SlideShare une entreprise Scribd logo
1  sur  23
WWW ARCHITECTURE
, CGI, CLIENT SERVER
SECURITY, PROTECTION
METHODS


               GROUP 3
               Austina Francis
               Anju Babu
               Abhraham Easo
               Vinil Steephen
               Jomon J Joseph
WWW ARCHITECTURE

 WWW
  The   WWW service in which a client using a
   browser can access the service through the
   server.
  The service provided is distributed over
   many locations called sites.
  It was initially developed in 1989 by Tim
   Berners Lee at the CERN lab , in
   Switzerland.
  It has a unique combination of probability
   ,flexibility , and user friendly features
   provided by the internet.
CLIENT-SERVER ARCHITECTURE OF WORLD WIDE
WEB
FUNCTIONAL COMPONENTS OF
           WWW
 Web browsers
 Web servers
 Hyper Text Markup Language
 HTTP
 URL(Uniform Resource Locator)
WORKING OF WWW
 The  system begins bigins by resolving
  the server name part of the URL in the IP
  address using internet database.
 Browser send an HTTP request to web
  server at that particular page and further
  forming a par of that page like images.
 After receiving the requested files the
  browser displays the page on the screen.
 In order to view a web page on the
  WWW one has to type the URL.

INTERNET VS. WWW
Internet is the infrastructure    WWW is just one of many
  that makes the WWW                “virtual networks” built on
  work.                             the Internet.
 Packet Switching                 Websites: http, https, etc.

 TCP/IP Protocol                  Email: pop, imap, etc.

 Physical Infrastructure          Other systems: ftp, instant
     Fiber-optics lines, wires     messaging, etc.
     Satellites, Cable Modems       Note: Even to this day
     Routers, Hubs, Network          companies have “private virtual
      Cards, WiFi systems, etc.       networks” that use the
                                      Internet, but are
                                      proprietary, locked-down.
INTRODUCTION TO CGI
 CGI  stands for Common Gateway Interface.
 CGI is a standard programming interface to
  Web servers that gives us a way to make our
  sites dynamic and interactive.
 CGI is not a programming language. It is just
  a set of standards (protocols.)
 CGI can be implemented in an interpreted
  language such as PERL or in a compiled
  language such as C.
INTRODUCTION TO CGI

   An HTTP server is often used as a gateway to a
    legacy information system; for example, an existing
    body of documents or an existing database
    application. The Common Gateway Interface is an
    agreement between HTTP server implementors
    about how to integrate such gateway scripts and
    programs.

   It is typically used in conjunction with HTML forms
    to build database applications.
CGI PROGRAMMING




                                        Netprog 2002 CGI Programming
              HTTP
             SERVER




CLIENT                CGI Program




                                    9
CGI- WORKING


 CGI  programs work as follows:
   STEP 1 (On the client side): Get
    Information from the user (using HTML
    forms, SSI, Java Applet, …,etc).
   STEP 2 (On the server side): Process the
    data, connect to DATABASE, search for
    PATTERNS, …,etc.
   STEP 3 (On the server side): Send the
    result of computation back to the client.
HTTP HEADER FIELDS ARE COMPONENTS OF THE
MESSAGE HEADER OF REQUESTS AND RESPONSES IN
THE HYPERTEXT TRANSFERVPROTOCOL THEY DEFINE THE
OPERATING PARAMETERS OF AN HTTP TRANSACTION


  Multipurpose Internet Mail Extensions (MIME)
 is an Internet standard that extends the format
   of email to support:
 Text in character sets other than ASCII

 Non-text attachments

a)    Message bodies with multiple parts
b)   Header information in non-ASCII character sets
ADVANTAGES OF CGI
          Provides user interface
          Stores some settings

          Can do some data processing

          Little to no application data storage
                Same view of data no matter where you login
CLIENT SERVER SECURITY
 keeps a check on the flow of information and it also
  helps in the smooth functioning of the computers.
 The Client server Security works on the basis of
  authority, first it has to have the authority to identify
  and then identify the hindrance in the security
  pathway.
 It have the Discretionary control to set things back
  to their normal place
 and then another check is done which can called as
  an audit.
CLIENT SERVER SECURITY
   The object can be re-used or the data can be send
    all over again..

   The major disadvantage is that

    Tere is no single security system which can handle
    all the problems related to the Client server
    security, so there are many which has to be
    installed and checkpoints have to be maintained at
    every point
WORKING LAY OUT
   The security measures of online retailers vary
    immensely.

   The methods used to gather, store, and distribute
    information is implemented differently across the
    web.

    Many companies and corporations that collect
    sensitive data do not have proper security protocols
    put into place, which may compromise personal
    information.


   Common errors that online businesses make when
    processing transactions will be analyzed and
    critiqued..
   This includes information security and the protocols
    that they should put into place both in terms of their
    computer infrastructure, data collection and the
    establishment of personnel protocols, such as the
    handling of sensitive information and password
    changes.

   The transactions between the client and server will
    be examined along with the protocols used in the
    sharing of information, such as secure socket
    layers and their different certificates, encryption and
    security measures that are utilized.
   . E-commerce firms must ensure that they control
    access to their information assets and the use of
    their networks by designing and implementing
    controls that will diminish the dissemination of
    sensitive information.

   There are possible vulnerabilities on a client’s
    machine that can lead to data being compromised
    before it is uploaded to the server.
MAIN SECURITY THREATS
 Unauthorized data access - kind of threat when
  unauthorized person gets access to confidential
  information. It can lead to situation when such
  information becomes public or is used against its
  owner.
 Unauthorized data modifications - kind of threat
  when data can be changed or deleted accidentally
  or intentionally by the person that has no
  permissions for such actions.
SECURING YOUR CLIENT-SERVER

 Data encoding and encryption:
 MAIN goal of encryption is to hide the data from
  being visible and accessible without having the key.
o Symmetric encryption algorithms:

  Special algorithm and key are used for encryption.
  The same algorithm and key are used for
  information decryption.Another name is also used -
  secret-key cryptograph.
 Block and stream encryption in symmetric
  algorithms
 Public key algorithm security

 Certificates

 Secure transport protocols

 analyse security of data storage and data
  transfer channels;
 check if there are times when data is not
  encrypted;
 if the data is not encrypted, check if they are
  freely accessible;
 if the is encrypted, check if the attacker can
  obtain something useable for recovery of the
  encryption keys
THANK YOU

Contenu connexe

Tendances

HTTPS presentation at Port80 Sydney meetup March 2016
HTTPS presentation at Port80 Sydney meetup March 2016HTTPS presentation at Port80 Sydney meetup March 2016
HTTPS presentation at Port80 Sydney meetup March 2016Jason Stangroome
 
Outlook and thunderbird ii
Outlook and thunderbird iiOutlook and thunderbird ii
Outlook and thunderbird iiBanukaVidusanka
 
Net Druid Presentation
Net Druid PresentationNet Druid Presentation
Net Druid Presentationguestf70326
 
Net druid new presentation
Net druid new presentationNet druid new presentation
Net druid new presentationnikhilpatil49
 
Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic CommerceDarlene Enderez
 
internet principles of operation By ZAK
internet principles of operation By ZAKinternet principles of operation By ZAK
internet principles of operation By ZAKTabsheer Hasan
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIMERohit Soni
 
Email,contacts and calendar
Email,contacts and calendarEmail,contacts and calendar
Email,contacts and calendarDeepak John
 

Tendances (19)

HTTPS presentation at Port80 Sydney meetup March 2016
HTTPS presentation at Port80 Sydney meetup March 2016HTTPS presentation at Port80 Sydney meetup March 2016
HTTPS presentation at Port80 Sydney meetup March 2016
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .
 
Eati_Chandra_CV
Eati_Chandra_CVEati_Chandra_CV
Eati_Chandra_CV
 
Web Proxy Server
Web Proxy ServerWeb Proxy Server
Web Proxy Server
 
Outlook and thunderbird ii
Outlook and thunderbird iiOutlook and thunderbird ii
Outlook and thunderbird ii
 
Http VS. Https
Http VS. HttpsHttp VS. Https
Http VS. Https
 
Web o sppt
Web o spptWeb o sppt
Web o sppt
 
ema
emaema
ema
 
Net Druid Presentation
Net Druid PresentationNet Druid Presentation
Net Druid Presentation
 
Net druid new presentation
Net druid new presentationNet druid new presentation
Net druid new presentation
 
Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic Commerce
 
hostedexchange
hostedexchangehostedexchange
hostedexchange
 
Json web tokens
Json web tokensJson web tokens
Json web tokens
 
internet principles of operation By ZAK
internet principles of operation By ZAKinternet principles of operation By ZAK
internet principles of operation By ZAK
 
What is an intranet
What is an intranetWhat is an intranet
What is an intranet
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
 
Email,contacts and calendar
Email,contacts and calendarEmail,contacts and calendar
Email,contacts and calendar
 
Lec 1
Lec 1Lec 1
Lec 1
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 

Similaire à Www architecture,cgi, client server security, protection

E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology EssayPamela Wright
 
Web-Server & It's Architecture.pptx
Web-Server & It's Architecture.pptxWeb-Server & It's Architecture.pptx
Web-Server & It's Architecture.pptxAlokKumar250045
 
Web Server Hardware and Software
Web Server Hardware and SoftwareWeb Server Hardware and Software
Web Server Hardware and Softwarewebhostingguy
 
Application layer assignments
Application layer assignmentsApplication layer assignments
Application layer assignmentsIsaac Akingbala
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site SecuritySteven Cahill
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesAmazon Web Services
 
0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdfZani10
 
Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)rosu555
 
Double guard synopsis
Double guard synopsisDouble guard synopsis
Double guard synopsismanju5162
 
Fullstack Interview Questions and Answers.pdf
Fullstack Interview Questions and Answers.pdfFullstack Interview Questions and Answers.pdf
Fullstack Interview Questions and Answers.pdfcsvishnukumar
 
An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...IOSR Journals
 
21. Application Development and Administration in DBMS
21. Application Development and Administration in DBMS21. Application Development and Administration in DBMS
21. Application Development and Administration in DBMSkoolkampus
 
Web Server Technologies II: Web Applications & Server Maintenance
Web Server Technologies II: Web Applications & Server MaintenanceWeb Server Technologies II: Web Applications & Server Maintenance
Web Server Technologies II: Web Applications & Server MaintenancePort80 Software
 

Similaire à Www architecture,cgi, client server security, protection (20)

Edi
EdiEdi
Edi
 
E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology Essay
 
Web-Server & It's Architecture.pptx
Web-Server & It's Architecture.pptxWeb-Server & It's Architecture.pptx
Web-Server & It's Architecture.pptx
 
Web Server Hardware and Software
Web Server Hardware and SoftwareWeb Server Hardware and Software
Web Server Hardware and Software
 
Application layer assignments
Application layer assignmentsApplication layer assignments
Application layer assignments
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site Security
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 
Web server
Web serverWeb server
Web server
 
0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf
 
Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)
 
Double guard synopsis
Double guard synopsisDouble guard synopsis
Double guard synopsis
 
Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
 
Fullstack Interview Questions and Answers.pdf
Fullstack Interview Questions and Answers.pdfFullstack Interview Questions and Answers.pdf
Fullstack Interview Questions and Answers.pdf
 
An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...
 
H017113842
H017113842H017113842
H017113842
 
21. Application Development and Administration in DBMS
21. Application Development and Administration in DBMS21. Application Development and Administration in DBMS
21. Application Development and Administration in DBMS
 
Web Server Technologies II: Web Applications & Server Maintenance
Web Server Technologies II: Web Applications & Server MaintenanceWeb Server Technologies II: Web Applications & Server Maintenance
Web Server Technologies II: Web Applications & Server Maintenance
 

