SlideShare a Scribd company logo
2
Most read
4
Most read
7
Most read
Rahul kundu
6th sem, IT
 Client-server security threats can be divided
into 2 major categories:-
a) Threats to client
b) Threats to server
 Client threats mostly arise from malicious
data or code, malicious code refers to viruses,
worms,Trojan horses & deviant.
 A computer virus is a program or piece of
code that is loaded onto your computer
without your knowledge & runs against your
wishes.
 Virus can also replicate themselves.
 A program that performs a desired task but
also performs unexpected function.
 It is a self-replicating program that a self
continued & does not need any host program
to execute.
 Clients must scan for malicious data &
executable program fragment that are
transferred form the server to the client.
 Unauthorized eavesdropping
 Denial of services(Dos)
 Modification of incoming data packets
 Watching data or information as it travels
through the internet.
 Hackers can use to trap username &
unencrypted password sent over that
network.
 A denial of service attack is an effort to make
one or more computer system unavailable.
 It is typically targeted at web servers but it
can also be used on mail server, name servers
& any other type of computer system.
 The 2 most common types of these attacks
are:-
service overloading
message overloading
 Servers are vulnerable to service overloading.
 Dos will occur due to overloading of the
server.
 Message overloading will occur when
someone sends a very large file to the
message box of server at every few seconds.
 The message box rapidly grows in size &
begins to occupy all space on the disk &
increase the number of receiving process on
the recipient’s machine & causing a disk
crash.
 It is an integrity threats that involve
modifying a message packet or destroyed the
message packet.
 In many cases, packet information not only
be modified, but its contents may be
destroyed before legitimate users can see
them.
Client server security threats

More Related Content

PPT
HCI - Chapter 2
PPT
E Commerce Basics
PPT
HCI - Chapter 6
PDF
Calculation of premium in life insurance by Dr. Amitabh Mishra
PPT
Verification & Validation
PPT
Software reliability
PPTX
Social-media-PPT.pptx
PPTX
consumer oriented applications
HCI - Chapter 2
E Commerce Basics
HCI - Chapter 6
Calculation of premium in life insurance by Dr. Amitabh Mishra
Verification & Validation
Software reliability
Social-media-PPT.pptx
consumer oriented applications

What's hot (20)

PPTX
Data and Message Security
PDF
Network security for E-Commerce
PDF
Client Server Network Security
PPTX
Presentation - Electronic Data Interchange
PDF
Consumer Oriented E commerce Application
PPTX
digital tokens based on E-payments
PPTX
Electronic Payment Systems in E Commerce
PPT
Edi ppt
PPT
e-commerce
PPT
E-Commerce Security
PPTX
architecture framework for ecommerce
PPTX
Client server network threat
PDF
Network Infrastructure for E-commerce | Part I
PPT
EC_2_JNTUWORLD.ppt
PPTX
M-Commerce
PPTX
E commerce infrastructure
PPSX
I way - Network Infrastructure for e-Commerce
PPTX
Security issues in E-commerce
PPTX
E commerce
PPT
E -COMMERCE
Data and Message Security
Network security for E-Commerce
Client Server Network Security
Presentation - Electronic Data Interchange
Consumer Oriented E commerce Application
digital tokens based on E-payments
Electronic Payment Systems in E Commerce
Edi ppt
e-commerce
E-Commerce Security
architecture framework for ecommerce
Client server network threat
Network Infrastructure for E-commerce | Part I
EC_2_JNTUWORLD.ppt
M-Commerce
E commerce infrastructure
I way - Network Infrastructure for e-Commerce
Security issues in E-commerce
E commerce
E -COMMERCE
Ad

Similar to Client server security threats (20)

PPTX
A Taken on Cyber Attacks - The Cyber Physical System.pptx
PPTX
Computing safety
PPTX
Security and ethics
PPTX
Types of attacks in cyber security
PDF
Network security
PDF
Chapter 2 konsep dasar keamanan
PPS
Sreerag cs network security
PPT
Computer Security
PPT
Computer Security
PPTX
FCT UNIT 5 Foundation of computing technologies.pptx
PPTX
Tools and methods used in cybercrime
PDF
Chapter 2 konsep dasar keamanan
PPT
Security communication
PPTX
Lecture 2.pptx
PPTX
Lecture 2.pptx
PPTX
Computer security system Unit1.pptx
PPTX
Web server security challenges
PPTX
cryptography .pptx
PPTX
Network security presentation
PPTX
(046) IS.pptx taxation on withholding statement
A Taken on Cyber Attacks - The Cyber Physical System.pptx
Computing safety
Security and ethics
Types of attacks in cyber security
Network security
Chapter 2 konsep dasar keamanan
Sreerag cs network security
Computer Security
Computer Security
FCT UNIT 5 Foundation of computing technologies.pptx
Tools and methods used in cybercrime
Chapter 2 konsep dasar keamanan
Security communication
Lecture 2.pptx
Lecture 2.pptx
Computer security system Unit1.pptx
Web server security challenges
cryptography .pptx
Network security presentation
(046) IS.pptx taxation on withholding statement
Ad

