SlideShare a Scribd company logo
7
Most read
8
Most read
10
Most read
CLIENT-SERVER NETWORK THREAT
 A security threat is a circumstance , condition , or
event that causes a loss of or harm to data or
network resources.
 This loss can be in form of destruction ,disclosure
and modification of data, denial of services, fraud
and waste.
 Organizations and businesses must secure
themselves against such threats . The security
solutions must be in the form of identification and
authentication of users , encryption of all traffic from
the application to the user , and access control to
all information.
POSSIBLE POINTS OF ATTACKS
SECURITY RISKS
 Types of Security Risks Encountered on an Intranet and
Extranet
 An unauthorized person, such as a contractor or visitor, might
gain access to a company’s computer system.
 An employee or supplier authorized to use the system for one
purpose might use it for another. For example, an engineer
might break into the HR database to obtain confidential salary
information.
 Confidential information might be intercepted as it is being
sent to an authorized user.
 Users may share documents between geographically
separated offices over the Internet or Extranet, or
telecommuters accessing the corporate Intranet from their
home computer can expose sensitive data as it is sent over
the wire.
 Electronic mail can be intercepted in transit.
CLIENT-SERVER NETWORK SECURITY
 Security problems in a client-server environment:
-Physical security :when unauthorized user gains
physical access to computers by guessing the
passwords of various users.
-Software security : A software security breach
occurs when program are compromised and made to
execute operations which they should not be legally
be doing.
-Inconsistent usage : Assembling is a growing
problem due to the complexity of the software and
security gets compromised.
EMERGING THREATS
2 categories :
 Threats to Client
 Threat to Server
Threats to Clients:
-Virus :Attaches to an executable file, requires
human action to spread. Some may cause only mildly
annoying effects while others can damage
your hardware, software or files.
-Worm :Can replicate itself on system, does not
require human action to spread.
 -Trojan Horse :Appears useful but damages
system, requires human action to run, do not self-
replicate. Some Trojans are designed to be more
annoying than malicious (like changing
your desktop, adding silly active desktop icons) or
they can cause serious damage by deleting files
and destroying information on your system. Trojans
are also known to create a backdoor on your
computer that gives malicious users access to your
system, possibly allowing confidential or personal
information to be compromised
 Threats to servers :
-Unauthorized Eavesdropping :Hackers trap user
names and unencrypted passwords sent over a
network.
-Denial of services : Where legitimate users are
prevented from using a particular service due to the
deliberate actions of attackers.
Services can be denied by:
-Service Overloading :Writing small looping program
to send requests continually for a particular file.
-Message Overloading :When someone sends a very
large file , message box occupy all the space on the
disk, causes disk to crash
 -Packet modification : modifying or destroying a
message packet. IP Spoofing is a technique used
to gain unauthorized access to machines, whereby
an attacker illicitly impersonate another machine by
manipulating IP packets.
METHODS TO PROTECT FROM SECURITY
THREATS
-Trust-based security: trusts everyone and does nothing
extra to protect the network or restrict access to any data.
-Security Through Obscurity (STO) :is the belief that a
system of any sort can be secure so long as nobody
outside of its implementation group is allowed to find out
anything about its internal mechanisms.
-Password schemes :It can also break down when some
common words or names are used as passwords. This
scheme provides a high-level of security.
-Biometric system :involves some identification aspects
which are related to the human body such as voice
recognition ,finger prints. Expensive to implement.

More Related Content

PPTX
Types of cyber attacks
PPTX
Client server security threats
PPTX
Cyber security
PPTX
Network security and firewalls
PPTX
Email hacking
PPTX
Cybersecurity 1. intro to cybersecurity
PPTX
Basics of Denial of Service Attacks
PPT
Information security
Types of cyber attacks
Client server security threats
Cyber security
Network security and firewalls
Email hacking
Cybersecurity 1. intro to cybersecurity
Basics of Denial of Service Attacks
Information security

What's hot (20)

PPT
Information security and Attacks
PPT
Spoofing
PPSX
Web security
PPTX
Email security
PPTX
Firewall ppt
PPTX
Risks involved in E-payment
PPTX
Network security presentation
PDF
Overview of Information Security & Privacy
PPTX
Digital certificates
PPTX
Database security
PPT
Web security ppt sniper corporation
PDF
Web Application Security 101
PPTX
The CIA triad.pptx
PPT
Digital signature
PDF
Basics of Cyber Security
PPTX
Data and Message Security
PPTX
Firewall and its types and function
DOCX
The CIA Triad - Assurance on Information Security
PPTX
Web security
PDF
Consumer Oriented E-Commerce Q&A
Information security and Attacks
Spoofing
Web security
Email security
Firewall ppt
Risks involved in E-payment
Network security presentation
Overview of Information Security & Privacy
Digital certificates
Database security
Web security ppt sniper corporation
Web Application Security 101
The CIA triad.pptx
Digital signature
Basics of Cyber Security
Data and Message Security
Firewall and its types and function
The CIA Triad - Assurance on Information Security
Web security
Consumer Oriented E-Commerce Q&A
Ad

Viewers also liked (12)

PPT
Ch 8 Client Server
PDF
Client /server security overview
PDF
NCC Group Pro-active Breach Discovery: Network Threat Assessment
PPTX
Www architecture,cgi, client server security, protection
PDF
Client server-computing
PPTX
Business policy
PPT
Introduction to business policy
PPTX
eCommerce Trends for 2015
PPT
PPT
Web Security
PPTX
Business Policy and Strategic Management
PPTX
E commerce ppt
Ch 8 Client Server
Client /server security overview
NCC Group Pro-active Breach Discovery: Network Threat Assessment
Www architecture,cgi, client server security, protection
Client server-computing
Business policy
Introduction to business policy
eCommerce Trends for 2015
Web Security
Business Policy and Strategic Management
E commerce ppt
Ad

Similar to Client server network threat (20)

PPS
Sreerag cs network security
PPT
Network sec 1
PPTX
Network Security
PDF
wireless networking chapter three WAN.pdf
PPTX
Cyber security
PPTX
Unit 1 Network Fundamentals and Security .pptx
PPTX
Network Security
PDF
Network security-S.Karthika II-M.Sc computer science,Bon Securous college for...
PPTX
Security in network computing
PPT
Security - ch5.ppt
PPTX
Security in Computer System
PDF
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
PPTX
Week 01 - Cryptography and Network Security.pptx
PPTX
Network security by sandhya
DOCX
Seguridad web -articulo completo- ingles
PPT
COMPUTER Computer science SECURITY-CHAPTER-ONE.ppt
PPTX
INTRODUCTION AND ACCESS CONTROL.pptx
PPTX
PPTX
Network security (vulnerabilities, threats, and attacks)
PPT
lec security
Sreerag cs network security
Network sec 1
Network Security
wireless networking chapter three WAN.pdf
Cyber security
Unit 1 Network Fundamentals and Security .pptx
Network Security
Network security-S.Karthika II-M.Sc computer science,Bon Securous college for...
Security in network computing
Security - ch5.ppt
Security in Computer System
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
Week 01 - Cryptography and Network Security.pptx
Network security by sandhya
Seguridad web -articulo completo- ingles
COMPUTER Computer science SECURITY-CHAPTER-ONE.ppt
INTRODUCTION AND ACCESS CONTROL.pptx
Network security (vulnerabilities, threats, and attacks)
lec security

More from Raj vardhan (20)

PPTX
Software Testing Life Cycle Unit-3
PPTX
Internet Basics Unit-7
PPTX
Local Area Network – Wired LAN
PPTX
Network Connecting Devices UNIT 5
DOCX
UNIT 4-HEADER FILES IN C
PPTX
Wireless LANs(IEEE802.11) Architecture
PPTX
UNIT -03 Transmission Media and Connecting Devices
PDF
Unit 1: Introduction to DBMS Unit 1 Complete
PPTX
Introduction To Software Concepts Unit 1 & 2
DOCX
Swachh Bharat Abhiyan - Project Report
DOCX
Network Topology
DOCX
Microsoft Office Word Introduction Complete
DOCX
Digital money Revolution Introduction
DOCX
C Programming
PPTX
Definition of Business
PPT
Business Terms & Concepts
PDF
Number System Conversion | BCA
DOCX
Interaction With Computers FIT
DOCX
FIT-MS-WORD Lab | BCA
PDF
Syllabus Front End Design Tool VB.NET | BCA-205
Software Testing Life Cycle Unit-3
Internet Basics Unit-7
Local Area Network – Wired LAN
Network Connecting Devices UNIT 5
UNIT 4-HEADER FILES IN C
Wireless LANs(IEEE802.11) Architecture
UNIT -03 Transmission Media and Connecting Devices
Unit 1: Introduction to DBMS Unit 1 Complete
Introduction To Software Concepts Unit 1 & 2
Swachh Bharat Abhiyan - Project Report
Network Topology
Microsoft Office Word Introduction Complete
Digital money Revolution Introduction
C Programming
Definition of Business
Business Terms & Concepts
Number System Conversion | BCA
Interaction With Computers FIT
FIT-MS-WORD Lab | BCA
Syllabus Front End Design Tool VB.NET | BCA-205

Recently uploaded (20)

PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Insiders guide to clinical Medicine.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
Pre independence Education in Inndia.pdf
PPTX
Institutional Correction lecture only . . .
PPTX
GDM (1) (1).pptx small presentation for students
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Computing-Curriculum for Schools in Ghana
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Final Presentation General Medicine 03-08-2024.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Renaissance Architecture: A Journey from Faith to Humanism
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
O7-L3 Supply Chain Operations - ICLT Program
Insiders guide to clinical Medicine.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
01-Introduction-to-Information-Management.pdf
Pre independence Education in Inndia.pdf
Institutional Correction lecture only . . .
GDM (1) (1).pptx small presentation for students
102 student loan defaulters named and shamed – Is someone you know on the list?
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Cell Structure & Organelles in detailed.
O5-L3 Freight Transport Ops (International) V1.pdf
Microbial diseases, their pathogenesis and prophylaxis
Computing-Curriculum for Schools in Ghana

Client server network threat

  • 2.  A security threat is a circumstance , condition , or event that causes a loss of or harm to data or network resources.  This loss can be in form of destruction ,disclosure and modification of data, denial of services, fraud and waste.  Organizations and businesses must secure themselves against such threats . The security solutions must be in the form of identification and authentication of users , encryption of all traffic from the application to the user , and access control to all information.
  • 4. SECURITY RISKS  Types of Security Risks Encountered on an Intranet and Extranet  An unauthorized person, such as a contractor or visitor, might gain access to a company’s computer system.  An employee or supplier authorized to use the system for one purpose might use it for another. For example, an engineer might break into the HR database to obtain confidential salary information.  Confidential information might be intercepted as it is being sent to an authorized user.  Users may share documents between geographically separated offices over the Internet or Extranet, or telecommuters accessing the corporate Intranet from their home computer can expose sensitive data as it is sent over the wire.  Electronic mail can be intercepted in transit.
  • 5. CLIENT-SERVER NETWORK SECURITY  Security problems in a client-server environment: -Physical security :when unauthorized user gains physical access to computers by guessing the passwords of various users. -Software security : A software security breach occurs when program are compromised and made to execute operations which they should not be legally be doing. -Inconsistent usage : Assembling is a growing problem due to the complexity of the software and security gets compromised.
  • 6. EMERGING THREATS 2 categories :  Threats to Client  Threat to Server Threats to Clients: -Virus :Attaches to an executable file, requires human action to spread. Some may cause only mildly annoying effects while others can damage your hardware, software or files. -Worm :Can replicate itself on system, does not require human action to spread.
  • 7.  -Trojan Horse :Appears useful but damages system, requires human action to run, do not self- replicate. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised
  • 8.  Threats to servers : -Unauthorized Eavesdropping :Hackers trap user names and unencrypted passwords sent over a network. -Denial of services : Where legitimate users are prevented from using a particular service due to the deliberate actions of attackers. Services can be denied by: -Service Overloading :Writing small looping program to send requests continually for a particular file. -Message Overloading :When someone sends a very large file , message box occupy all the space on the disk, causes disk to crash
  • 9.  -Packet modification : modifying or destroying a message packet. IP Spoofing is a technique used to gain unauthorized access to machines, whereby an attacker illicitly impersonate another machine by manipulating IP packets.
  • 10. METHODS TO PROTECT FROM SECURITY THREATS -Trust-based security: trusts everyone and does nothing extra to protect the network or restrict access to any data. -Security Through Obscurity (STO) :is the belief that a system of any sort can be secure so long as nobody outside of its implementation group is allowed to find out anything about its internal mechanisms. -Password schemes :It can also break down when some common words or names are used as passwords. This scheme provides a high-level of security. -Biometric system :involves some identification aspects which are related to the human body such as voice recognition ,finger prints. Expensive to implement.