SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
“A BUSINESS TOOL YOU CANNOT AFFORD TO BE WITHOUT”
• 100% secure, fixed operating cost,
private network.
• No usage charge.
• Set-up cost pay back
in 1 to 2 years
• Ideal communications backbone
for ERP
• Cuts present telecom costs
by up 50 to 75%.
• Unlimited inter -locational
communications - speech, fax, data.
• High network up -times.
DELHI
MUMBAI
KOLKATA
CHENNAI
• Voice and voice -data conferencing.
• Integrates voice, fax, data over
analogue and digital leased lines.
• Connects any place in the world.
• Group III fax - no time lost in
document scanning.
• While PVDTN gives all the benefits
enumerated herein by isolating the
INTRANET from public domain access,
STS ensures simultaneous presence on the
Internet through the public server PS
connected to the Internet LAN, and ensures
free flow of information / data / mail back and
forth between the Internet and the INTRANET
without impairing the 100% security of the
latter
• Normal telephone type
speech - no delay or
distortions.
• Eliminates STD calls between
Company locations.
• Converts MLOs to VSOs
•PVDTN Patent 202674
And fresh application
1156/KOL/2014 dated 11.11.2014
to cover enhancements.
&
STS Patent 262590
And fresh application
1158/KOL/2014 dated 11.11.2014
to cover improvements
-
- -
-
PRIVATE VOICE - DATA TELECOM NETWORK WITH SECURE TRANSFER SYSTEM
6/1A, KARTIK BOSE LANE, KOLKATA - 700006.
Phone: 91332543-3684; FAX: 91332543-3684
Mobile phone : +919432228808 / +919831210647
e-mail : midautel@bsnl.in
CYBER SECURITY – PRESENT MALAISE
1. All the problems with cyber security in the
world due to
2. Catching the bull by the tail and running
after it.
3. We let all the muck in and then try and
detect and clean it.
THE SOLUTION
4. The only way to ensure 100% security of
an organisation’s internal databases and
WAN computing is
a. To catch the bull by the horns and lock it
out of the internal network.
b. In other words isolate the INTRANET
from any public domain access at LAN /
MAN / WAN levels.
c. MAN / WAN isolation shown in PVDTN
WAN sketches of Figs. 1 and 2.
d. Fig. 3 shows the separation at LAN level
IPPN
SPLITTER
pSTN
IPPN
SPLITTER
pSTN
+
+PVDTN =
NODE 2
NODE 1
PVDTN
p2p leased line
Circuit Switched pSTN (private switched telephone network routed by EPAXs
at each location
Packet Switched IPPN (IP private network) routed by data routers
at each location
X
Y
X+Y
X+Y
MAX (X,Y)
PVDTN WAN
Fig. 2
Fig.1
INTERNETPVDTN WAN
IBN
2IBN
1
INTRANET LAN INTERNET LAN
STS
SS
OD
2
SS
OD
1
SSA
Fig. 3
PROPOSED METHOD OF
INTERNET CONNECTIVITY
LAN Nodes
VDS
DB2 CS
IS
PSDB1
VDS
CS – Company Communications Server
PS – Company Web or Public Server
IS – Intermediate Server which relays
information / data / mail back and forth
Between CS & PS.
SSA – Automatic Secure Switch which
connects IS to INTRANET and Internet
LAN buses alternately in preset
(adjustable) time.
DB1, DB2 – Company’s internal
databases.
IBN1, IBN2 – Internet Browsing Nodes
SSOD1, SSOD2 – On-demand Secure
Switch.
STS – Total Secure transfer system
comprising of CS, IS, PS and SSA
ORGANISATIONS PRESENCE ON INTERNET
5. All organisations need presence on the Internet.
6. For this STS (secure transfer system)
developed and patented.
7. For free flow of information / data / mail
back and forth between the Internet and the
INTRANET, automatically.
8. Without impairing the security of the
INTRANET.
STS (SECURE TRANSFER SYSTEM)
9. The STS comprises of
a. Company communications server (CS)
connected to the INTRANET LAN
b. The Company Web Server or public server
(PS) connected to the Internet LAN
c. The Intermediate or relay server (IS)
connected to the secure switch (SS).
d. The SS is a 3 position, electro-mechanical,
microprocessor driven, RJ 45 switch which
connects the IS either to the INTRANET or
Internet alternately.
e. Never to both together.
f. Switch cycle periodicity may be set from
500 milli seconds upwards.
g. SS designed developed and manufactured
for MIDAUTEL exclusively.
h. Covered by STS letter of patent 262590.
EXCHANGE OF INFORMATION / DATA / MAIL
BETWEEN INTRANET & INTERNET
10. Information / data / mail transferred
