This document discusses client-server network security. It begins with an introduction to client-server networks and defines them as networks with a centralized, powerful server computer that client computers access to run programs and store data. It then covers the benefits of client-server networks, including centralized data storage and protection, easy expansion, and platform independence. Potential security risks to servers are also discussed, along with methods to secure servers like firewalls, encrypted connections, and password policies. Examples of client-server systems for online quizzes and exams are provided in the conclusion.
1. CLIENT SERVER NETWORK SECURITY
MADE BY
MITHIL DOSHI
ROLL NO – 95
SUBJECT – E-COMMERCE
SEMESTER – II
CLASS – M.COM. PART – 1 (BUSINESS MANAGEMENT)
2. Content
1) Introduction
2) What is Client Server Networking ?
3) Benefits of Client Server Networking
4) Disadvantages of Client Server Networking
5) Client – Server Security
6) Types of way Servers can be kept Safe
7) Conclusion
3. 1. Introduction
A client-server network is the medium through which clients
access resources and services from a central computer, via
either a local area network (LAN) or a wide-area network (WAN),
such as the Internet. A unique server called a daemon may be
employed for the sole purpose of awaiting client requests, at
which point the network connection is initiated until the client
request has been fulfilled.
Mithil Doshi
4. A computer network in which one centralized,
powerful computer (called the server) is a hub to
which many less powerful personal computers or
workstations (called clients) are connected. The
clients run programs and access data that are stored
on the server. Compare peer-to-peer network.
2. What is Client – Server Network ?
6. 3. Benefits of Client – Server Networking
Mithil Doshi
There are numerous advantages of the client server architecture model:
• A single server hosting all the required data in a single place facilitates easy protection
of data and management of user authorization and authentication.
• Resources such as network segments, servers, and computers can be added to a client-
server network without any significant interruptions.
• Data can be accessed efficiently without requiring clients and the server to be in close
proximity.
• All nodes in the client-server system are independent, requesting data only from the
server, which facilitates easy upgrades, replacements, and relocation of the nodes.
• Data that is transferred through client-server protocols are platform-agnostic.
7. 4. Disadvantages of Client Server Network
• A specialist network operating system is needed
• The server is expensive to purchase
• Specialist staff such as a network manager is needed
• If any part of the network fails a lot of disruption can occur
Mithil Doshi
8. • Client/server security uses various authorization methods to
make sure that only valid user and programs have access to
information resources such as databases.
• Access control mechanisms must be set up to ensure that
properly authenticated users are allowed access only to those
resources that they are entitled to use.
• Such mechanisms include password protection, encrypted
smart cards, biometrics, and firewalls.
5. Client – Server Security
Mithil Doshi
10. 6. Types of way Servers can be kept Safe
1. Establish and Use a Secure Connection
Using the SSH (Secure Shell) Protocol is the best way to establish a protected connection.
Unlike the previously used Telnet, SSH access encrypts all data transmitted in the exchange.
2. Monitor Login Attempts
Using intrusion prevention software to monitor login attempts is a way to protect your server
against brute force attacks.
3. Establish Password Requirements
The first thing is to set password requirements and rules that must be followed by all
members on the server.
Mithil Doshi
11. 4. Set Password Expiration Policy
Setting an expiration date for a password is another routine practice when establishing
requirements for users. Depending on the level of security required, a password may last a
couple of weeks or a couple of months.
5. Update and Upgrade Software Regularly
Regularly updating the software on a server is a crucial step in keeping it safe from
hackers. Outdated software has already been explored for its weak points, leaving it open
for hackers to take advantage of these and harm your system.
6. Create Multi-Server Environments
Full separation would require having dedicated bare metal servers that do not share any
components with other servers. Although this is the easiest to manage and provides the
most security, it is also the most expensive.
Mithil Doshi
12. The online quiz system and
examination system are the
examples of the client-server
system. In this system admin of the
system can load a number of
questions of the different subject
with a right answer. So after taking
the test the result of every student
saved in the database. So assume
the world without this system so it
saves manpower and time. In the
recent time, all the applications
worked on the client server system.
In conclusion, the client server
system covers both areas of
networking and management due
to its flexibility in structure. So it is
very necessary for us to know the
advantage of this technology in the
IT world and different areas where
client-server system working
because if we do not know how this
technology will be used so we are
not able to take the full advantage
of its functionalities. So without
knowing the application of this
technology, it is very difficult for us to
execute the process.
7. Conclusion