Various threats posed by server in client server environment, Computer Engineering

Assignment Help:

Explain various threats posed through servers into a client server environment.

Server Destroyed within an Accident: Power failures, Leaking pipes and equipment failures are not uncommon

Destruction of Data Alteration of Disclosure of Fraud Denial of Service

Users Logged within on Unattended Desktop Computer.

The client/server architecture removes the incentive to sign off of mainframe applications to save onto connect time charges.

Incorrectly Protected Server Accounts Used to Gain Access

Badly protected user accounts, while less powerful, make also tempting targets, as they give a toehold to gain any privileges

An intruder onto a server can disclose sensitive information.

Address Spoofing: Anyone spoofs network addresses to get access to servers, and uses which access to read/alter data or establish future access.

One is "spoofs" a network address through their host computer to "impersonate" a trusted computer, thus incorrectly gaining special permissions and access which only the trusted computer must have.

Sensitive Data Disclosed by Packet Sniffing.

Alter data or programs, and put down behind hidden programs that steal passwords through unsuspecting users of the system, and that make future intrusions easier.


Related Discussions:- Various threats posed by server in client server environment

Calculate grade of service in a particular excahange, In a particular excha...

In a particular exchange during busy hour 1200 calls were offered to a group of trunks, during this time 6 calls were lost. The average call duration being 3 minutes Calculate

Input device used in computer system, Input device used in computer system:...

Input device used in computer system: An input device is typically a mouse or keyboard, the input device is the conduit through which data and instructions enter a computer. A

What is single program multiple data, Q. What is Single Program Multiple Da...

Q. What is Single Program Multiple Data? A general style of writing data parallel programs for MIMD computers is SPMD (single program, multiple data) means all processors execu

Why we need to construct state transition diagram, Why we need to construct...

Why we need to construct state transition diagram Basically you need to construct a state transition diagram for each object with important behaviour. You need not construct on

Determine any three restrictions that apply to class members, a. Determine ...

a. Determine any three restrictions that apply to class members. b. Is it possible for single class to be a friend of another class? Illustrate this using a suitable C++ program

What is error detection code, What is Error detection code? It is a bin...

What is Error detection code? It is a binary code that notice digital errors during transmission. The detected errors cannot be correct but the presence is shown.

Find the responses when a computer broadcast an arp reqqest, How many respo...

How many responses does a computer expect to receive when it broadcast an ARP request? Why? An ARP (Address Resolution Protocol) request message is put in a hardware frame and

Illustrate the history of computers, Q. Illustrate the history of computers...

Q. Illustrate the history of computers? Let's now consider history of computers since this will give fundamental information about technological development trends in computer

What is set screen, SET SCREEN With SET SCREEN the present screen simpl...

SET SCREEN With SET SCREEN the present screen simply specifies the next screen in the chain , control branches to this next screen  as soon as the current screen has been proce

DLD, Construction of j-k using 4-bit shift register

Construction of j-k using 4-bit shift register

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd