PROTECTION OF THE INTRANET WEB RESOURCE FROM EXTERNAL AND INTERNAL THREATS

Authors

DOI:

https://doi.org/10.28925/2663-4023.2024.23.318327

Keywords:

intranet security; external and internal threats; architecture; security systems; security policies.

Abstract

This article focuses on the analysis and development of strategies to protect INTRANET web resources from external and internal threats. Protection approaches include the use of network security measures such as firewalls and VPNs, as well as the implementation of user identification and access control mechanisms. The importance of data protection at various levels of infrastructure, from the network level to the application level, is explored. Key protection methods and technologies such as data encryption, network authentication protocols, and intrusion detection systems (IDS) are discussed. Additionally, access restriction strategies, including access rights management and user activity monitoring, are addressed. Important aspects of internal threats such as information leakage and unauthorized employee access are highlighted. The research concludes with recommendations for developing a comprehensive protection strategy to ensure the security of INTRANET web resources.

Downloads

Download data is not yet available.

References

Contributors to Wikimedia projects. (2002). Intranet - Wikipedia. Wikipedia, the free encyclopedia. https://en.wikipedia.org/wiki/Intranet

Intranet Security Best Practices: How to Protect Your Network. (n.d.). AnyforSoft. https://anyforsoft.com/blog/intranet-security/

Ganore, P. (2017). What Is A Web Server And How Does It Function? Milesweb. https://www.milesweb.com/blog/hosting/web-server-function/

Good practices to ensure the security of your Intranet. (n.d.). MOZZAIK. https://www.mozzaik365.com/intranet/best-practices-for-intranet-security

External and Internal Threats | WithSecure. (n.d.). Cybersicherheitslösungen für Unternehmen| WithSecure™. https://www.withsecure.com/en/expertise/blog-posts/external-and-internal-threats

Firewall for Intranet Security. (n.d.). researchgate. https://www.researchgate.net/publication/347774798_Firewall_for_Intranet_Security

Financial activities on the Internet: corporate and private networks. (2011). osvita.ua. https://ru.osvita.ua/vnz/reports/bank/19820/

Contributors to Wikimedia projects. (2002). Proxy server - Wikipedia. Wikipedia, the free encyclopedia. https://en.wikipedia.org/wiki/Proxy_server

Piddubnyi, M. (2023). The OSI model is simply. dou.ua. URL: https://dou.ua/forums/topic/46215/#:~:text=%D0%9C%D0%BE%D0%B4%D0%B5%D0%BB%D1%8C%20Open%20Systems%20Interconnection%20(OSI,%D0%B2%D0%B8%D0%B7%D0%BD%D0%B0%D1%87%D0%B0%D1%94%2C%20%D1%8F%D0%BA%20%D0%B2%D1%96%D0%B4%D0%B1%D1%83%D0%B2%D0%B0%D1%82%D0%B8%D0%BC%D0%B5%D1%82%D1%8C%D1%81%D1%8F%20%D0%BE%D0%B1%D0%BC%D1%96%D0%BD%20%D0%B4%D0%B0%D0%BD%D0%B8%D0%BC%D0%B8

Participants in Wikimedia projects. (2006). TCP/IP — Wikipedia. Wikipedia. https://uk.wikipedia.org/wiki/TCP/IP#:~:text=Стабільну%20версію%20було%20перевірено%2014,»)%20і%20TCP%20

Downloads


Abstract views: 72

Published

2024-03-28

How to Cite

Kriuchkova, L., & Yemelianenko , M. (2024). PROTECTION OF THE INTRANET WEB RESOURCE FROM EXTERNAL AND INTERNAL THREATS. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(23), 318–327. https://doi.org/10.28925/2663-4023.2024.23.318327

Most read articles by the same author(s)