a secure Intranet. The Internet is built around the concept of open communication. Data is shared around the globe just as easily as it is from one office or cubical to the next. Corporations are skeptical about putting company data on such a public transport mechanism as the Internet, but the tools used on the Internet are exciting and everyone wants to use them. Out of a desire for the best of both worlds, the Intranet was born. An intranet that has no connection to the Internet can safely make a significant amount of company data available to employees, but when hosts are connected to the Internet, things change. Each application on the Internet comes with a threat to a company\u27s data. More office managers would probably install and use an Intranet if they understood them better and trusted them more. The purpose of his paper is to educate the non-technical manager in the subject of Internet applications and security mechanisms so that he or she can make an informed decision about installing an Intranet. There is so much software available for building and securing a Web site that many feel overwhelmed at the prospect of getting started. The goal will be to define the terms and acronyms used in this technology, and to evaluate the services and software available for building a secure Intranet. Securing a Web site requires some knowledge of TCP/IP, routers, firewalls and data encryption. These subjects will be covered at an introductory level with the goal of enabling the reader to understand the issues involved. The work will terminate in a project that builds an Intranet that shares data with a selective audience while securing it from others. The hardware and software configuration will be documented as a sample that can be duplicated in any office environment. The Web site will be built using some HTML coding to demonstrate the complexity of the language and some high-level software that demonstrates the value of these new tools. Two security specialists evaluated the project. They agreed that an Intranet built with the specifications in the project would be functional and secure

    The World Wide Web

    Get PDF

    The Need For Hands-On IT Classes

    Get PDF
    This paper describes why SIU needs a class that incorporates hands on in an advance telecommunications course. It gives a brief history of the Internet along with the need for IT skilled workers their education and the future expectations of the Internet. The paper also gives an example of what the class structure would be. This class has some differences between the two networking courses already in existences regards to their outcomes. ELM 415 would be very Hands-on type of course where students spend a great deal of time in lab installing and configuring software and hardware. The assessment would be primarily performance based, where they have to demonstrate working systems. The course would be a last in a series of courses that have been designed so that students who wish to put in a little more time on their own can be prepared to take the Cisco Certified Network Associate certification test. The prerequisite courses to ELM 415 are similar in that they are very lab intensive with a focus on installation, configuration, and troubleshooting. With a large growth and need in the IT field, SIU needs to take advantage of this and advance students in their personal growth and education. SIU also can take advantage of the opportunity of economic growth, of which comes student enrollment and recognition in the field

    The InfoSec Handbook

    Get PDF
    Computer scienc

    Top 10 technologies and their impact on CPA\u27s

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/2474/thumbnail.jp
    corecore