Various threats posed by server in client server environment, Computer Engineering

Assignment Help:

Explain various threats posed through servers into a client server environment.

Server Destroyed within an Accident: Power failures, Leaking pipes and equipment failures are not uncommon

Destruction of Data Alteration of Disclosure of Fraud Denial of Service

Users Logged within on Unattended Desktop Computer.

The client/server architecture removes the incentive to sign off of mainframe applications to save onto connect time charges.

Incorrectly Protected Server Accounts Used to Gain Access

Badly protected user accounts, while less powerful, make also tempting targets, as they give a toehold to gain any privileges

An intruder onto a server can disclose sensitive information.

Address Spoofing: Anyone spoofs network addresses to get access to servers, and uses which access to read/alter data or establish future access.

One is "spoofs" a network address through their host computer to "impersonate" a trusted computer, thus incorrectly gaining special permissions and access which only the trusted computer must have.

Sensitive Data Disclosed by Packet Sniffing.

Alter data or programs, and put down behind hidden programs that steal passwords through unsuspecting users of the system, and that make future intrusions easier.


Related Discussions:- Various threats posed by server in client server environment

What are the features common in most of the websites, What are the features...

What are the features common in most of the websites Following general features must be found on most web sites in one form or another (this list is by no means exhaustive):

Explain about the flash memories, Explain about the Flash memories Thes...

Explain about the Flash memories These are re-writable non-volatile memories evolved from EEPROM; they are generally connected to the USB port on the computer enabling a user t

Find farthest distance from exchange where subscriber locate, An exchange u...

An exchange uses a -40 V battery to drive subscriber lines. A resistance of 250 ohms is placed in series with the battery to protect it from short circuits. The subscribers are req

Input-output techniques, After going through details of device interfaces n...

After going through details of device interfaces next point to be discussed is how the interface can be used to support I/O from devices. Binary information received from an extern

What are the phases of swapping a page from the memory, What are the phases...

What are the phases of swapping a page from the memory? Page stealer searches the page eligible for swapping and places the page number in the list of pages to be swapped. K

Communications between r/3 and external applications, What is the means of ...

What is the means of communications between R/3 and external applications? The means of communication among R/2,R/3 and external applications is by the CPI-C handler or SAP Gat

What are the different types of computer networks, Q. Mention different cla...

Q. Mention different classes of computer networks (on the basis of scale) and distinguish one from the other. Ans: Local Area Network (LAN) Metropolitan Area Netw

The variables that are declared outside all functions, The variable that ar...

The variable that are declared outside all the functions are called The variables that are declared outside every functions are known as global variable.

Differentiate between the serial port and parallel port, Question: (a) ...

Question: (a) Provide types of computer systems and briefly describe each one. (b) With the help of example, explain the difference between open source software, freeware a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd