SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
CLIENT SERVER NETWORK SECURITY
MADE BY
MITHIL DOSHI
ROLL NO – 95
SUBJECT – E-COMMERCE
SEMESTER – II
CLASS – M.COM. PART – 1 (BUSINESS MANAGEMENT)
Content
1) Introduction
2) What is Client Server Networking ?
3) Benefits of Client Server Networking
4) Disadvantages of Client Server Networking
5) Client – Server Security
6) Types of way Servers can be kept Safe
7) Conclusion
1. Introduction
A client-server network is the medium through which clients
access resources and services from a central computer, via
either a local area network (LAN) or a wide-area network (WAN),
such as the Internet. A unique server called a daemon may be
employed for the sole purpose of awaiting client requests, at
which point the network connection is initiated until the client
request has been fulfilled.
Mithil Doshi
A computer network in which one centralized,
powerful computer (called the server) is a hub to
which many less powerful personal computers or
workstations (called clients) are connected. The
clients run programs and access data that are stored
on the server. Compare peer-to-peer network.
2. What is Client – Server Network ?
Client Server Network Architecture
Mithil Doshi
3. Benefits of Client – Server Networking
Mithil Doshi
There are numerous advantages of the client server architecture model:
• A single server hosting all the required data in a single place facilitates easy protection
of data and management of user authorization and authentication.
• Resources such as network segments, servers, and computers can be added to a client-
server network without any significant interruptions.
• Data can be accessed efficiently without requiring clients and the server to be in close
proximity.
• All nodes in the client-server system are independent, requesting data only from the
server, which facilitates easy upgrades, replacements, and relocation of the nodes.
• Data that is transferred through client-server protocols are platform-agnostic.
4. Disadvantages of Client Server Network
• A specialist network operating system is needed
• The server is expensive to purchase
• Specialist staff such as a network manager is needed
• If any part of the network fails a lot of disruption can occur
Mithil Doshi
• Client/server security uses various authorization methods to
make sure that only valid user and programs have access to
information resources such as databases.
• Access control mechanisms must be set up to ensure that
properly authenticated users are allowed access only to those
resources that they are entitled to use.
• Such mechanisms include password protection, encrypted
smart cards, biometrics, and firewalls.
5. Client – Server Security
Mithil Doshi
Firewall
Architecture
Mithil Doshi
6. Types of way Servers can be kept Safe
1. Establish and Use a Secure Connection
Using the SSH (Secure Shell) Protocol is the best way to establish a protected connection.
Unlike the previously used Telnet, SSH access encrypts all data transmitted in the exchange.
2. Monitor Login Attempts
Using intrusion prevention software to monitor login attempts is a way to protect your server
against brute force attacks.
3. Establish Password Requirements
The first thing is to set password requirements and rules that must be followed by all
members on the server.
Mithil Doshi
4. Set Password Expiration Policy
Setting an expiration date for a password is another routine practice when establishing
requirements for users. Depending on the level of security required, a password may last a
couple of weeks or a couple of months.
5. Update and Upgrade Software Regularly
Regularly updating the software on a server is a crucial step in keeping it safe from
hackers. Outdated software has already been explored for its weak points, leaving it open
for hackers to take advantage of these and harm your system.
6. Create Multi-Server Environments
Full separation would require having dedicated bare metal servers that do not share any
components with other servers. Although this is the easiest to manage and provides the
most security, it is also the most expensive.
Mithil Doshi
The online quiz system and
examination system are the
examples of the client-server
system. In this system admin of the
system can load a number of
questions of the different subject
with a right answer. So after taking
the test the result of every student
saved in the database. So assume
the world without this system so it
saves manpower and time. In the
recent time, all the applications
worked on the client server system.
In conclusion, the client server
system covers both areas of
networking and management due
to its flexibility in structure. So it is
very necessary for us to know the
advantage of this technology in the
IT world and different areas where
client-server system working
because if we do not know how this
technology will be used so we are
not able to take the full advantage
of its functionalities. So without
knowing the application of this
technology, it is very difficult for us to
execute the process.
7. Conclusion

Contenu connexe

Tendances

consumer oriented applications
consumer oriented applicationsconsumer oriented applications
consumer oriented applicationspreetikapri1
 
6. electronic payment systems
6. electronic payment systems6. electronic payment systems
6. electronic payment systemsPratap Tirkey
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment SystemRitesh Goyal
 
Presentation - Electronic Data Interchange
Presentation - Electronic Data InterchangePresentation - Electronic Data Interchange
Presentation - Electronic Data InterchangeSharad Srivastava
 
Electronic data interchange
Electronic data interchangeElectronic data interchange
Electronic data interchangeAbhishek Nayak
 
Network Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part INetwork Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part IHem Pokhrel
 
Some E-commerce Applications
Some E-commerce ApplicationsSome E-commerce Applications
Some E-commerce ApplicationsAnuj Gupta
 
Client server network threat
Client server network threatClient server network threat
Client server network threatRaj vardhan
 
Consumer Oriented E commerce Application
Consumer Oriented E commerce ApplicationConsumer Oriented E commerce Application
Consumer Oriented E commerce ApplicationMahesh Shetty
 
digital tokens based on E-payments
digital tokens based on E-paymentsdigital tokens based on E-payments
digital tokens based on E-paymentsraviteja reddy
 
Electronic Data Interchange (EDI) | E-Commerce
Electronic Data Interchange (EDI) | E-CommerceElectronic Data Interchange (EDI) | E-Commerce
Electronic Data Interchange (EDI) | E-CommerceHem Pokhrel
 
I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commercemc aa
 
Consumer Oriented Application, Mercantile process and Mercantile models
Consumer Oriented Application, Mercantile process and Mercantile modelsConsumer Oriented Application, Mercantile process and Mercantile models
Consumer Oriented Application, Mercantile process and Mercantile modelsRabin BK
 
Regulatory Framework of E-Commerce
Regulatory Framework of E-CommerceRegulatory Framework of E-Commerce
Regulatory Framework of E-CommerceMamta Bhola
 
e payment system ppt
e payment system ppte payment system ppt
e payment system pptminisharma35
 
Industry framework of e commerce
Industry framework of e commerceIndustry framework of e commerce
Industry framework of e commerceANOOPA NARAYANAN
 
Risks involved in E-payment
Risks involved in E-payment Risks involved in E-payment
Risks involved in E-payment 14_18
 

Tendances (20)

consumer oriented applications
consumer oriented applicationsconsumer oriented applications
consumer oriented applications
 
6. electronic payment systems
6. electronic payment systems6. electronic payment systems
6. electronic payment systems
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment System
 
Presentation - Electronic Data Interchange
Presentation - Electronic Data InterchangePresentation - Electronic Data Interchange
Presentation - Electronic Data Interchange
 
Electronic data interchange
Electronic data interchangeElectronic data interchange
Electronic data interchange
 
Network Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part INetwork Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part I
 
Some E-commerce Applications
Some E-commerce ApplicationsSome E-commerce Applications
Some E-commerce Applications
 
Client server network threat
Client server network threatClient server network threat
Client server network threat
 
Consumer Oriented E commerce Application
Consumer Oriented E commerce ApplicationConsumer Oriented E commerce Application
Consumer Oriented E commerce Application
 
digital tokens based on E-payments
digital tokens based on E-paymentsdigital tokens based on E-payments
digital tokens based on E-payments
 
Electronic Data Interchange (EDI) | E-Commerce
Electronic Data Interchange (EDI) | E-CommerceElectronic Data Interchange (EDI) | E-Commerce
Electronic Data Interchange (EDI) | E-Commerce
 
E commerce 5_units_notes
E commerce 5_units_notesE commerce 5_units_notes
E commerce 5_units_notes
 
E business- EDI
E business- EDIE business- EDI
E business- EDI
 
I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commerce
 
Consumer Oriented Application, Mercantile process and Mercantile models
Consumer Oriented Application, Mercantile process and Mercantile modelsConsumer Oriented Application, Mercantile process and Mercantile models
Consumer Oriented Application, Mercantile process and Mercantile models
 
E-Commerce Security
E-Commerce SecurityE-Commerce Security
E-Commerce Security
 
Regulatory Framework of E-Commerce
Regulatory Framework of E-CommerceRegulatory Framework of E-Commerce
Regulatory Framework of E-Commerce
 
e payment system ppt
e payment system ppte payment system ppt
e payment system ppt
 
Industry framework of e commerce
Industry framework of e commerceIndustry framework of e commerce
Industry framework of e commerce
 
Risks involved in E-payment
Risks involved in E-payment Risks involved in E-payment
Risks involved in E-payment
 

Similaire à Client Server Network Security

E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology EssayPamela Wright
 
client-server.pptx
client-server.pptxclient-server.pptx
client-server.pptxEbukaChikodi
 
University Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataUniversity Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataNasser Hassan
 
Unit 4_Introduction to Server Farms.pptx
Unit 4_Introduction to Server Farms.pptxUnit 4_Introduction to Server Farms.pptx
Unit 4_Introduction to Server Farms.pptxRahul Borate
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to securityAmjad Afridi
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
On Premise Servers and Cloud-Based Servers.pptx
On Premise Servers and Cloud-Based Servers.pptxOn Premise Servers and Cloud-Based Servers.pptx
On Premise Servers and Cloud-Based Servers.pptxReyce Trono
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver PresentationTuhin_Das
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud ComputingIJSRED
 
Data center proposal
Data center proposalData center proposal
Data center proposalMuhammad Ahad
 
Client Server Model and Distributed Computing
Client Server Model and Distributed ComputingClient Server Model and Distributed Computing
Client Server Model and Distributed ComputingAbhishek Jaisingh
 

Similaire à Client Server Network Security (20)

E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology Essay
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
 
client-server.pptx
client-server.pptxclient-server.pptx
client-server.pptx
 
University Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataUniversity Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical Data
 
Unit 4_Introduction to Server Farms.pptx
Unit 4_Introduction to Server Farms.pptxUnit 4_Introduction to Server Farms.pptx
Unit 4_Introduction to Server Farms.pptx
 
