Various threats posed by server in client server environment, Computer Engineering

Assignment Help:

Explain various threats posed through servers into a client server environment.

Server Destroyed within an Accident: Power failures, Leaking pipes and equipment failures are not uncommon

Destruction of Data Alteration of Disclosure of Fraud Denial of Service

Users Logged within on Unattended Desktop Computer.

The client/server architecture removes the incentive to sign off of mainframe applications to save onto connect time charges.

Incorrectly Protected Server Accounts Used to Gain Access

Badly protected user accounts, while less powerful, make also tempting targets, as they give a toehold to gain any privileges

An intruder onto a server can disclose sensitive information.

Address Spoofing: Anyone spoofs network addresses to get access to servers, and uses which access to read/alter data or establish future access.

One is "spoofs" a network address through their host computer to "impersonate" a trusted computer, thus incorrectly gaining special permissions and access which only the trusted computer must have.

Sensitive Data Disclosed by Packet Sniffing.

Alter data or programs, and put down behind hidden programs that steal passwords through unsuspecting users of the system, and that make future intrusions easier.


Related Discussions:- Various threats posed by server in client server environment

Explain about interrupt servicing routines, Q. Explain about Interrupt serv...

Q. Explain about Interrupt servicing routines? First the situation is to be checked as to why the interrupt has happened. That includes not only device but also why the device

Computer systems architecture, Assume that you are working in a software co...

Assume that you are working in a software company as a programmer and a bank is your company's client. The Bank is a most popular and one of the leading banks in Malaysia. Your

Show some characteristics of linux, Show some characteristics of Linux? ...

Show some characteristics of Linux? It's a Unix-like computer operating system one of the most major examples of free software and open source development: typically all underl

Difference between depth first and breadth first traversing, Explain the di...

Explain the difference between depth first and breadth first traversing techniques of a graph.   Depth-first search is dissimilar from Breadth-first search in the following way

Explain the configuration of a step-by-step switching system, With neat dia...

With neat diagrams explains the configuration of a step-by-step switching system. The schematic diagram for an exchange is specified in figure. Each subscriber is associated to

Explain register addressing mode, Q. Explain Register Addressing Mode? ...

Q. Explain Register Addressing Mode? Operand can be a 16-bit register: Addressing Mode Description Example AX, BX, CX, DX, SI,

Problems for decision tree learning, Appropriate Problems for Decision Tree...

Appropriate Problems for Decision Tree Learning : However remember there that is a skilled job in "AI" to choose exactly the right learning representation ormethod for a parti

Don''t care states, The conflict between too hot and too cold or too slow a...

The conflict between too hot and too cold or too slow and too fast can be resolved using don't care states. Don't care states are used when i) the state of the output is not

What is hashing, What is Hashing? Hashing: Hashing gives the direct acc...

What is Hashing? Hashing: Hashing gives the direct access of record from the file no matter where the record is in the file. This is possible with the help of a hashing functio

Era of first generation computers, Q. Era of first generation computers? ...

Q. Era of first generation computers? The trends that were encountered at the time of the era of first generation computers were: Centralized control in a single CPU (al

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd