Maintaining State in a Stateless System Use your script to write data to a temporary file on the server and to start each time by reading any data in that file Use JavaScript to process activities in a given session and send results to server at end only Hide data in forms and send it back and forth Keep everything in a database Use Servlets GETS TRICKY!!
Hidden Fields … <FORM NAME="Form1"> <INPUT TYPE= "HIDDEN" NAME= "Shirt1" VALUE="25"> <INPUT TYPE= "CHECKBOX" NAME= "Check1">Blue Cotton Shirt <br> <INPUT TYPE= "HIDDEN" NAME= "Shirt2" VALUE="26"> <INPUT TYPE= "CHECKBOX" NAME= "Check2" >Green Cotton Shirt <INPUT TYPE= "HIDDEN" NAME= "Shirt3" VALUE="27"> <INPUT TYPE= "CHECKBOX" NAME= "Check3">White Silk Shirt …. <P> <INPUT TYPE="submit" NAME="Go" VALUE="Register!"> <INPUT TYPE="RESET" VALUE="Reset!"> </FORM>
1-Tier Architecture Processing Main Frame
1-Tier Architecture Processing 1-Ask for file Client Files 2-File 4-return file File Server
Two Tiers Web Server Web Client User HTTP request Response to HTTP request Web Server Web Client
Tier 2 Tier 3 Tier 1 2 HTTP request 1 HTTP request 3 TCP/IP internet 4 DBMS Web Server Tier 2 Tier 3 Web Client Tier 1
Operating Systems For Web Servers Microsoft Windows NT Server Microsoft Windows 2000 Advanced Server Microsoft.NET Server Linux Solaris
Web Server Software Apache HTTP Server Microsoft Internet Information Server (IIS) Sun ONE (iPlanet, Netscape) Web Server
A catalog display Shopping cart capabilities Transaction processing
Middleware Application integration Web services Integration with ERP software Supply chain management software Customer relationship management software Content management software Knowledge management Software
E-commerce Software Intershop Enfinity WebSphere Commerce Professional Edition Microsoft Commerce Server 2002
Back Doors And Trojan Horses
Virus Protection Install anti-virus software – McAfee, Norton, Dr. Solomon, Symantec Downloading of plug-ins from the internet be avoided Downloading of plug-ins should be done from the vendor’s official website Newly obtained disks, programs or files should be scanned for viruses before use Installation of a firewall may also reduce the risk of virus infiltration
Outside Attacks On A Network Eavesdropping/Sniffing/Snooping – ability to monitor network traffic using some kind of network-monitoring software Password Attacks – attacker is able to gain access to the network and gather information such as valid users, computer names, resources – can lead to modification, deletion or rerouting of network data IP Address Spoofing – attacker assumes a legal IP address and gain access to the network Man-in-the–middle attacks – attacker is able to monitor, capture and control data between sending and receiving devices
Firewalls A combination of hardware and software that sits between the internet and the internal network Protects a network from outside attack A firewall examines data leaving and entering the internal network and is able to filter the data according to the specified rules
Internet Fire wall Organization network
Types of Firewalls Packet Filter Firewall Circuit-Level Firewall Application-Gateway Firewall