Peer to peer
Peer to peerPeer to peer
Peer to peer
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to security
 
unit 4-1.pptx
unit 4-1.pptxunit 4-1.pptx
unit 4-1.pptx
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
On Premise Servers and Cloud-Based Servers.pptx
On Premise Servers and Cloud-Based Servers.pptxOn Premise Servers and Cloud-Based Servers.pptx
On Premise Servers and Cloud-Based Servers.pptx
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver Presentation
 
Unit-II-part 3.pdf
Unit-II-part 3.pdfUnit-II-part 3.pdf
Unit-II-part 3.pdf
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
 
Data center proposal
Data center proposalData center proposal
Data center proposal
 
Client Server Model and Distributed Computing
Client Server Model and Distributed ComputingClient Server Model and Distributed Computing
Client Server Model and Distributed Computing
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
AZURE CC JP.pptx
AZURE CC JP.pptxAZURE CC JP.pptx
AZURE CC JP.pptx
 

Dernier

How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 

Dernier (20)

How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 

Client Server Network Security

  • 1. CLIENT SERVER NETWORK SECURITY MADE BY MITHIL DOSHI ROLL NO – 95 SUBJECT – E-COMMERCE SEMESTER – II CLASS – M.COM. PART – 1 (BUSINESS MANAGEMENT)
  • 2. Content 1) Introduction 2) What is Client Server Networking ? 3) Benefits of Client Server Networking 4) Disadvantages of Client Server Networking 5) Client – Server Security 6) Types of way Servers can be kept Safe 7) Conclusion
  • 3. 1. Introduction A client-server network is the medium through which clients access resources and services from a central computer, via either a local area network (LAN) or a wide-area network (WAN), such as the Internet. A unique server called a daemon may be employed for the sole purpose of awaiting client requests, at which point the network connection is initiated until the client request has been fulfilled. Mithil Doshi
  • 4. A computer network in which one centralized, powerful computer (called the server) is a hub to which many less powerful personal computers or workstations (called clients) are connected. The clients run programs and access data that are stored on the server. Compare peer-to-peer network. 2. What is Client – Server Network ?
  • 5. Client Server Network Architecture Mithil Doshi
  • 6. 3. Benefits of Client – Server Networking Mithil Doshi There are numerous advantages of the client server architecture model: • A single server hosting all the required data in a single place facilitates easy protection of data and management of user authorization and authentication. • Resources such as network segments, servers, and computers can be added to a client- server network without any significant interruptions. • Data can be accessed efficiently without requiring clients and the server to be in close proximity. • All nodes in the client-server system are independent, requesting data only from the server, which facilitates easy upgrades, replacements, and relocation of the nodes. • Data that is transferred through client-server protocols are platform-agnostic.
  • 7. 4. Disadvantages of Client Server Network • A specialist network operating system is needed • The server is expensive to purchase • Specialist staff such as a network manager is needed • If any part of the network fails a lot of disruption can occur Mithil Doshi
  • 8. • Client/server security uses various authorization methods to make sure that only valid user and programs have access to information resources such as databases. • Access control mechanisms must be set up to ensure that properly authenticated users are allowed access only to those resources that they are entitled to use. • Such mechanisms include password protection, encrypted smart cards, biometrics, and firewalls. 5. Client – Server Security Mithil Doshi
  • 10. 6. Types of way Servers can be kept Safe 1. Establish and Use a Secure Connection Using the SSH (Secure Shell) Protocol is the best way to establish a protected connection. Unlike the previously used Telnet, SSH access encrypts all data transmitted in the exchange. 2. Monitor Login Attempts Using intrusion prevention software to monitor login attempts is a way to protect your server against brute force attacks. 3. Establish Password Requirements The first thing is to set password requirements and rules that must be followed by all members on the server. Mithil Doshi
  • 11. 4. Set Password Expiration Policy Setting an expiration date for a password is another routine practice when establishing requirements for users. Depending on the level of security required, a password may last a couple of weeks or a couple of months. 5. Update and Upgrade Software Regularly Regularly updating the software on a server is a crucial step in keeping it safe from hackers. Outdated software has already been explored for its weak points, leaving it open for hackers to take advantage of these and harm your system. 6. Create Multi-Server Environments Full separation would require having dedicated bare metal servers that do not share any components with other servers. Although this is the easiest to manage and provides the most security, it is also the most expensive. Mithil Doshi
  • 12. The online quiz system and examination system are the examples of the client-server system. In this system admin of the system can load a number of questions of the different subject with a right answer. So after taking the test the result of every student saved in the database. So assume the world without this system so it saves manpower and time. In the recent time, all the applications worked on the client server system. In conclusion, the client server system covers both areas of networking and management due to its flexibility in structure. So it is very necessary for us to know the advantage of this technology in the IT world and different areas where client-server system working because if we do not know how this technology will be used so we are not able to take the full advantage of its functionalities. So without knowing the application of this technology, it is very difficult for us to execute the process. 7. Conclusion