Various threats posed by server in client server environment, Computer Engineering

Assignment Help:

Explain various threats posed through servers into a client server environment.

Server Destroyed within an Accident: Power failures, Leaking pipes and equipment failures are not uncommon

Destruction of Data Alteration of Disclosure of Fraud Denial of Service

Users Logged within on Unattended Desktop Computer.

The client/server architecture removes the incentive to sign off of mainframe applications to save onto connect time charges.

Incorrectly Protected Server Accounts Used to Gain Access

Badly protected user accounts, while less powerful, make also tempting targets, as they give a toehold to gain any privileges

An intruder onto a server can disclose sensitive information.

Address Spoofing: Anyone spoofs network addresses to get access to servers, and uses which access to read/alter data or establish future access.

One is "spoofs" a network address through their host computer to "impersonate" a trusted computer, thus incorrectly gaining special permissions and access which only the trusted computer must have.

Sensitive Data Disclosed by Packet Sniffing.

Alter data or programs, and put down behind hidden programs that steal passwords through unsuspecting users of the system, and that make future intrusions easier.


Related Discussions:- Various threats posed by server in client server environment

How can i pass parameters to my simulation, How can I pass parameters to my...

How can I pass parameters to my simulation? A  test  bench  and  simulation  would likely  need  many  different  parameters  and  settings  for  various sorts of tests and con

Explain the advantages of high level languages, Explain the Advantages of H...

Explain the Advantages of High Level Languages? The major advantage of high-level languages over low-level languages is that they are easier to write, read, and maintain. Ultim

What are the aspects of security policy, What are the aspects of security p...

What are the aspects of security policy The security policy should cover aspects such as network service access, physical access, limits of acceptable behaviour, company's pro

For which class address 192.5.48.3 belogs, Address 192.5.48.3 belongs to? ...

Address 192.5.48.3 belongs to? Address 192.5.48.3 belongs to class C.

What is a virtual address, Q. What is a virtual address? Von Neumann ha...

Q. What is a virtual address? Von Neumann had suggested that execution of a program is possible only if program and data are residing in memory. In such a condition program len

Graph has a minimum spanning tree already computed, Assume that a graph has...

Assume that a graph has a minimum spanning tree already computed.  How fastly can the minimum spanning tree be updated if a new vertex and incident edges are added to G? If the

What is the gray equivalent of decimal number 25, What is the Gray equivale...

What is the Gray equivalent of  (25) 10 Ans. Gray equivalent of (25) 10 : The Decimal number 25 has binary equivalent as (00100101) 2 The left most bits (MSB) into gray

Explain the processor-memory interconnection network (pmin), Processor-Memo...

Processor-Memory Interconnection Network (PMIN): It's a switch which attaches several processors to distinct memory modules. Connecting each processor to every memory module in

Explain characteristics of program translation model, Explain characteristi...

Explain characteristics of program translation model. The program translation model characteristics are: A program should be translated before this can be executed.

What is preemptive and nonpreemptive scheduling, What is preemptive and non...

What is preemptive and nonpreemptive scheduling? Under nonpreemptive scheduling once the CPU has been allocated to a process, the process keeps the CPU unless it releases the C

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd