SlideShare a Scribd company logo
CLIENT SERVER NETWORK SECURITY
MADE BY
MITHIL DOSHI
ROLL NO – 95
SUBJECT – E-COMMERCE
SEMESTER – II
CLASS – M.COM. PART – 1 (BUSINESS MANAGEMENT)
Content
1) Introduction
2) What is Client Server Networking ?
3) Benefits of Client Server Networking
4) Disadvantages of Client Server Networking
5) Client – Server Security
6) Types of way Servers can be kept Safe
7) Conclusion
1. Introduction
A client-server network is the medium through which clients
access resources and services from a central computer, via
either a local area network (LAN) or a wide-area network (WAN),
such as the Internet. A unique server called a daemon may be
employed for the sole purpose of awaiting client requests, at
which point the network connection is initiated until the client
request has been fulfilled.
Mithil Doshi
A computer network in which one centralized,
powerful computer (called the server) is a hub to
which many less powerful personal computers or
workstations (called clients) are connected. The
clients run programs and access data that are stored
on the server. Compare peer-to-peer network.
2. What is Client – Server Network ?
Client Server Network Architecture
Mithil Doshi
3. Benefits of Client – Server Networking
Mithil Doshi
There are numerous advantages of the client server architecture model:
• A single server hosting all the required data in a single place facilitates easy protection
of data and management of user authorization and authentication.
• Resources such as network segments, servers, and computers can be added to a client-
server network without any significant interruptions.
• Data can be accessed efficiently without requiring clients and the server to be in close
proximity.
• All nodes in the client-server system are independent, requesting data only from the
server, which facilitates easy upgrades, replacements, and relocation of the nodes.
• Data that is transferred through client-server protocols are platform-agnostic.
4. Disadvantages of Client Server Network
• A specialist network operating system is needed
• The server is expensive to purchase
• Specialist staff such as a network manager is needed
• If any part of the network fails a lot of disruption can occur
Mithil Doshi
• Client/server security uses various authorization methods to
make sure that only valid user and programs have access to
information resources such as databases.
• Access control mechanisms must be set up to ensure that
properly authenticated users are allowed access only to those
resources that they are entitled to use.
• Such mechanisms include password protection, encrypted
smart cards, biometrics, and firewalls.
5. Client – Server Security
Mithil Doshi
Firewall
Architecture
Mithil Doshi
6. Types of way Servers can be kept Safe
1. Establish and Use a Secure Connection
Using the SSH (Secure Shell) Protocol is the best way to establish a protected connection.
Unlike the previously used Telnet, SSH access encrypts all data transmitted in the exchange.
2. Monitor Login Attempts
Using intrusion prevention software to monitor login attempts is a way to protect your server
against brute force attacks.
3. Establish Password Requirements
The first thing is to set password requirements and rules that must be followed by all
members on the server.
Mithil Doshi
4. Set Password Expiration Policy
Setting an expiration date for a password is another routine practice when establishing
requirements for users. Depending on the level of security required, a password may last a
couple of weeks or a couple of months.
5. Update and Upgrade Software Regularly
Regularly updating the software on a server is a crucial step in keeping it safe from
hackers. Outdated software has already been explored for its weak points, leaving it open
for hackers to take advantage of these and harm your system.
6. Create Multi-Server Environments
Full separation would require having dedicated bare metal servers that do not share any
components with other servers. Although this is the easiest to manage and provides the
most security, it is also the most expensive.
Mithil Doshi
The online quiz system and
examination system are the
examples of the client-server
system. In this system admin of the
system can load a number of
questions of the different subject
with a right answer. So after taking
the test the result of every student
saved in the database. So assume
the world without this system so it
saves manpower and time. In the
recent time, all the applications
worked on the client server system.
In conclusion, the client server
system covers both areas of
networking and management due
to its flexibility in structure. So it is
very necessary for us to know the
advantage of this technology in the
IT world and different areas where
client-server system working
because if we do not know how this
technology will be used so we are
not able to take the full advantage
of its functionalities. So without
knowing the application of this
technology, it is very difficult for us to
execute the process.
7. Conclusion

More Related Content

What's hot

Frame work of e commerce
Frame work of e commerceFrame work of e commerce
Frame work of e commerceTej Kiran
 
Consumer Oriented E commerce Application
Consumer Oriented E commerce ApplicationConsumer Oriented E commerce Application
Consumer Oriented E commerce Application
Mahesh Shetty
 
E-Commerce Security
E-Commerce SecurityE-Commerce Security
E-Commerce Security
Syed Maniruzzaman Pabel
 
e-commerce
e-commercee-commerce
e-commerce
Manish Kaushik
 
Lecture-7: World Wide Web (WWW) & ECommerce
Lecture-7: World Wide Web (WWW) & ECommerceLecture-7: World Wide Web (WWW) & ECommerce
Lecture-7: World Wide Web (WWW) & ECommerce
Mubashir Ali
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
Hem Pokhrel
 
E commerce (edi)
E commerce (edi)E commerce (edi)
E commerce (edi)
Arnav Chowdhury
 
E commerce business models
E commerce business modelsE commerce business models
E commerce business modelsVikram g b
 
E-Commerce PPT
E-Commerce PPTE-Commerce PPT
E-Commerce PPT
OTHERS
 
Anatomy of Ecommerce framework
Anatomy of Ecommerce frameworkAnatomy of Ecommerce framework
Anatomy of Ecommerce framework
mohanapragashkec
 
6. electronic payment systems
6. electronic payment systems6. electronic payment systems
6. electronic payment systems
Pratap Tirkey
 
I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commercemc aa
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerce
Nishant Pahad
 
architecture framework for ecommerce
architecture framework for ecommercearchitecture framework for ecommerce
architecture framework for ecommerce
preetikapri1
 
I way
I wayI way
Security in e commerce
Security in e commerceSecurity in e commerce
Security in e commerce
akhand Akhandenator
 
Some E-commerce Applications
Some E-commerce ApplicationsSome E-commerce Applications
Some E-commerce Applications
Anuj Gupta
 
Issues and challenges in e-business
Issues and challenges in e-businessIssues and challenges in e-business
Issues and challenges in e-business
Nishant Pahad
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
Naveen Jakhar, I.T.S
 

What's hot (20)

Frame work of e commerce
Frame work of e commerceFrame work of e commerce
Frame work of e commerce
 
Consumer Oriented E commerce Application
Consumer Oriented E commerce ApplicationConsumer Oriented E commerce Application
Consumer Oriented E commerce Application
 
E-Commerce Security
E-Commerce SecurityE-Commerce Security
E-Commerce Security
 
e-commerce
e-commercee-commerce
e-commerce
 
Lecture-7: World Wide Web (WWW) & ECommerce
Lecture-7: World Wide Web (WWW) & ECommerceLecture-7: World Wide Web (WWW) & ECommerce
Lecture-7: World Wide Web (WWW) & ECommerce
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
E commerce (edi)
E commerce (edi)E commerce (edi)
E commerce (edi)
 
E commerce business models
E commerce business modelsE commerce business models
E commerce business models
 
E-Commerce PPT
E-Commerce PPTE-Commerce PPT
E-Commerce PPT
 
Anatomy of Ecommerce framework
Anatomy of Ecommerce frameworkAnatomy of Ecommerce framework
Anatomy of Ecommerce framework
 
6. electronic payment systems
6. electronic payment systems6. electronic payment systems
6. electronic payment systems
 
Edi layer
Edi layerEdi layer
Edi layer
 
I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commerce
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerce
 
architecture framework for ecommerce
architecture framework for ecommercearchitecture framework for ecommerce
architecture framework for ecommerce
 
I way
I wayI way
I way
 
Security in e commerce
Security in e commerceSecurity in e commerce
Security in e commerce
 
Some E-commerce Applications
Some E-commerce ApplicationsSome E-commerce Applications
Some E-commerce Applications
 
Issues and challenges in e-business
Issues and challenges in e-businessIssues and challenges in e-business
Issues and challenges in e-business
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 

Similar to Client Server Network Security

E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology Essay
Pamela Wright
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Pyingkodi Maran
 
SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
DrThenmozhiKarunanit
 
client-server.pptx
client-server.pptxclient-server.pptx
client-server.pptx
EbukaChikodi
 
University Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataUniversity Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical Data
Nasser Hassan
 
Unit 4_Introduction to Server Farms.pptx
Unit 4_Introduction to Server Farms.pptxUnit 4_Introduction to Server Farms.pptx
Unit 4_Introduction to Server Farms.pptx
Rahul Borate
 
Peer to peer
Peer to peerPeer to peer
Peer to peer
Raymond Douglas
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Pyingkodi Maran
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to security
Amjad Afridi
 
unit 4-1.pptx
unit 4-1.pptxunit 4-1.pptx
unit 4-1.pptx
prakashvs7
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
On Premise Servers and Cloud-Based Servers.pptx
On Premise Servers and Cloud-Based Servers.pptxOn Premise Servers and Cloud-Based Servers.pptx
On Premise Servers and Cloud-Based Servers.pptx
Reyce Trono
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver PresentationTuhin_Das
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
IJSRED
 
Data center proposal
Data center proposalData center proposal
Data center proposal
Muhammad Ahad
 
Client Server Model and Distributed Computing
Client Server Model and Distributed ComputingClient Server Model and Distributed Computing
Client Server Model and Distributed Computing
Abhishek Jaisingh
 
AZURE CC JP.pptx
AZURE CC JP.pptxAZURE CC JP.pptx
AZURE CC JP.pptx
Jayesh Patil
 

Similar to Client Server Network Security (20)

E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology Essay
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
 
client-server.pptx
client-server.pptxclient-server.pptx
client-server.pptx
 
University Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataUniversity Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical Data
 
Unit 4_Introduction to Server Farms.pptx
Unit 4_Introduction to Server Farms.pptxUnit 4_Introduction to Server Farms.pptx
Unit 4_Introduction to Server Farms.pptx
 
Peer to peer
Peer to peerPeer to peer
Peer to peer
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to security
 
unit 4-1.pptx
unit 4-1.pptxunit 4-1.pptx
unit 4-1.pptx
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
On Premise Servers and Cloud-Based Servers.pptx
On Premise Servers and Cloud-Based Servers.pptxOn Premise Servers and Cloud-Based Servers.pptx
On Premise Servers and Cloud-Based Servers.pptx
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver Presentation
 
Unit-II-part 3.pdf
Unit-II-part 3.pdfUnit-II-part 3.pdf
Unit-II-part 3.pdf
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
 
Data center proposal
Data center proposalData center proposal
Data center proposal
 
Client Server Model and Distributed Computing
Client Server Model and Distributed ComputingClient Server Model and Distributed Computing
Client Server Model and Distributed Computing
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
AZURE CC JP.pptx
AZURE CC JP.pptxAZURE CC JP.pptx
AZURE CC JP.pptx
 

Recently uploaded

In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
XfilesPro
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
NaapbooksPrivateLimi
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
varshanayak241
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
Peter Caitens
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 

Recently uploaded (20)

In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 

Client Server Network Security

  • 1. CLIENT SERVER NETWORK SECURITY MADE BY MITHIL DOSHI ROLL NO – 95 SUBJECT – E-COMMERCE SEMESTER – II CLASS – M.COM. PART – 1 (BUSINESS MANAGEMENT)
  • 2. Content 1) Introduction 2) What is Client Server Networking ? 3) Benefits of Client Server Networking 4) Disadvantages of Client Server Networking 5) Client – Server Security 6) Types of way Servers can be kept Safe 7) Conclusion
  • 3. 1. Introduction A client-server network is the medium through which clients access resources and services from a central computer, via either a local area network (LAN) or a wide-area network (WAN), such as the Internet. A unique server called a daemon may be employed for the sole purpose of awaiting client requests, at which point the network connection is initiated until the client request has been fulfilled. Mithil Doshi
  • 4. A computer network in which one centralized, powerful computer (called the server) is a hub to which many less powerful personal computers or workstations (called clients) are connected. The clients run programs and access data that are stored on the server. Compare peer-to-peer network. 2. What is Client – Server Network ?
  • 5. Client Server Network Architecture Mithil Doshi
  • 6. 3. Benefits of Client – Server Networking Mithil Doshi There are numerous advantages of the client server architecture model: • A single server hosting all the required data in a single place facilitates easy protection of data and management of user authorization and authentication. • Resources such as network segments, servers, and computers can be added to a client- server network without any significant interruptions. • Data can be accessed efficiently without requiring clients and the server to be in close proximity. • All nodes in the client-server system are independent, requesting data only from the server, which facilitates easy upgrades, replacements, and relocation of the nodes. • Data that is transferred through client-server protocols are platform-agnostic.
  • 7. 4. Disadvantages of Client Server Network • A specialist network operating system is needed • The server is expensive to purchase • Specialist staff such as a network manager is needed • If any part of the network fails a lot of disruption can occur Mithil Doshi
  • 8. • Client/server security uses various authorization methods to make sure that only valid user and programs have access to information resources such as databases. • Access control mechanisms must be set up to ensure that properly authenticated users are allowed access only to those resources that they are entitled to use. • Such mechanisms include password protection, encrypted smart cards, biometrics, and firewalls. 5. Client – Server Security Mithil Doshi
  • 10. 6. Types of way Servers can be kept Safe 1. Establish and Use a Secure Connection Using the SSH (Secure Shell) Protocol is the best way to establish a protected connection. Unlike the previously used Telnet, SSH access encrypts all data transmitted in the exchange. 2. Monitor Login Attempts Using intrusion prevention software to monitor login attempts is a way to protect your server against brute force attacks. 3. Establish Password Requirements The first thing is to set password requirements and rules that must be followed by all members on the server. Mithil Doshi
  • 11. 4. Set Password Expiration Policy Setting an expiration date for a password is another routine practice when establishing requirements for users. Depending on the level of security required, a password may last a couple of weeks or a couple of months. 5. Update and Upgrade Software Regularly Regularly updating the software on a server is a crucial step in keeping it safe from hackers. Outdated software has already been explored for its weak points, leaving it open for hackers to take advantage of these and harm your system. 6. Create Multi-Server Environments Full separation would require having dedicated bare metal servers that do not share any components with other servers. Although this is the easiest to manage and provides the most security, it is also the most expensive. Mithil Doshi
  • 12. The online quiz system and examination system are the examples of the client-server system. In this system admin of the system can load a number of questions of the different subject with a right answer. So after taking the test the result of every student saved in the database. So assume the world without this system so it saves manpower and time. In the recent time, all the applications worked on the client server system. In conclusion, the client server system covers both areas of networking and management due to its flexibility in structure. So it is very necessary for us to know the advantage of this technology in the IT world and different areas where client-server system working because if we do not know how this technology will be used so we are not able to take the full advantage of its functionalities. So without knowing the application of this technology, it is very difficult for us to execute the process. 7. Conclusion