More from rahul kundu (17)

PPTX
Material management
PPTX
Business function in organization
PPTX
Document object model(dom)
PPTX
Document object model(dom)
PPTX
PPTX
PPTX
Internet
PPTX
Type of internet connectivity
PPTX
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
PPTX
Introduction of tcp, ip & udp
PPTX
Electronic payment system(EPS)
PPTX
Ipv4 and Ipv6
PPTX
Authentication, authorization, accounting(aaa) slides
PPT
Electronic data-interchange slides
PPTX
Introduction of firewall slides
PPTX
Virus slides
PPTX
Mpeg 7 slides
Material management
Business function in organization
Document object model(dom)
Document object model(dom)
Internet
Type of internet connectivity
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Introduction of tcp, ip & udp
Electronic payment system(EPS)
Ipv4 and Ipv6
Authentication, authorization, accounting(aaa) slides
Electronic data-interchange slides
Introduction of firewall slides
Virus slides
Mpeg 7 slides

Recently uploaded (20)

PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPTX
artificial intelligence overview of it and more
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
DOCX
Unit-3 cyber security network security of internet system
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
innovation process that make everything different.pptx
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
RPKI Status Update, presented by Makito Lay at IDNOG 10
artificial intelligence overview of it and more
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
An introduction to the IFRS (ISSB) Stndards.pdf
Unit-1 introduction to cyber security discuss about how to secure a system
Sims 4 Historia para lo sims 4 para jugar
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Unit-3 cyber security network security of internet system
Cloud-Scale Log Monitoring _ Datadog.pdf
QR Codes Qr codecodecodecodecocodedecodecode
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Decoding a Decade: 10 Years of Applied CTI Discipline
Introuction about ICD -10 and ICD-11 PPT.pptx
international classification of diseases ICD-10 review PPT.pptx
INTERNET------BASICS-------UPDATED PPT PRESENTATION
innovation process that make everything different.pptx
Design_with_Watersergyerge45hrbgre4top (1).ppt
The New Creative Director: How AI Tools for Social Media Content Creation Are...
522797556-Unit-2-Temperature-measurement-1-1.pptx

Client server security threats

  • 2.  Client-server security threats can be divided into 2 major categories:- a) Threats to client b) Threats to server
  • 3.  Client threats mostly arise from malicious data or code, malicious code refers to viruses, worms,Trojan horses & deviant.
  • 4.  A computer virus is a program or piece of code that is loaded onto your computer without your knowledge & runs against your wishes.  Virus can also replicate themselves.
  • 5.  A program that performs a desired task but also performs unexpected function.
  • 6.  It is a self-replicating program that a self continued & does not need any host program to execute.  Clients must scan for malicious data & executable program fragment that are transferred form the server to the client.
  • 7.  Unauthorized eavesdropping  Denial of services(Dos)  Modification of incoming data packets
  • 8.  Watching data or information as it travels through the internet.  Hackers can use to trap username & unencrypted password sent over that network.
  • 9.  A denial of service attack is an effort to make one or more computer system unavailable.  It is typically targeted at web servers but it can also be used on mail server, name servers & any other type of computer system.  The 2 most common types of these attacks are:- service overloading message overloading
  • 10.  Servers are vulnerable to service overloading.  Dos will occur due to overloading of the server.
  • 11.  Message overloading will occur when someone sends a very large file to the message box of server at every few seconds.  The message box rapidly grows in size & begins to occupy all space on the disk & increase the number of receiving process on the recipient’s machine & causing a disk crash.
  • 12.  It is an integrity threats that involve modifying a message packet or destroyed the message packet.  In many cases, packet information not only be modified, but its contents may be destroyed before legitimate users can see them.