between two networks by alternate two-way
synch between IS and CS, and IS and PS
11. All computer nodes in INTRANET LAN
receive and send internal and external from
and to the Company mail server (CMS).
12. External mail is routed via the STS and the
Internet mail gateway (IMG) residing in the
PS.
INTERNET BROWSING NODEs (IBNs)
13. Employees who need to browse the
Internet are provided with Internet Browsing
Nodes IBNs) comprising
a. A switchable thin client with on-demand
switching software embedded with the thin
OS
b. A SS (secure switch) operated by the on-
demand switching software.
c. Two VMs, one in the VDS (virtual desktop
server) connected to the INTRANET LAN
and one in the VDS connected to the
Internet LAN.
d. IBN users will work with the VMs on the
INTRANET and Internet LANs.
e. Hence two networks are kept separate.
f. Obviates internal (mole) threats.
g. See Fig. 3
ACCESS BY FIELD OFFICERS
FROM MOBILE PHONES
1. The Company Web site will have two types of
pages
a. Read only - accessible to people in the
public domain for all the publishable
information they carry.
b. Interactive – accessible to those with
registered email IDs and passwords, and with
registered mobile numbers which will receive
OTP for access
c. The field officers will have to leave their
inputs on these interactive pages for onward
transmission to the internal network via the
STS system. They will not get direct access
to the internal network from the field but via
the Web server connected top the Internet.
d. The answers they want from the Company
will either be relayed to the interactive pages
or via mail in the registered email ID.
PROTECTION AGAINST MALWARE
SENT VIA EMAIL
1. Any one can send a mail to the Company mail
ID containing malware.
2. To protect against this the IS (intermediate or
relay server) is provided with anti-Malware
software in addition with the anti-virus
software.
3. The former displays the registry files and the
CISO / and his team will be on constant watch
for any suspicious files which would be
promptly deleted.
4. IS – the only route via which such malware can
get into the network during the two-way synch
with PS and CS in the STS system.
5. Malware detected and eliminated with the help
of the anti-malware software.
6. This activity of CISO / team restricted to
Central location of the organisation or at best
also in the DR (disaster recovery) site which
will also have a STS system.
DEMONSTRATION OF CUSTOMISABLE
STS EXCHANGE SOFTWARE
1. The STS exchange software depends on
specific needs of each organisation and is
custom built.
2. This can be demonstrated at the
Organisation’s premises in a parallel demo
site after getting the inputs from the CIO /
team.
3. We will need three servers (CS, IS, PS) of
appropriate size to suit the need of the
organisation, and also a Secure Switch (SS).
4. To demo the typical IBN function we will
need two high end PCs to act as the VDSs at
the INTRANET and Internet LAN switches,
each with two VMs (virtual machines), and
two switchable thin clients each comprising
a. One SS
b. One switchable thin client with on-
demand switching software
embedded with the thin OS
5. The customised software developer will roll
out the working model on successful
completion of the demo.
6. The Organisation will be free to employ
ethical hackers to hack through the STS
system.
BENEFITS TO USERS
1. Ensures 100% security of internal databases,
and WAN computing
2. Saves 50 to 75% of present telecom costs
3. Saves a substantial portion of inter-locational
travelling costs through multiple simultaneous
NET meetings for different work groups with
people from their own work places at a
moment’s notice, using
a. Voice conferencing
b. Voice-data conferencing
4. Smartens up company operations
5. The cost of re-engineering the present network
can be recovered from the savings in telecom
and travelling costs in 1 to 3 years. The more
the communications the quicker the payback.
6. There is also an immeasurable saving from
ensuring 100% security of internal databases
and WAN computing – which could run into
Crores INR – by ensuring the Company /
Organisation functions without any data
breaches

Contenu connexe

Tendances

Bluetooh Technology
Bluetooh TechnologyBluetooh Technology
Bluetooh Technology
pariluv
 
Bluetooth & cdma technology
Bluetooth & cdma technologyBluetooth & cdma technology
Bluetooth & cdma technology
balpreetdhillon
 
A comparative analysis of 802.11b and 802.11g
A comparative analysis of 802.11b and 802.11gA comparative analysis of 802.11b and 802.11g
A comparative analysis of 802.11b and 802.11g
Alexander Decker
 

Tendances (20)

Bluetooth ppt
Bluetooth pptBluetooth ppt
Bluetooth ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Experiment no. 1,2 and assignment no.1 cn
Experiment no. 1,2 and assignment no.1 cnExperiment no. 1,2 and assignment no.1 cn
Experiment no. 1,2 and assignment no.1 cn
 
Networks
NetworksNetworks
Networks
 
Bluetooh Technology
Bluetooh TechnologyBluetooh Technology
Bluetooh Technology
 
Understanding Bluetooth Technology and How to use in with Mobile Devices
Understanding Bluetooth Technology and How to use in with Mobile DevicesUnderstanding Bluetooth Technology and How to use in with Mobile Devices
Understanding Bluetooth Technology and How to use in with Mobile Devices
 
Networking
NetworkingNetworking
Networking
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Networking
Networking Networking
Networking
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoT
 
Bluetooth & cdma technology
Bluetooth & cdma technologyBluetooth & cdma technology
Bluetooth & cdma technology
 
Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth technology
Bluetooth  technologyBluetooth  technology
Bluetooth technology
 
Bluetooth technology
Bluetooth  technologyBluetooth  technology
Bluetooth technology
 
A comparative analysis of 802.11b and 802.11g
A comparative analysis of 802.11b and 802.11gA comparative analysis of 802.11b and 802.11g
A comparative analysis of 802.11b and 802.11g
 

Similaire à Executive presentation3

Cibm worhop 2 chapter seven
Cibm   worhop 2 chapter sevenCibm   worhop 2 chapter seven
Cibm worhop 2 chapter seven
Shaheen Khan
 
Telecomm presentation [2005]
Telecomm presentation [2005]Telecomm presentation [2005]
Telecomm presentation [2005]
Raul Soto
 

Similaire à Executive presentation3 (20)

Pvdtn sts brochure
Pvdtn sts brochurePvdtn sts brochure
Pvdtn sts brochure
 
Pvdtn sts brochure
Pvdtn sts brochurePvdtn sts brochure
Pvdtn sts brochure
 
Pvdtn sts tech
Pvdtn sts techPvdtn sts tech
Pvdtn sts tech
 
Pvdtn sts tech
Pvdtn sts techPvdtn sts tech
Pvdtn sts tech
 
IOT introduction
IOT introductionIOT introduction
IOT introduction
 
Introduction-All 'bout IOT
Introduction-All 'bout IOTIntroduction-All 'bout IOT
Introduction-All 'bout IOT
 
Jvvnl 071108
Jvvnl 071108Jvvnl 071108
Jvvnl 071108
 
PRE-FINAL.pdf
PRE-FINAL.pdfPRE-FINAL.pdf
PRE-FINAL.pdf
 
MIS Chap # 5...
MIS Chap # 5...MIS Chap # 5...
MIS Chap # 5...
 
Internet 2.0
Internet 2.0Internet 2.0
Internet 2.0
 
Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011
 
Comprehensive AAP
Comprehensive AAPComprehensive AAP
Comprehensive AAP
 
Network system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & TechnologyNetwork system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & Technology
 
Dial up security
Dial up securityDial up security
Dial up security
 
Cdma Security
Cdma SecurityCdma Security
Cdma Security
 
vpn
vpnvpn
vpn
 
Unit2 network communication for CIM
Unit2 network communication  for CIM Unit2 network communication  for CIM
Unit2 network communication for CIM
 
Cibm worhop 2 chapter seven
Cibm   worhop 2 chapter sevenCibm   worhop 2 chapter seven
Cibm worhop 2 chapter seven
 
Telecomm presentation [2005]
Telecomm presentation [2005]Telecomm presentation [2005]
Telecomm presentation [2005]
 
Pvdtn presentation
Pvdtn presentationPvdtn presentation
Pvdtn presentation
 

Plus de MIDAUTEL

Plus de MIDAUTEL (12)

Resurrection of isdn
Resurrection of isdnResurrection of isdn
Resurrection of isdn
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Ngn
NgnNgn
Ngn
 
Mpls p2 p
Mpls   p2 pMpls   p2 p
Mpls p2 p
 
Vo p pstn
Vo p   pstnVo p   pstn
Vo p pstn
 
Mobile
MobileMobile
Mobile
 
Telephony
TelephonyTelephony
Telephony
 
Nwan
NwanNwan
Nwan
 
Vpn1
Vpn1Vpn1
Vpn1
 
Loc details.xlsx
Loc details.xlsxLoc details.xlsx
Loc details.xlsx
 
Sts presentation
Sts presentationSts presentation
Sts presentation
 
Llbu
LlbuLlbu
Llbu
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Executive presentation3

  • 1. “A BUSINESS TOOL YOU CANNOT AFFORD TO BE WITHOUT” • 100% secure, fixed operating cost, private network. • No usage charge. • Set-up cost pay back in 1 to 2 years • Ideal communications backbone for ERP • Cuts present telecom costs by up 50 to 75%. • Unlimited inter -locational communications - speech, fax, data. • High network up -times. DELHI MUMBAI KOLKATA CHENNAI • Voice and voice -data conferencing. • Integrates voice, fax, data over analogue and digital leased lines. • Connects any place in the world. • Group III fax - no time lost in document scanning. • While PVDTN gives all the benefits enumerated herein by isolating the INTRANET from public domain access, STS ensures simultaneous presence on the Internet through the public server PS connected to the Internet LAN, and ensures free flow of information / data / mail back and forth between the Internet and the INTRANET without impairing the 100% security of the latter • Normal telephone type speech - no delay or distortions. • Eliminates STD calls between Company locations. • Converts MLOs to VSOs •PVDTN Patent 202674 And fresh application 1156/KOL/2014 dated 11.11.2014 to cover enhancements. & STS Patent 262590 And fresh application 1158/KOL/2014 dated 11.11.2014 to cover improvements - - - - PRIVATE VOICE - DATA TELECOM NETWORK WITH SECURE TRANSFER SYSTEM 6/1A, KARTIK BOSE LANE, KOLKATA - 700006. Phone: 91332543-3684; FAX: 91332543-3684 Mobile phone : +919432228808 / +919831210647 e-mail : midautel@bsnl.in
  • 2. CYBER SECURITY – PRESENT MALAISE 1. All the problems with cyber security in the world due to 2. Catching the bull by the tail and running after it. 3. We let all the muck in and then try and detect and clean it.
  • 3. THE SOLUTION 4. The only way to ensure 100% security of an organisation’s internal databases and WAN computing is a. To catch the bull by the horns and lock it out of the internal network. b. In other words isolate the INTRANET from any public domain access at LAN / MAN / WAN levels. c. MAN / WAN isolation shown in PVDTN WAN sketches of Figs. 1 and 2. d. Fig. 3 shows the separation at LAN level
  • 4. IPPN SPLITTER pSTN IPPN SPLITTER pSTN + +PVDTN = NODE 2 NODE 1 PVDTN p2p leased line Circuit Switched pSTN (private switched telephone network routed by EPAXs at each location Packet Switched IPPN (IP private network) routed by data routers at each location X Y X+Y X+Y MAX (X,Y) PVDTN WAN Fig. 2 Fig.1
  • 5. INTERNETPVDTN WAN IBN 2IBN 1 INTRANET LAN INTERNET LAN STS SS OD 2 SS OD 1 SSA Fig. 3 PROPOSED METHOD OF INTERNET CONNECTIVITY LAN Nodes VDS DB2 CS IS PSDB1 VDS CS – Company Communications Server PS – Company Web or Public Server IS – Intermediate Server which relays information / data / mail back and forth Between CS & PS. SSA – Automatic Secure Switch which connects IS to INTRANET and Internet LAN buses alternately in preset (adjustable) time. DB1, DB2 – Company’s internal databases. IBN1, IBN2 – Internet Browsing Nodes SSOD1, SSOD2 – On-demand Secure Switch. STS – Total Secure transfer system comprising of CS, IS, PS and SSA
  • 6. ORGANISATIONS PRESENCE ON INTERNET 5. All organisations need presence on the Internet. 6. For this STS (secure transfer system) developed and patented. 7. For free flow of information / data / mail back and forth between the Internet and the INTRANET, automatically. 8. Without impairing the security of the INTRANET.
  • 7. STS (SECURE TRANSFER SYSTEM) 9. The STS comprises of a. Company communications server (CS) connected to the INTRANET LAN b. The Company Web Server or public server (PS) connected to the Internet LAN c. The Intermediate or relay server (IS) connected to the secure switch (SS). d. The SS is a 3 position, electro-mechanical, microprocessor driven, RJ 45 switch which connects the IS either to the INTRANET or Internet alternately. e. Never to both together. f. Switch cycle periodicity may be set from 500 milli seconds upwards. g. SS designed developed and manufactured for MIDAUTEL exclusively. h. Covered by STS letter of patent 262590.