Dernier

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

Www architecture,cgi, client server security, protection

  • 1. WWW ARCHITECTURE , CGI, CLIENT SERVER SECURITY, PROTECTION METHODS GROUP 3 Austina Francis Anju Babu Abhraham Easo Vinil Steephen Jomon J Joseph
  • 2. WWW ARCHITECTURE  WWW  The WWW service in which a client using a browser can access the service through the server.  The service provided is distributed over many locations called sites.  It was initially developed in 1989 by Tim Berners Lee at the CERN lab , in Switzerland.  It has a unique combination of probability ,flexibility , and user friendly features provided by the internet.
  • 4. FUNCTIONAL COMPONENTS OF WWW  Web browsers  Web servers  Hyper Text Markup Language  HTTP  URL(Uniform Resource Locator)
  • 5. WORKING OF WWW  The system begins bigins by resolving the server name part of the URL in the IP address using internet database.  Browser send an HTTP request to web server at that particular page and further forming a par of that page like images.  After receiving the requested files the browser displays the page on the screen.  In order to view a web page on the WWW one has to type the URL. 
  • 6. INTERNET VS. WWW Internet is the infrastructure WWW is just one of many that makes the WWW “virtual networks” built on work. the Internet.  Packet Switching  Websites: http, https, etc.  TCP/IP Protocol  Email: pop, imap, etc.  Physical Infrastructure  Other systems: ftp, instant  Fiber-optics lines, wires messaging, etc.  Satellites, Cable Modems  Note: Even to this day  Routers, Hubs, Network companies have “private virtual Cards, WiFi systems, etc. networks” that use the Internet, but are proprietary, locked-down.
  • 7. INTRODUCTION TO CGI  CGI stands for Common Gateway Interface.  CGI is a standard programming interface to Web servers that gives us a way to make our sites dynamic and interactive.  CGI is not a programming language. It is just a set of standards (protocols.)  CGI can be implemented in an interpreted language such as PERL or in a compiled language such as C.
  • 8. INTRODUCTION TO CGI  An HTTP server is often used as a gateway to a legacy information system; for example, an existing body of documents or an existing database application. The Common Gateway Interface is an agreement between HTTP server implementors about how to integrate such gateway scripts and programs.  It is typically used in conjunction with HTML forms to build database applications.
  • 9. CGI PROGRAMMING Netprog 2002 CGI Programming HTTP SERVER CLIENT CGI Program 9
  • 10. CGI- WORKING  CGI programs work as follows:  STEP 1 (On the client side): Get Information from the user (using HTML forms, SSI, Java Applet, …,etc).  STEP 2 (On the server side): Process the data, connect to DATABASE, search for PATTERNS, …,etc.  STEP 3 (On the server side): Send the result of computation back to the client.
  • 11. HTTP HEADER FIELDS ARE COMPONENTS OF THE MESSAGE HEADER OF REQUESTS AND RESPONSES IN THE HYPERTEXT TRANSFERVPROTOCOL THEY DEFINE THE OPERATING PARAMETERS OF AN HTTP TRANSACTION  Multipurpose Internet Mail Extensions (MIME)  is an Internet standard that extends the format of email to support:  Text in character sets other than ASCII  Non-text attachments a) Message bodies with multiple parts b) Header information in non-ASCII character sets
  • 12. ADVANTAGES OF CGI  Provides user interface  Stores some settings  Can do some data processing  Little to no application data storage  Same view of data no matter where you login
  • 13. CLIENT SERVER SECURITY  keeps a check on the flow of information and it also helps in the smooth functioning of the computers.  The Client server Security works on the basis of authority, first it has to have the authority to identify and then identify the hindrance in the security pathway.  It have the Discretionary control to set things back to their normal place  and then another check is done which can called as an audit.
  • 14. CLIENT SERVER SECURITY  The object can be re-used or the data can be send all over again..  The major disadvantage is that Tere is no single security system which can handle all the problems related to the Client server security, so there are many which has to be installed and checkpoints have to be maintained at every point
  • 16. The security measures of online retailers vary immensely.  The methods used to gather, store, and distribute information is implemented differently across the web.  Many companies and corporations that collect sensitive data do not have proper security protocols put into place, which may compromise personal information.  Common errors that online businesses make when processing transactions will be analyzed and critiqued..
  • 17. This includes information security and the protocols that they should put into place both in terms of their computer infrastructure, data collection and the establishment of personnel protocols, such as the handling of sensitive information and password changes.  The transactions between the client and server will be examined along with the protocols used in the sharing of information, such as secure socket layers and their different certificates, encryption and security measures that are utilized.
  • 18. . E-commerce firms must ensure that they control access to their information assets and the use of their networks by designing and implementing controls that will diminish the dissemination of sensitive information.  There are possible vulnerabilities on a client’s machine that can lead to data being compromised before it is uploaded to the server.
  • 19. MAIN SECURITY THREATS  Unauthorized data access - kind of threat when unauthorized person gets access to confidential information. It can lead to situation when such information becomes public or is used against its owner.  Unauthorized data modifications - kind of threat when data can be changed or deleted accidentally or intentionally by the person that has no permissions for such actions.
  • 20. SECURING YOUR CLIENT-SERVER  Data encoding and encryption: MAIN goal of encryption is to hide the data from being visible and accessible without having the key. o Symmetric encryption algorithms: Special algorithm and key are used for encryption. The same algorithm and key are used for information decryption.Another name is also used - secret-key cryptograph.
  • 21.
  • 22.  Block and stream encryption in symmetric algorithms  Public key algorithm security  Certificates  Secure transport protocols  analyse security of data storage and data transfer channels;  check if there are times when data is not encrypted;  if the data is not encrypted, check if they are freely accessible;  if the is encrypted, check if the attacker can obtain something useable for recovery of the encryption keys