ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzahg_5.4.0.1/rzahgjkl.htm

86 lines
4.8 KiB
HTML

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 4//EN">
<HTML>
<HEAD>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Copyright" content="Copyright (c) 2005 by IBM Corporation">
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights - -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<TITLE>Scenario: JKL Toy Company e-business plans</TITLE>
<LINK rel="stylesheet" type="text/css" href="ic.css">
</HEAD>
<BODY>
<!-- Java sync-link -->
<script language = "Javascript" src = "synch.js"></script>
<!-- End Header Records ============================================ -->
<A NAME="Top_Of_Page"></A>
<HR><H2><A NAME="HDRRZAJ45L_BASIC_CORP_USAGE">Scenario: JKL Toy Company e-business plans</A></H2>
<P>
<P>This scenario describes a typical business, the JKL Toy Company which has
decided to expand its business objectives by using the Internet.
Although the company is fictitious, their plans for using the Internet for
e-business and their resulting business needs are representative of many real
world company situations.
<P>The JKL Toy Company is a small, but rapidly growing, manufacturer of toys,
from jump ropes to kites to cuddly stuffed leopards. The company
president is enthusiastic about the growth of the business and about how its
new iSeries server can ease the burdens of that growth. Sharon Jones,
the accounting manager, is responsible for iSeries system administration and
system security.
<P>The JKL Toy Company has been successfully using its current setup for its
internal applications for over a year. The company now has plans to set
up an intranet to more efficiently share internal information. The
company also has plans to begin using the Internet to further its business
goals. Included in these goals are plans for creating a corporate
Internet marketing presence, including an online catalog. They also
want to use the Internet to transmit sensitive information from remote sites
to the corporate office. Additionally, the company wants to allow
employees in the design laboratory to have Internet access for research and
development purposes. Eventually, the company wants to allow customers
to use their web site for direct online purchasing. Sharon is
developing a report about the specific potential risks and challenges associated with these
activities and what measures the company should use to minimize these
risks. Sharon will be responsible for updating the company security
policy and adjusting the company computing strategies as they work to achieve their goals.
<P>The goals of this increased Internet presence are as follows
<UL COMPACT>
<LI>Promote general corporate image and presence as part of an overall
marketing campaign.
</LI><LI>Provide an online product catalog for customers and sales staff.
</LI><LI>Improve customer service.
</LI><LI>Provide employee e-mail and World Wide Web access.
</LI></UL>
<P>Here is the an example of the company Internet/network configuration.
<P>
<BR>
<IMG SRC="../rzaj4/rzaj500.gif" ALT="JKL Basic Network Configuration" border="0"><BR>
<P>As shown in the diagram, JKL Toy company has two primary iSeries
servers. They use one system for development (JKLDEV) and one for
production (JKLPROD) applications. Both of these servers handle
mission-critical data and applications. Consequently, they are not
comfortable running their Internet applications on these servers.
Instead, they have chosen to add a new iSeries server (JKLINT) to run these
applications.
<P>The company has placed the new system on a perimeter network and is using a
firewall between it and the main internal network of the company to ensure
better separation between their network and the Internet. This
separation decreases the Internet risks to which their internal systems are
vulnerable. By designating the new iSeries as an Internet server only,
the company also decreases the complexity of managing their network
security.
<P>The company will not run any mission-critical applications on the new
iSeries system at this time. During this stage of their e-business
plans the new system will provide a static public web site only.
However, the company wants to implement security measures to protect the
system and the public web site it runs to prevent service interruptions and
other possible attacks. Consequently, the company will protect the
system with packet filtering rules and network address translation (NAT)
rules, as well as strong basic security measures.
<P>As the company develops more advanced public applications (such as an
e-commerce web site or extranet access) they will implement more advanced
security and systems management measures.
<A NAME="Bot_Of_Page"></A>
</BODY></HTML>