Client Server Security DeSiaMorePowered by DeSiaMore1.

Slides:



Advertisements
Similar presentations
Information Management and Technology
Advertisements

Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Chapter 21 Successfully Implementing The Information System
Remote Access Network Management Kelly Given Allison Traina.
Security Week 10 Lecture 1. Why do we need security? Identify and authenticate people wanting to use the system Prevent unauthorised persons from accessing.
Distributed Information Systems - The Client server model
Web server security Dr Jim Briggs WEBP security1.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Distributed Systems: Client/Server Computing
Client Server Security. Introduction Although client/server architecture is the most popular and widely used computing environment, it the most vulnerable.
Computer Networks IGCSE ICT Section 4.
OCR Computing for GCSE © Hodder Education 2011
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
System Architecture & Hardware Configurations Dr. D. Bilal IS 592 Spring 2005.
Week 2 File Systems & Unix Commands. File System Hierarchy.
General Purpose Packages
PCI: As complicated as it sounds? Gerry Lawrence CTO
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
LANs and WANs Coatbridge High School Computing Department.
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Chapter 5: Networks, Internet & Ecommerce IT Auditing & Assurance, 2e, Hall & Singleton.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
The Client/Server Database Environment Ployphan Sornsuwit KPRU Ref.
Mainframe (Host) - Communications - User Interface - Business Logic - DBMS - Operating System - Storage (DB Files) Terminal (Display/Keyboard) Terminal.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
GCSE ICT 3 rd Edition Computer networks 19 A computer network is a collection of computers linked together so that they can communicate with each other.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
BASIC NETWORKS. What is a Network? A network consists of two or more computers that are linked in order to share resources exchange files, or allow electronic.
Elmasri and Navathe, Fundamentals of Database Systems, Fourth Edition Copyright © 2004 Pearson Education, Inc. Slide 2-1 Data Models Data Model: A set.
Topic 5: Basic Security.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Network Security & Accounting
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Communications & Networks National 4 & 5 Computing Science.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Networks. Learning Objectives: By the end of this lesson you should be able to:
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Computer threats, Attacks and Assets upasana pandit T.E comp.
Client – Server Architecture A Basic Introduction 1.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Introduction to Networking. What is a Network? Discuss in groups.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Importance of IT security ->protects data ->ensures authentication and confidentiality ->preevents data theft.
Security in Networking
Malware, Phishing and Network Policies
Comparison of LAN, MAN, WAN
Encryption and Hacking
Implementing Client Security on Windows 2000 and Windows XP Level 150
Relentless Distribution
Advantages of Networking
There are two different types of computer network:
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

Client Server Security DeSiaMorePowered by DeSiaMore1

Introduction Although client/server architecture is the most popular and widely used computing environment, it the most vulnerable to breaches in security. Why? –Distribution of services between client server which render to damage, fraud and misuse. Security considerations must be in place. DeSiaMorePowered by DeSiaMore2

Client and User Security Clients connect to servers and these connections, if left open or not secured, provide entry points for hackers and other intruders that may use data for evil purposes. The distribution of services in client/ server increases the susceptibility of these systems to damage from viruses, fraud, physical damage and misuse than in any centralised computer system. DeSiaMorePowered by DeSiaMore3

Security Considerations Security consideration must include: –he host systems –personal computers (PCs) –local area networks (LANs) –global wide area networks (WANs) –Users. DeSiaMorePowered by DeSiaMore4

The client PC desktop as the client machine can easily connect to server and hence pose a great threat to organisational data. Located in an open place for users and intruders. Require physical protection. –disk drive locks, –diskless workstations to prevent the loading of unauthorised software and viruses DeSiaMorePowered by DeSiaMore5

The Network Intruders can use network to break into computer systems and their various resources –Can sniff the network to read packet of information such as password, company details, etc. Use data encryption DeSiaMorePowered by DeSiaMore6

Servers The should be protected with the level of password security applicable to the business. Encrypt database contents cryptogram or advanced DES (Data Encryption Standard) To avoid ‘trial and error’ login attacks to database, servers impose long delay to respond to user. DeSiaMorePowered by DeSiaMore7

Users The easiest way to gain illegal entry to the system is by obtaining a valid users ID and password. Password can be discovered when: –User chose short password or can easily be guessed. –User keeps a list of password in a dek drawer. –Share password with another users. –Attacker pretend company IT staff and request password to fix unnamed problem. DeSiaMorePowered by DeSiaMore8

Users To overcome this ensure that you have good security policy, and strong password management must be implemented. For more details on establishing Client/Server Security Model read given handout (Client_server security issues.doc) available on my page.my page DeSiaMorePowered by DeSiaMore9

Risks Associated with Client/Server Model Apart from the above framework of Client/Server Model there are other risks accompanied by this model:- –Client/Server Development Risks –Workstation Risks –The Network Wire Risk –The DBMS Risk –And other (Read in the given handout (CS_Security.doc)) available on my pagemy page DeSiaMorePowered by DeSiaMore10

Client/Server Risks Client/Server Development Risks –Skills of C/Server Development Risks –Rapid Application development Risk. Work Station Risk –Insecurity of PC on the network Add third party security products. PC should be used to work on select application records for few period of time. The Network Wire Risk –Packet data can be read during the communication process. Use encryption methods to encrypt data (Userids and password) DeSiaMorePowered by DeSiaMore11

Client/Server Risks The DBMS Risk –C/S computing is based largely on the Database Management Software that supports the applications. Security professional needs to identify System Manager for DBMS “System” or “Sys” for Oracle. –More read on the handout (CS_Security.doc) available on web. DeSiaMorePowered by DeSiaMore12