Search

EXTRANET-PALVELUIDEN TURVALLINEN JULKAISEMINEN INTERNETIIN

QR Code

EXTRANET-PALVELUIDEN TURVALLINEN JULKAISEMINEN INTERNETIIN

Degree Programme in Information Tecnology Riihimäki

Author Janne Pankkonen Year 2017

Subject Publication of the extranet services securely to the Internet.

ABSTRACT

Organizations need a secure way to publish intranet services with extranet system to external users. The works aim was to understand the system-, telecommunication- and application security aspects in publishing intranet services. The aim was also to find out professionals experiences about the extranet system security requirements.

The theoretical framework consists of basis of the telecommunication security, securi-ty of network applications and services as well as technical implementations used in extranet services. The empirical part of the research was using qualitative research interview where semi-structured interviews were used as a method. Cinia Oy which provides network services, telematic system solutions, software- and cloud services was used as an example case-company.

The research results were showing three different factors that were affecting to the secure launch of the intranet services. These were the devices/components, used technical methods/functions and human characteristics the employees. On technical methods and functions we should focus on the reliable access control. Other security functions do not matter if the user authentication grants access for the wrong persons to the system or gives too broad access rights.

Web applications are becoming more common and their security risks are increasing. To prevent this the applications should be developed already in the programming phase. Additionally also human factors such as the expertise and proactivity are need-ed when preventing new more sophisticated attacks to the internal network services.

As a further development we can investigate the usage of the system’s automated re-moval and restoration’s significance to the information security.

Keywords Reverse proxy, Extranet, Information security

Pages 41 p. + appendices 2 p.

Saved in: