Computer Security
An extranet is similar to an intranet but it enables the firm’s business partners (e.g., suppliers or customers) to access the firm’s intranet
Once an organization links its network to the Internet theoretically anyone can access the firm’s network. With respect to an extranet, firms want to restrict access to business partners. A virtual private network provides the security mechanism for accomplishing this. A VPN uses a combination of public and private lines to build a secure extranet. The link between the firm’s network and the Internet is often called a “tunnel.” A VPN provides a secure tunnel.
VPNs are also required for firms with extensive intranets (multi-site firms)An extranet is similar to an intranet but it enables the firm’s business partners (e.g., suppliers or customers) to access the firm’s intranet
Once an organization links its network to the Internet theoretically anyone can access the firm’s network. With respect to an extranet, firms want to restrict access to business partners. A virtual private network provides the security mechanism for accomplishing this. A VPN uses a combination of public and private lines to build a secure extranet. The link between the firm’s network and the Internet is often called a “tunnel.” A VPN provides a secure tunnel.
VPNs are also required for firms with extensive intranets (multi-site firms)An extranet is similar to an intranet but it enables the firm’s business partners (e.g., suppliers or customers) to access the firm’s intranet
Once an organization links its network to the Internet theoretically anyone can access the firm’s network. With respect to an extranet, firms want to restrict access to business partners. A virtual private network provides the security mechanism for accomplishing this. A VPN uses a combination of public and private lines to build a secure extranet. The link between the firm’s