18 Dec 2022

82

Analysis of ING Life’s Extranet Infrastructure

Format: APA

Academic level: Master’s

Paper type: Case Study

Words: 1113

Pages: 4

Downloads: 0

Risks associated with using the internet as part of a private business solution 

An extranet is a private network that connects to the internet. It allows access to the private network’s information by authorized people. For a company to implement an extranet, an organization’s intranet is connected to the web. The server that stores web pages lodges behind a firewall that controls entree to the intranet from the internet. The firewall permits access to information by users depending on their clearance levels which are determined by varying authentication parameters. ING insurance company implemented an extranet from the year 1997 to facilitate communication between its regional offices and the over two thousand brokers dealing in their products. Though fast and somewhat secure, using the Internet to allow access to sensitive company data, for instance, client records can bear catastrophic results in the case of a security breach (Newman, 2010).

Extranets are vulnerable to attacks and risks of being compromised just like any other computer system. Hackers can dig through an extranet looking for vulnerabilities to exploit and interfere with its integrity, rendering it useless or even unavailable to its users. For instance, a hacker can infiltrate the system and pose as the receiving party on one end of an online information exchange platform. This phenomenon is known as Man in the Middle (MITM). The cyberpunk can then use the information they acquire to commit identity theft. Corporations can attack their competitors’ systems in a deliberate attempt to slow down or halt their service delivery capabilities. Business organizations are known to infect rival computer networks with malware to steal vital company information; a crime commonly referred to as corporate espionage (Newman, 2010).

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Apart from deliberate actions to compromise computer systems, there are other several ways through which they become slow or totally non-functional. If an extranet has a small and uncontrolled bandwidth link, connection continually fails. As a result, communication between say ING’s headquarters and a broker seeking some information is cut off or delayed, which can cause losses due to the inconvenience. Factors beyond anyone’s control can interfere with an extranet. For instance, a storm can destroy an Internet Service Provider’s (ISP) infrastructure immediately causing the link to provider failure. Power surges destroy servers, routers, switches and other extranet equipment leading to the destruction of critical company information. Extranets are expensive to set up, and they abbreviate contact between businesses and their customers. This minified reach drives a feeling of alienation and reduces customer and client loyalty, which dangerous for any company.

ING’s extranet security measures and their adequateness 

The core security feature in ING’s Life’s extranet was the Cisco PIX (Private Internet eXchange) firewall. The firewall enforced a security policy using a proprietary embedded system which increased its protection capabilities, enhanced scalability and lessens complexity. It had several features that allowed it to serve its purpose. The access lists feature set up access lists if the security policy restricted outgoing connections. The Adaptive Security Algorithm lineament monitored return packets to ascertain their validity. It also created stochastic TCP sequence numbers to minimize exposure to TCP sequence number attacks. The firewall blocked Active X technologies that are notorious for causing computer network failures. Using the Flood Defender, PIX protected internal systems from SYN floods. The Graphical User Interface with a firewall manager enforced password protection and confines access to the HTML interface to defined client systems within the internal network (Riley, 2005).

Cut through proxies in the Cisco Pix firewall controlled administrative connections and provided inward certification. The Identity feature allowed the outside interface to view internal network addresses. Mail Guard imposed Simple Mail Transfer Protocol (SMTP) commands to defend the SMTP server from crashing and also logged every SMTP connection. The Network Translation (NAT) and Port Address Translation (PAT) features concealed the actual network identity of internal systems from the external network. The modified installation setup wizard eradicated most configuration troubles (Riley, 2005).

From all these sophisticated security and protection features, one would easily assume that the PIX platform was 100 percent foolproof. However, just like any other system, this too was vulnerable to attacks. A National Security Agency (NSA) related outfit, the Equation group hacked into the Cisco PIX Virtual Private Network (VPN) using a password revealing tool they developed. The public that the NSA exploited this exposure to bug virtual private networks for many years raise such questions as how safe are extranets? And how active firewalls are?

