Various threats posed by server in client server environment, Computer Engineering

Assignment Help:

Explain various threats posed through servers into a client server environment.

Server Destroyed within an Accident: Power failures, Leaking pipes and equipment failures are not uncommon

Destruction of Data Alteration of Disclosure of Fraud Denial of Service

Users Logged within on Unattended Desktop Computer.

The client/server architecture removes the incentive to sign off of mainframe applications to save onto connect time charges.

Incorrectly Protected Server Accounts Used to Gain Access

Badly protected user accounts, while less powerful, make also tempting targets, as they give a toehold to gain any privileges

An intruder onto a server can disclose sensitive information.

Address Spoofing: Anyone spoofs network addresses to get access to servers, and uses which access to read/alter data or establish future access.

One is "spoofs" a network address through their host computer to "impersonate" a trusted computer, thus incorrectly gaining special permissions and access which only the trusted computer must have.

Sensitive Data Disclosed by Packet Sniffing.

Alter data or programs, and put down behind hidden programs that steal passwords through unsuspecting users of the system, and that make future intrusions easier.


Related Discussions:- Various threats posed by server in client server environment

What is an arithmetic processor, Q. What is an arithmetic processor? A ...

Q. What is an arithmetic processor? A distinctive CPU necessitates most of the control and data processing hardware for implementing non-arithmetic functions. As the hardware c

Explain simple interfacing, Q. Explain Simple Interfacing? The followin...

Q. Explain Simple Interfacing? The following is a sample of the coding, used for procedure interfacing: PUBLIC CUROFF             _TEXT SEGMENT WORD PUBLIC 'CODE'

Types of assemblies, How many types of assemblies are there? Private, P...

How many types of assemblies are there? Private, Public/Shared, Satellite. A private assembly is normally used by a one application, and is stored in the application's director

How to add a wait state when creating a verification point, 1. Start to mak...

1. Start to make the verification point. 2. In the confirmation Point Name dialog box, select Apply wait state to confirmation point. 3. Type values for the following option

What is difference between ram and fifo, What is difference between RAM and...

What is difference between RAM and FIFO? FIFO certainly does not have address lines. It is stands for first in and first out. It is an algorithm based method. It is used to s

Array of discount rates, Why do you think you are asked to do valuation giv...

Why do you think you are asked to do valuation given an array of discount rates? a.    Would it not be extra accurate to utilize, for intsnces , CAPM to calculate cost of equity

What is the difference between wire and register, What is the difference be...

What is the difference between wire and reg Wire Wire is used for designing combinational logic, as we all know that this type of logic cannot store a value.  As  you  can

Microprocessors and motherboards, Module Learning Outcomes for This Assignm...

Module Learning Outcomes for This Assignment 1. Design and minimize a digital electronic circuit using logic devices from ttl and cmos. 2. Explain the hardware design of

Need of cisc cpu - computer architecture, Need of CISC CPU -  computer arc...

Need of CISC CPU -  computer architecture: Why is Intel spending money and time to manufacture the Pentium II and the Pentium III? The answer of this question is simple, ba

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd