Business intranets are secured via
Software firewalls only
Firewalls with both hardware and software components
Hardware firewalls only
Permissions
The Correct Answer and Explanation is:
The correct answer is: Permissions.
Explanation:
Business intranets are private networks used within organizations to share information, resources, and services among employees securely. While firewalls—both hardware and software—play a crucial role in protecting a network from external threats, permissions are the primary mechanism that secures access within the intranet itself.
Why Permissions Are Key:
Permissions refer to the set of rules and controls applied to users and groups to determine who can access what data or resources on the intranet. They define:
- Who can view, modify, or delete files and resources.
- What specific actions each user or group can perform.
- When and how access is allowed or denied.
For example, an HR employee might have permission to access confidential personnel files, while a general staff member might only access company news or public documents.
Permissions can be implemented through:
- Access Control Lists (ACLs): Specify which users or groups have permissions on files, folders, or systems.
- Role-Based Access Control (RBAC): Users are assigned roles, and roles have predefined permissions.
- Authentication Systems: Ensure users prove their identity before permissions are applied.
Role of Firewalls:
Firewalls are essential for network perimeter security, filtering traffic entering or leaving the intranet to block unauthorized external access. There are:
- Hardware firewalls: Physical devices that inspect network traffic.
- Software firewalls: Programs installed on servers or individual computers that monitor traffic.
While these firewalls are critical for keeping out external threats and unauthorized remote users, they do not control what authorized users can do once inside the network. This is where permissions come in to secure sensitive resources and enforce internal security policies.
Summary:
This layered approach—firewalls at the perimeter and permissions internally—provides comprehensive security for business intranets.