What Is an Internet Portal?

B. Mahadevan (2000) defines the Internet portal as a consumer community that is mainly engaged in building product and service information, which affects the channel traffic of products, service providers and intermediaries to enter the network, and attracts consumers' attention to enter the network. Market segments. Both buyers and sellers benefit from the broad and abundant buyers and sellers of the portal community. The low cost of buyer search, in turn, enhances the website's revenue.

B. Mahadevan (2000) defines the Internet portal as a consumer community that is mainly engaged in building product and service information, which affects the channel traffic of products, service providers and intermediaries into the network, attracts consumers' attention to the network, and is a service
The core interface of the portal business model consists of the customer interface, internal structure, and partner interface, and is the carrier of value flow. B. Mahadevan (2000) believes that the business model is a unique blend of three types of value flows that are critical to the business, including the value flows, revenue flows, and logistics of business partners and customers; value flows affect revenue flows and logistics, and must be accurate Identify value flows.
Customer interface activities are one of the core elements of the portal. Portal customers can be divided into three types: end customers, member customers, and business customers. End customers refer to most netizens who browse information online, click on advertisements, use websites to send information, use website mailboxes for communication, and communicate in online communities. Member customers: Including some netizens who pay to use mailboxes, make purchases as member customers, order information and lease space or communities, and order special services for websites. The end customer and member customers are the customer base of the portal. The basic work that each portal must do is to attract and win netizens and to gather popularity. Commercial customers refer to paying advertisers, e-shops, auction sites, network agents, insurance agents, and commercial customers who exchange links. Their requirements are completely different from those of end customers or member customers. To meet them, they must help them realize value added.
With the innovation and evolution of door website business, SMS service (

Internet portal influencing factors

1.The battle for cyber security is getting attention
Scandals of international intelligence theft have been exposed. Chinese government websites involve websites at the ministerial, provincial, city, and county levels, and the level of network construction and security maintenance varies at various levels. Criminals attack and implant backdoor viruses. They mainly use these illegal methods to tamper, delete, and steal. User's personal information, website information, etc., cause information leakage and spread of inappropriate speech. Computer viruses are destructive and contagious. They can cause computer systems to slow down, and files can be lost in severe cases. Hackers invade the network of government agencies, some government confidential documents will also be threatened, which will have a huge impact on national security and social peace and harmony.
2. Information network infrastructure and technical security issues are widespread
Due to the lack of core technology of network equipment, currently widely used operating systems and equipment technologies adopt foreign products. Operating systems have vulnerabilities. Their scalability, stability, and maintainability are all key factors affecting computer network security. Viruses can easily spread against operating system vulnerabilities. With the continuous development of computers, software on computers is moving towards multifunctionality. In most cases, vulnerabilities exist in newly listed software, which adds another risk to computer security.
3. Lack of network security management system and weak awareness of security precautions
Network security is based on three points of technology and seven points of management, such as human factors, natural factors and accidental factors. Among them, the security issues caused by human factors often have the greatest impact. With the rapid development of network technology, hacking methods are constantly upgraded, viruses are constantly being strengthened, and protection methods should not stop. Due to the poor awareness of personnel protection, some old comrades have a short period of contact with the computer. Most of them work on computers without security protection. They are weak against security risks and appear inadequate in dealing with network fraud and network attacks. . And some people abuse their power to query and process private information, steal various confidential data for personal benefit and so on. Most people use e-mail to transfer files. Among them, mail viruses are often used by criminals to spread. Once they enter the virus program, they will cause irreparable damage to the computer.
4. Lack of professional response and safeguard measures
At present, most information systems lack professional security administrators, and the general unit only arranges information maintenance personnel and is only responsible for information input and maintenance. Management personnel without professional training have limited competence, lack of security management technical specifications, lack of regular system security tests, and lack of security audit mechanisms. At the same time, the government's inadequate supervision of the network has led to the spread of illegal programs and data on the network, and users can easily cause misinformation without their knowledge. [3]

Internet portal response strategies

At present, portals of governments, enterprises, institutions, and campuses of various agencies are subject to various threats and hidden dangers. How to establish a secure and efficient network has become a goal that people have been pursuing. Generally, network security prevention and response work is performed from the three aspects of physical equipment prevention, technical prevention, and management.
1. Physical equipment and technical defense strategies
All units should consider the heat dissipation, humidity, grounding, dust, magnetic fields of hardware equipment and locations away from natural disasters during network construction, and ensure that the room is ventilated. Important equipment must be equipped with dual power supplies, and daily maintenance of hardware equipment And maintenance work.
Firewall technology is currently the lowest cost, most widely used, and one of the most basic network security protection methods, which can effectively prevent external intrusions.
Information encryption technology is one of the important means for the security maintenance of computer networks. Data encryption is also a good computer usage habit. Especially for units' confidential information, internal data, and personal information, it is necessary to develop the habit of encrypted storage. Data storage encryption and Data transmission encryption is the key link. Many units have internal and external networks, and access control plays a role in isolating the internal and external networks, including access control, monitoring control, lock control, and server security control. In addition to the pervasive nature of computer viruses, in addition to installing anti-virus and anti-virus software on the machine, the unit should also regularly detect network viruses, regularly update the virus database, complete comprehensive killing of various latest viruses, and enable real-time protection monitoring mode.
Management system
The insecurity of the network environment is closely related to the imperfect management system. First of all, corresponding organizations should be established to formulate rules and regulations. Familiar with the promotion of safety management laws, regulations, and related policies, establish laws and regulations, and provide relevant education and training to the broad law enforcement departments or relevant auditing departments, and pay constant attention. It is particularly emphasized that personnel in key positions must pass training , And also need to pass the corresponding skills test and evaluation to get a job. The information provided on the Internet must be reviewed by the relevant departments before being online and registered in a timely manner. In addition, it is strictly forbidden for each staff member to arbitrarily install software that has nothing to do with the nature of work, effectively preventing the potential damage caused by these software to the system and the unit network. [3]

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?