Maintaining State in a Stateless System

Slides:



Advertisements
Similar presentations
Welcome to Middleware Joseph Amrithraj
Advertisements

Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
 2003 Prentice Hall, Inc. All rights reserved. Chapter 21 – Web Servers (IIS and Apache) Outline 21.1 Introduction 21.2 HTTP Request Types 21.3 System.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Chapter 8: Web Server Hardware and Software. Electronic Commerce, Seventh Annual Edition2 Web Server Basics The main job of a Web server computer is to.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Web Server Hardware and Software
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
Chapter 9: Electronic Commerce Software
Lesson 19: Configuring Windows Firewall
Electronic Commerce Last Week Internet utility programs
Chapter 9: Electronic Commerce Software
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
INTRODUCTION TO WEB DATABASE PROGRAMMING
1 Network Statistic and Monitoring System Wayne State University Division of Computing and Information Technology Information Technology.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Databases and the Internet. Lecture Objectives Databases and the Internet Characteristics and Benefits of Internet Server-Side vs. Client-Side Special.
Course code: ABI 204 Introduction to E-Commerce Chapter 3: WEB BASED TOOLS FOR E-COMMERCE AMA University.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Protecting Students on the School Computer Network Enfield High School.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Firewall Security.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
CSCE 201 Windows XP Firewalls Fall Reading Windows XP help and Support: search on “Firewall” Tony Bradley, CISSP-ISSAP, Windows XP SP2 Firewall,
The Intranet.
A Network Security -Firewall Bruce Turin.
Lesson 20. E-commerce Software Intershop Enfinity WebSphere Commerce Professional Edition Microsoft Commerce Server 2002.
3/5/2016Faculty : Trần Thị Ngọc Hoa1 From Proxy Server To ISA 2006  Overview  History  Functions  Caching Process  Caching Types  How does it work.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
CLIENT SERVER ARCHITECTURE
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Chapter-04 Building an Ecommerce Website. Building an E-commerce Site: A Systematic Approach The two most important management challenges in building.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
“New security software vendors are coming into the marketplace offering solutions that provide support to the development environment. Example vendors.
Managing Windows Security
Chapter 5 Electronic Commerce | Security Threats - Solution
Distributed Control and Measurement via the Internet
Firewall Techniques Matt Cupp.
The Intranet.
Top 5 Open Source Firewall Software for Linux User
Web Concepts Lesson 2 ITBS2203 E-Commerce for IT.
(A CORPORATE NETWORK APPROACH)
CONNECTING TO THE INTERNET
Internet and Intranet.
Network Security Marshall Leitem 11/30/04
Computer Data Security & Privacy
Chapter 5 Electronic Commerce | Security Threats - Solution
PROJECT PRESENTATION ON INTERNET FIREWALLS PRESENTED BY THE GUARDS
Introduction to Networking
Firewalls.
Internet and Intranet.
Information Security Session October 24, 2005
Internet and Intranet.
Fire-wall.
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
AbbottLink™ - IP Address Overview
Firewall Installation
Web Servers (IIS and Apache)
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Internet and Intranet.
Hosted Security.
INTERNET SECURITY.
Presentation transcript:

Maintaining State in a Stateless System Use your script to write data to a temporary file on the server and to start each time by reading any data in that file Use JavaScript to process activities in a given session and send results to server at end only Hide data in forms and send it back and forth Keep everything in a database Use Servlets GETS TRICKY!!

Hidden Fields … <FORM NAME="Form1"> <INPUT TYPE= "HIDDEN" NAME= "Shirt1" VALUE="25"> <INPUT TYPE= "CHECKBOX" NAME= "Check1">Blue Cotton Shirt <br> <INPUT TYPE= "HIDDEN" NAME= "Shirt2" VALUE="26"> <INPUT TYPE= "CHECKBOX" NAME= "Check2" >Green Cotton Shirt <INPUT TYPE= "HIDDEN" NAME= "Shirt3" VALUE="27"> <INPUT TYPE= "CHECKBOX" NAME= "Check3">White Silk Shirt …. <P> <INPUT TYPE="submit" NAME="Go" VALUE="Register!"> <INPUT TYPE="RESET" VALUE="Reset!"> </FORM>

1-Tier Architecture Processing Main Frame

1-Tier Architecture Processing 1-Ask for file Client Files 2-File 4-return file File Server

Two Tiers Web Server Web Client User HTTP request Response to HTTP request Web Server Web Client

Tier 2 Tier 3 Tier 1 2 HTTP request 1 HTTP request 3 TCP/IP internet 4 DBMS Web Server Tier 2 Tier 3 Web Client Tier 1

Operating Systems For Web Servers Microsoft Windows NT Server Microsoft Windows 2000 Advanced Server Microsoft.NET Server Linux Solaris

Web Server Software Apache HTTP Server Microsoft Internet Information Server (IIS) Sun ONE (iPlanet, Netscape) Web Server

A catalog display Shopping cart capabilities Transaction processing

Middleware Application integration Web services Integration with ERP software Supply chain management software Customer relationship management software Content management software Knowledge management Software

E-commerce Software Intershop Enfinity WebSphere Commerce Professional Edition Microsoft Commerce Server 2002

Back Doors And Trojan Horses

Virus Protection Install anti-virus software – McAfee, Norton, Dr. Solomon, Symantec Downloading of plug-ins from the internet be avoided Downloading of plug-ins should be done from the vendor’s official website Newly obtained disks, programs or files should be scanned for viruses before use Installation of a firewall may also reduce the risk of virus infiltration

Outside Attacks On A Network Eavesdropping/Sniffing/Snooping – ability to monitor network traffic using some kind of network-monitoring software Password Attacks – attacker is able to gain access to the network and gather information such as valid users, computer names, resources – can lead to modification, deletion or rerouting of network data IP Address Spoofing – attacker assumes a legal IP address and gain access to the network Man-in-the–middle attacks – attacker is able to monitor, capture and control data between sending and receiving devices

Firewalls A combination of hardware and software that sits between the internet and the internal network Protects a network from outside attack A firewall examines data leaving and entering the internal network and is able to filter the data according to the specified rules

Internet Fire wall Organization network

Types of Firewalls Packet Filter Firewall Circuit-Level Firewall Application-Gateway Firewall