Some firewalls have overly strict restriction policies. These rules sometimes inhibit legitimate staff members from executing their duties properly. This entrammels productiveness and performance and can even actuate workers to come up with ways of going around the firewall to do their jobs. When employees use backdoors around the firewalls and into the system, it exposes the entire system to external attacks. Software based firewalls occupy vast memory space and use up a lot of processor power when running, slowing down the computer system’s functioning. Firewalls only inhibit uncertified transmission of information; they do not protect a system against malware, viruses, and spyware. Firewalls are designed to defend a computer network against external threats; they are nakedly exposed to assaults from the inside. This is to say that a disgruntled staff member with ulterior motives can easily compromise and destroy the whole system. Firewalls are expensive to install and maintain. Software firewalls call for a considerable investment in terminals while hardware firewalls need to be mounted on every network node. Maintenance of the firewall is also a costly venture (Newman, 2010).

Alternatives to the extranet model of communication 

Having exhausted analysis of the extranet model, its features and its ups and downs, we should explore other technologies in place to facilitate communication and interaction within and between companies. The list of alternatives to the extranet is long, but the Remote Desktop and cloud computing are two of the most viable options for companies looking to automate operations and communications in a convenient and secure manner. Remote desktop technology allows an operating system and application software to reside on a central server but runs simultaneously on several local hosts. The fact that all files and applications are stored in a secure server ensures their safety even when local nodes are threatened or compromised.

Cloud computing smoothens an organization’s operations in ways that were previously deemed impossible. The cloud provides everything a company needs including remote monitoring, desktop, and workstation supervision instruments, removed data backup tools, e-mail archiving technology and antiviruses. Private cloud services ensure top notch security and super-fast access speeds when portioning out the internet with other users on a populace connection. Most cloud-based applications are compatible with modern technological gadgets including smart televisions and phones, tablets, personal computers, and workstations (Halpert, 2011).

For an organization to succeed in today’s competitive and staggeringly dynamic business environment, it must communicate and engage clients in real-time. Long Term Evolution (LTE) networks, which are supported by the cloud, have made this possible. Cloud helped secure video conferencing tools allow employees based away from a company’s headquarters to operate and interact smoothly with others in all the branches. Cloud computing has facilitated the globalization of many startups and small businesses. By exploiting cloud computing services and facilities, small and medium enterprises have metamorphosed into full-blown multinationals. Technology has driven innovation, development, and expansions in all sectors of life. It has also driven cybercrime. It is, therefore, important to always have modern network security apparatus, which should be regularly updated and improved (Halpert, 2011).

References

Halpert, B. (2011). Auditing cloud computing: a security and privacy guide. Hoboken, NJ: John Wiley & Sons.

Newman, R. C. (2010). Computer security: protecting digital resources . Sudbury, MA: Jones and Bartlett.

Riley, C. (2005). Cisco Pix firewalls configure, manage, & troubleshoot . Rockland, MA: Syngress.

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 17). Analysis of ING Life’s Extranet Infrastructure.
https://studybounty.com/analysis-of-ing-lifes-extranet-infrastructure-case-study

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

How AI Can Help Retailers Solve Business Problems

The global marketplace is currently more integrated than ever before. This situation presents a never-before experienced opportunity for retailers. Multinational organizations whose sole basis is the internet have...

Words: 2700

Pages: 5

Views: 138

The Natural Organizational Model and the Informal Groups

The nature of an organization is based on different factors such as the environment it is set up in. also, the type of activity it undertakes. This paper will examine the natural organizational model, the informal...

Words: 3009

Pages: 10

Views: 239

Why Pinkberry should focus on making orange and yellow the two prevailing colours

The fact that Pinkberry has evolved from a storefront to a nationally recognized brand makes this franchise of frozen dessert yogurt shops an example to be followed. Yes, the personality of a brand created a platform...

Words: 582

Pages: 2

Views: 93

Ford Motors: Board Presentation For Electric and Hybrid cars Production

Executive Summary The motor vehicle industry in America and worldwide is highly competitive with major players no longer enjoying the dominance that they had had before. Innovation and identification of trends...

Words: 1088

Pages: 4

Views: 129

Home Remodel Project Plan

Project Overview Home remodeling is one of the notable key projects undertake through project management, as a project manager is expected to come up with a clear plan that would help in meeting the expected...

Words: 2152

Pages: 8

Views: 68

How Airbnb Achieved Success

Hospitality industry includes firms that provide lodging and dining services for customers. Many of the businesses in the travel and hospitality industry offer customers with prepared meals, accommodation, snacks,...

Words: 906

Pages: 3

Views: 63

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration