SlideShare a Scribd company logo
WWW ARCHITECTURE
, CGI, CLIENT SERVER
SECURITY, PROTECTION
METHODS


               GROUP 3
               Austina Francis
               Anju Babu
               Abhraham Easo
               Vinil Steephen
               Jomon J Joseph
WWW ARCHITECTURE

 WWW
  The   WWW service in which a client using a
   browser can access the service through the
   server.
  The service provided is distributed over
   many locations called sites.
  It was initially developed in 1989 by Tim
   Berners Lee at the CERN lab , in
   Switzerland.
  It has a unique combination of probability
   ,flexibility , and user friendly features
   provided by the internet.
CLIENT-SERVER ARCHITECTURE OF WORLD WIDE
WEB
FUNCTIONAL COMPONENTS OF
           WWW
 Web browsers
 Web servers
 Hyper Text Markup Language
 HTTP
 URL(Uniform Resource Locator)
WORKING OF WWW
 The  system begins bigins by resolving
  the server name part of the URL in the IP
  address using internet database.
 Browser send an HTTP request to web
  server at that particular page and further
  forming a par of that page like images.
 After receiving the requested files the
  browser displays the page on the screen.
 In order to view a web page on the
  WWW one has to type the URL.

INTERNET VS. WWW
Internet is the infrastructure    WWW is just one of many
  that makes the WWW                “virtual networks” built on
  work.                             the Internet.
 Packet Switching                 Websites: http, https, etc.

 TCP/IP Protocol                  Email: pop, imap, etc.

 Physical Infrastructure          Other systems: ftp, instant
     Fiber-optics lines, wires     messaging, etc.
     Satellites, Cable Modems       Note: Even to this day
     Routers, Hubs, Network          companies have “private virtual
      Cards, WiFi systems, etc.       networks” that use the
                                      Internet, but are
                                      proprietary, locked-down.
INTRODUCTION TO CGI
 CGI  stands for Common Gateway Interface.
 CGI is a standard programming interface to
  Web servers that gives us a way to make our
  sites dynamic and interactive.
 CGI is not a programming language. It is just
  a set of standards (protocols.)
 CGI can be implemented in an interpreted
  language such as PERL or in a compiled
  language such as C.
INTRODUCTION TO CGI

   An HTTP server is often used as a gateway to a
    legacy information system; for example, an existing
    body of documents or an existing database
    application. The Common Gateway Interface is an
    agreement between HTTP server implementors
    about how to integrate such gateway scripts and
    programs.

   It is typically used in conjunction with HTML forms
    to build database applications.
CGI PROGRAMMING




                                        Netprog 2002 CGI Programming
              HTTP
             SERVER




CLIENT                CGI Program




                                    9
CGI- WORKING


 CGI  programs work as follows:
   STEP 1 (On the client side): Get
    Information from the user (using HTML
    forms, SSI, Java Applet, …,etc).
   STEP 2 (On the server side): Process the
    data, connect to DATABASE, search for
    PATTERNS, …,etc.
   STEP 3 (On the server side): Send the
    result of computation back to the client.
HTTP HEADER FIELDS ARE COMPONENTS OF THE
MESSAGE HEADER OF REQUESTS AND RESPONSES IN
THE HYPERTEXT TRANSFERVPROTOCOL THEY DEFINE THE
OPERATING PARAMETERS OF AN HTTP TRANSACTION


  Multipurpose Internet Mail Extensions (MIME)
 is an Internet standard that extends the format
   of email to support:
 Text in character sets other than ASCII

 Non-text attachments

a)    Message bodies with multiple parts
b)   Header information in non-ASCII character sets
ADVANTAGES OF CGI
          Provides user interface
          Stores some settings

          Can do some data processing

          Little to no application data storage
                Same view of data no matter where you login
CLIENT SERVER SECURITY
 keeps a check on the flow of information and it also
  helps in the smooth functioning of the computers.
 The Client server Security works on the basis of
  authority, first it has to have the authority to identify
  and then identify the hindrance in the security
  pathway.
 It have the Discretionary control to set things back
  to their normal place
 and then another check is done which can called as
  an audit.
CLIENT SERVER SECURITY
   The object can be re-used or the data can be send
    all over again..

   The major disadvantage is that

    Tere is no single security system which can handle
    all the problems related to the Client server
    security, so there are many which has to be
    installed and checkpoints have to be maintained at
    every point
WORKING LAY OUT
   The security measures of online retailers vary
    immensely.

   The methods used to gather, store, and distribute
    information is implemented differently across the
    web.

    Many companies and corporations that collect
    sensitive data do not have proper security protocols
    put into place, which may compromise personal
    information.


   Common errors that online businesses make when
    processing transactions will be analyzed and
    critiqued..
   This includes information security and the protocols
    that they should put into place both in terms of their
    computer infrastructure, data collection and the
    establishment of personnel protocols, such as the
    handling of sensitive information and password
    changes.

   The transactions between the client and server will
    be examined along with the protocols used in the
    sharing of information, such as secure socket
    layers and their different certificates, encryption and
    security measures that are utilized.
   . E-commerce firms must ensure that they control
    access to their information assets and the use of
    their networks by designing and implementing
    controls that will diminish the dissemination of
    sensitive information.

   There are possible vulnerabilities on a client’s
    machine that can lead to data being compromised
    before it is uploaded to the server.
MAIN SECURITY THREATS
 Unauthorized data access - kind of threat when
  unauthorized person gets access to confidential
  information. It can lead to situation when such
  information becomes public or is used against its
  owner.
 Unauthorized data modifications - kind of threat
  when data can be changed or deleted accidentally
  or intentionally by the person that has no
  permissions for such actions.
SECURING YOUR CLIENT-SERVER

 Data encoding and encryption:
 MAIN goal of encryption is to hide the data from
  being visible and accessible without having the key.
o Symmetric encryption algorithms:

  Special algorithm and key are used for encryption.
  The same algorithm and key are used for
  information decryption.Another name is also used -
  secret-key cryptograph.
 Block and stream encryption in symmetric
  algorithms
 Public key algorithm security

 Certificates

 Secure transport protocols

 analyse security of data storage and data
  transfer channels;
 check if there are times when data is not
  encrypted;
 if the data is not encrypted, check if they are
  freely accessible;
 if the is encrypted, check if the attacker can
  obtain something useable for recovery of the
  encryption keys
THANK YOU

More Related Content

What's hot

HTTPS presentation at Port80 Sydney meetup March 2016
HTTPS presentation at Port80 Sydney meetup March 2016HTTPS presentation at Port80 Sydney meetup March 2016
HTTPS presentation at Port80 Sydney meetup March 2016
Jason Stangroome
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .
simplyharshad
 
Eati_Chandra_CV
Eati_Chandra_CVEati_Chandra_CV
Eati_Chandra_CV
Eati Chandra Sekhar
 
Web Proxy Server
Web Proxy ServerWeb Proxy Server
Web Proxy Server
Mohit Dhankher
 
Outlook and thunderbird ii
Outlook and thunderbird iiOutlook and thunderbird ii
Outlook and thunderbird ii
BanukaVidusanka
 
Http VS. Https
Http VS. HttpsHttp VS. Https
Http VS. Https
Raed Aldahdooh
 
Web o sppt
Web o spptWeb o sppt
Web o sppt
psukhdeve
 
ema
emaema
Net Druid Presentation
Net Druid PresentationNet Druid Presentation
Net Druid Presentation
guestf70326
 
Net druid new presentation
Net druid new presentationNet druid new presentation
Net druid new presentation
nikhilpatil49
 
Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic Commerce
Darlene Enderez
 
hostedexchange
hostedexchangehostedexchange
hostedexchange
netCORE Solutions
 
Json web tokens
Json web tokensJson web tokens
Json web tokens
ElieHannouch
 
internet principles of operation By ZAK
internet principles of operation By ZAKinternet principles of operation By ZAK
internet principles of operation By ZAK
Tabsheer Hasan
 
What is an intranet
What is an intranetWhat is an intranet
What is an intranet
Amandeep Kaur
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
Rohit Soni
 
Email,contacts and calendar
Email,contacts and calendarEmail,contacts and calendar
Email,contacts and calendar
Deepak John
 
Lec 1
Lec 1Lec 1
Lec 1
hz3012
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
Netwax Lab
 

What's hot (19)

HTTPS presentation at Port80 Sydney meetup March 2016
HTTPS presentation at Port80 Sydney meetup March 2016HTTPS presentation at Port80 Sydney meetup March 2016
HTTPS presentation at Port80 Sydney meetup March 2016
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .
 
Eati_Chandra_CV
Eati_Chandra_CVEati_Chandra_CV
Eati_Chandra_CV
 
Web Proxy Server
Web Proxy ServerWeb Proxy Server
Web Proxy Server
 
Outlook and thunderbird ii
Outlook and thunderbird iiOutlook and thunderbird ii
Outlook and thunderbird ii
 
Http VS. Https
Http VS. HttpsHttp VS. Https
Http VS. Https
 
Web o sppt
Web o spptWeb o sppt
Web o sppt
 
ema
emaema
ema
 
Net Druid Presentation
Net Druid PresentationNet Druid Presentation
Net Druid Presentation
 
Net druid new presentation
Net druid new presentationNet druid new presentation
Net druid new presentation
 
Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic Commerce
 
hostedexchange
hostedexchangehostedexchange
hostedexchange
 
Json web tokens
Json web tokensJson web tokens
Json web tokens
 
internet principles of operation By ZAK
internet principles of operation By ZAKinternet principles of operation By ZAK
internet principles of operation By ZAK
 
What is an intranet
What is an intranetWhat is an intranet
What is an intranet
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
 
Email,contacts and calendar
Email,contacts and calendarEmail,contacts and calendar
Email,contacts and calendar
 
Lec 1
Lec 1Lec 1
Lec 1
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 

Similar to Www architecture,cgi, client server security, protection

Edi
EdiEdi
E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology Essay
Pamela Wright
 
Web-Server & It's Architecture.pptx
Web-Server & It's Architecture.pptxWeb-Server & It's Architecture.pptx
Web-Server & It's Architecture.pptx
AlokKumar250045
 
Web Server Hardware and Software
Web Server Hardware and SoftwareWeb Server Hardware and Software
Web Server Hardware and Software
webhostingguy
 
Application layer assignments
Application layer assignmentsApplication layer assignments
Application layer assignments
Isaac Akingbala
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
Rishabh Gupta
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
Shakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
Shakas Technologies
 
Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site Security
Steven Cahill
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
Amazon Web Services
 
Web server
Web serverWeb server
Web server
Ankit Raj
 
0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf
Zani10
 
Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)
rosu555
 
Double guard synopsis
Double guard synopsisDouble guard synopsis
Double guard synopsis
manju5162
 
Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
SANKET SENAPATI
 
Fullstack Interview Questions and Answers.pdf
Fullstack Interview Questions and Answers.pdfFullstack Interview Questions and Answers.pdf
Fullstack Interview Questions and Answers.pdf
csvishnukumar
 
An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...
IOSR Journals
 
H017113842
H017113842H017113842
H017113842
IOSR Journals
 
21. Application Development and Administration in DBMS
21. Application Development and Administration in DBMS21. Application Development and Administration in DBMS
21. Application Development and Administration in DBMS
koolkampus
 
Web Server Technologies II: Web Applications & Server Maintenance
Web Server Technologies II: Web Applications & Server MaintenanceWeb Server Technologies II: Web Applications & Server Maintenance
Web Server Technologies II: Web Applications & Server Maintenance
Port80 Software
 

Similar to Www architecture,cgi, client server security, protection (20)

Edi
EdiEdi
Edi
 
E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology Essay
 
Web-Server & It's Architecture.pptx
Web-Server & It's Architecture.pptxWeb-Server & It's Architecture.pptx
Web-Server & It's Architecture.pptx
 
Web Server Hardware and Software
Web Server Hardware and SoftwareWeb Server Hardware and Software
Web Server Hardware and Software
 
Application layer assignments
Application layer assignmentsApplication layer assignments
Application layer assignments
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site Security
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 
Web server
Web serverWeb server
Web server
 
0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf
 
Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)
 
Double guard synopsis
Double guard synopsisDouble guard synopsis
Double guard synopsis
 
Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
 
Fullstack Interview Questions and Answers.pdf
Fullstack Interview Questions and Answers.pdfFullstack Interview Questions and Answers.pdf
Fullstack Interview Questions and Answers.pdf
 
An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...
 
H017113842
H017113842H017113842
H017113842
 
21. Application Development and Administration in DBMS
21. Application Development and Administration in DBMS21. Application Development and Administration in DBMS
21. Application Development and Administration in DBMS
 
Web Server Technologies II: Web Applications & Server Maintenance
Web Server Technologies II: Web Applications & Server MaintenanceWeb Server Technologies II: Web Applications & Server Maintenance
Web Server Technologies II: Web Applications & Server Maintenance
 

Recently uploaded

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 

Recently uploaded (20)

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 

Www architecture,cgi, client server security, protection

  • 1. WWW ARCHITECTURE , CGI, CLIENT SERVER SECURITY, PROTECTION METHODS GROUP 3 Austina Francis Anju Babu Abhraham Easo Vinil Steephen Jomon J Joseph
  • 2. WWW ARCHITECTURE  WWW  The WWW service in which a client using a browser can access the service through the server.  The service provided is distributed over many locations called sites.  It was initially developed in 1989 by Tim Berners Lee at the CERN lab , in Switzerland.  It has a unique combination of probability ,flexibility , and user friendly features provided by the internet.
  • 4. FUNCTIONAL COMPONENTS OF WWW  Web browsers  Web servers  Hyper Text Markup Language  HTTP  URL(Uniform Resource Locator)
  • 5. WORKING OF WWW  The system begins bigins by resolving the server name part of the URL in the IP address using internet database.  Browser send an HTTP request to web server at that particular page and further forming a par of that page like images.  After receiving the requested files the browser displays the page on the screen.  In order to view a web page on the WWW one has to type the URL. 
  • 6. INTERNET VS. WWW Internet is the infrastructure WWW is just one of many that makes the WWW “virtual networks” built on work. the Internet.  Packet Switching  Websites: http, https, etc.  TCP/IP Protocol  Email: pop, imap, etc.  Physical Infrastructure  Other systems: ftp, instant  Fiber-optics lines, wires messaging, etc.  Satellites, Cable Modems  Note: Even to this day  Routers, Hubs, Network companies have “private virtual Cards, WiFi systems, etc. networks” that use the Internet, but are proprietary, locked-down.
  • 7. INTRODUCTION TO CGI  CGI stands for Common Gateway Interface.  CGI is a standard programming interface to Web servers that gives us a way to make our sites dynamic and interactive.  CGI is not a programming language. It is just a set of standards (protocols.)  CGI can be implemented in an interpreted language such as PERL or in a compiled language such as C.
  • 8. INTRODUCTION TO CGI  An HTTP server is often used as a gateway to a legacy information system; for example, an existing body of documents or an existing database application. The Common Gateway Interface is an agreement between HTTP server implementors about how to integrate such gateway scripts and programs.  It is typically used in conjunction with HTML forms to build database applications.
  • 9. CGI PROGRAMMING Netprog 2002 CGI Programming HTTP SERVER CLIENT CGI Program 9
  • 10. CGI- WORKING  CGI programs work as follows:  STEP 1 (On the client side): Get Information from the user (using HTML forms, SSI, Java Applet, …,etc).  STEP 2 (On the server side): Process the data, connect to DATABASE, search for PATTERNS, …,etc.  STEP 3 (On the server side): Send the result of computation back to the client.
  • 11. HTTP HEADER FIELDS ARE COMPONENTS OF THE MESSAGE HEADER OF REQUESTS AND RESPONSES IN THE HYPERTEXT TRANSFERVPROTOCOL THEY DEFINE THE OPERATING PARAMETERS OF AN HTTP TRANSACTION  Multipurpose Internet Mail Extensions (MIME)  is an Internet standard that extends the format of email to support:  Text in character sets other than ASCII  Non-text attachments a) Message bodies with multiple parts b) Header information in non-ASCII character sets
  • 12. ADVANTAGES OF CGI  Provides user interface  Stores some settings  Can do some data processing  Little to no application data storage  Same view of data no matter where you login
  • 13. CLIENT SERVER SECURITY  keeps a check on the flow of information and it also helps in the smooth functioning of the computers.  The Client server Security works on the basis of authority, first it has to have the authority to identify and then identify the hindrance in the security pathway.  It have the Discretionary control to set things back to their normal place  and then another check is done which can called as an audit.
  • 14. CLIENT SERVER SECURITY  The object can be re-used or the data can be send all over again..  The major disadvantage is that Tere is no single security system which can handle all the problems related to the Client server security, so there are many which has to be installed and checkpoints have to be maintained at every point
  • 16. The security measures of online retailers vary immensely.  The methods used to gather, store, and distribute information is implemented differently across the web.  Many companies and corporations that collect sensitive data do not have proper security protocols put into place, which may compromise personal information.  Common errors that online businesses make when processing transactions will be analyzed and critiqued..
  • 17. This includes information security and the protocols that they should put into place both in terms of their computer infrastructure, data collection and the establishment of personnel protocols, such as the handling of sensitive information and password changes.  The transactions between the client and server will be examined along with the protocols used in the sharing of information, such as secure socket layers and their different certificates, encryption and security measures that are utilized.
  • 18. . E-commerce firms must ensure that they control access to their information assets and the use of their networks by designing and implementing controls that will diminish the dissemination of sensitive information.  There are possible vulnerabilities on a client’s machine that can lead to data being compromised before it is uploaded to the server.
  • 19. MAIN SECURITY THREATS  Unauthorized data access - kind of threat when unauthorized person gets access to confidential information. It can lead to situation when such information becomes public or is used against its owner.  Unauthorized data modifications - kind of threat when data can be changed or deleted accidentally or intentionally by the person that has no permissions for such actions.
  • 20. SECURING YOUR CLIENT-SERVER  Data encoding and encryption: MAIN goal of encryption is to hide the data from being visible and accessible without having the key. o Symmetric encryption algorithms: Special algorithm and key are used for encryption. The same algorithm and key are used for information decryption.Another name is also used - secret-key cryptograph.
  • 21.
  • 22.  Block and stream encryption in symmetric algorithms  Public key algorithm security  Certificates  Secure transport protocols  analyse security of data storage and data transfer channels;  check if there are times when data is not encrypted;  if the data is not encrypted, check if they are freely accessible;  if the is encrypted, check if the attacker can obtain something useable for recovery of the encryption keys