  • 8. EXCHANGE OF INFORMATION / DATA / MAIL BETWEEN INTRANET & INTERNET 10. Information / data / mail transferred between two networks by alternate two-way synch between IS and CS, and IS and PS 11. All computer nodes in INTRANET LAN receive and send internal and external from and to the Company mail server (CMS). 12. External mail is routed via the STS and the Internet mail gateway (IMG) residing in the PS.
  • 9. INTERNET BROWSING NODEs (IBNs) 13. Employees who need to browse the Internet are provided with Internet Browsing Nodes IBNs) comprising a. A switchable thin client with on-demand switching software embedded with the thin OS b. A SS (secure switch) operated by the on- demand switching software. c. Two VMs, one in the VDS (virtual desktop server) connected to the INTRANET LAN and one in the VDS connected to the Internet LAN. d. IBN users will work with the VMs on the INTRANET and Internet LANs. e. Hence two networks are kept separate. f. Obviates internal (mole) threats. g. See Fig. 3
  • 10. ACCESS BY FIELD OFFICERS FROM MOBILE PHONES 1. The Company Web site will have two types of pages a. Read only - accessible to people in the public domain for all the publishable information they carry. b. Interactive – accessible to those with registered email IDs and passwords, and with registered mobile numbers which will receive OTP for access c. The field officers will have to leave their inputs on these interactive pages for onward transmission to the internal network via the STS system. They will not get direct access to the internal network from the field but via the Web server connected top the Internet. d. The answers they want from the Company will either be relayed to the interactive pages or via mail in the registered email ID.
  • 11. PROTECTION AGAINST MALWARE SENT VIA EMAIL 1. Any one can send a mail to the Company mail ID containing malware. 2. To protect against this the IS (intermediate or relay server) is provided with anti-Malware software in addition with the anti-virus software. 3. The former displays the registry files and the CISO / and his team will be on constant watch for any suspicious files which would be promptly deleted. 4. IS – the only route via which such malware can get into the network during the two-way synch with PS and CS in the STS system. 5. Malware detected and eliminated with the help of the anti-malware software. 6. This activity of CISO / team restricted to Central location of the organisation or at best also in the DR (disaster recovery) site which will also have a STS system.
  • 12. DEMONSTRATION OF CUSTOMISABLE STS EXCHANGE SOFTWARE 1. The STS exchange software depends on specific needs of each organisation and is custom built. 2. This can be demonstrated at the Organisation’s premises in a parallel demo site after getting the inputs from the CIO / team. 3. We will need three servers (CS, IS, PS) of appropriate size to suit the need of the organisation, and also a Secure Switch (SS). 4. To demo the typical IBN function we will need two high end PCs to act as the VDSs at the INTRANET and Internet LAN switches, each with two VMs (virtual machines), and two switchable thin clients each comprising a. One SS b. One switchable thin client with on- demand switching software embedded with the thin OS 5. The customised software developer will roll out the working model on successful completion of the demo. 6. The Organisation will be free to employ ethical hackers to hack through the STS system.
  • 13. BENEFITS TO USERS 1. Ensures 100% security of internal databases, and WAN computing 2. Saves 50 to 75% of present telecom costs 3. Saves a substantial portion of inter-locational travelling costs through multiple simultaneous NET meetings for different work groups with people from their own work places at a moment’s notice, using a. Voice conferencing b. Voice-data conferencing 4. Smartens up company operations 5. The cost of re-engineering the present network can be recovered from the savings in telecom and travelling costs in 1 to 3 years. The more the communications the quicker the payback. 6. There is also an immeasurable saving from ensuring 100% security of internal databases and WAN computing – which could run into Crores INR – by ensuring the Company / Organisation functions without any data breaches