PROTECTION OF THE INTRANET WEB RESOURCE FROM EXTERNAL AND INTERNAL THREATS
DOI:
https://doi.org/10.28925/2663-4023.2024.23.318327Keywords:
intranet security; external and internal threats; architecture; security systems; security policies.Abstract
This article focuses on the analysis and development of strategies to protect INTRANET web resources from external and internal threats. Protection approaches include the use of network security measures such as firewalls and VPNs, as well as the implementation of user identification and access control mechanisms. The importance of data protection at various levels of infrastructure, from the network level to the application level, is explored. Key protection methods and technologies such as data encryption, network authentication protocols, and intrusion detection systems (IDS) are discussed. Additionally, access restriction strategies, including access rights management and user activity monitoring, are addressed. Important aspects of internal threats such as information leakage and unauthorized employee access are highlighted. The research concludes with recommendations for developing a comprehensive protection strategy to ensure the security of INTRANET web resources.
Downloads
References
Contributors to Wikimedia projects. (2002). Intranet - Wikipedia. Wikipedia, the free encyclopedia. https://en.wikipedia.org/wiki/Intranet
Intranet Security Best Practices: How to Protect Your Network. (n.d.). AnyforSoft. https://anyforsoft.com/blog/intranet-security/
Ganore, P. (2017). What Is A Web Server And How Does It Function? Milesweb. https://www.milesweb.com/blog/hosting/web-server-function/
Good practices to ensure the security of your Intranet. (n.d.). MOZZAIK. https://www.mozzaik365.com/intranet/best-practices-for-intranet-security
External and Internal Threats | WithSecure. (n.d.). Cybersicherheitslösungen für Unternehmen| WithSecure™. https://www.withsecure.com/en/expertise/blog-posts/external-and-internal-threats
Firewall for Intranet Security. (n.d.). researchgate. https://www.researchgate.net/publication/347774798_Firewall_for_Intranet_Security
Financial activities on the Internet: corporate and private networks. (2011). osvita.ua. https://ru.osvita.ua/vnz/reports/bank/19820/
Contributors to Wikimedia projects. (2002). Proxy server - Wikipedia. Wikipedia, the free encyclopedia. https://en.wikipedia.org/wiki/Proxy_server
Piddubnyi, M. (2023). The OSI model is simply. dou.ua. URL: https://dou.ua/forums/topic/46215/#:~:text=%D0%9C%D0%BE%D0%B4%D0%B5%D0%BB%D1%8C%20Open%20Systems%20Interconnection%20(OSI,%D0%B2%D0%B8%D0%B7%D0%BD%D0%B0%D1%87%D0%B0%D1%94%2C%20%D1%8F%D0%BA%20%D0%B2%D1%96%D0%B4%D0%B1%D1%83%D0%B2%D0%B0%D1%82%D0%B8%D0%BC%D0%B5%D1%82%D1%8C%D1%81%D1%8F%20%D0%BE%D0%B1%D0%BC%D1%96%D0%BD%20%D0%B4%D0%B0%D0%BD%D0%B8%D0%BC%D0%B8
Participants in Wikimedia projects. (2006). TCP/IP — Wikipedia. Wikipedia. https://uk.wikipedia.org/wiki/TCP/IP#:~:text=Стабільну%20версію%20було%20перевірено%2014,»)%20і%20TCP%20
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Лариса Крючкова, Михайло Ємельяненко
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.