Page 1-3: Figure 1-1, entitled Scope of Data Security Needs, is drawn left to right, and shows an Internet cloud on the left, surrounded by four client terminals. The Internet cloud connects to an Application Web Server, which in turn connects to an Intranet server surrounded by four other client terminals. This Intranet server connects to separate database servers as needed by these various clients.