CLIENT-SERVER NETWORK SECURITY
L R Siva Raman
Assistant Professor
PG & Research Department of International Business
Sri Ramakrishna College of Arts & Science
OVERVIEW
 System administrators face the challenge of balancing user
accessibility with site security and confidentiality of local
information. Network security on the internet is a major concern
for commercial organizations, particularly for top management.
Connecting to the internet can expose a local network to the
entire internet population, breaching the physical security
perimeter of the corporate network.
SECURITY CONCERNS
 Even relaxed organizations must pay attention to security. For
many commercial operations, security involves ensuring existing
system features, such as passwords and privileges, are properly
confined. Auditing all network access, including recording all
login attempts (especially unsuccessful ones), can alert managers
to the need for stronger measures. Additional measures are
necessary where secrets or important corporate assets must be
available to remote users. Hackers can employ password
guessing, password trapping, security holes in programs, or
common network access procedures to impersonate users, posing
TYPES OF SECURITY HOLES
 1. Physical Security Holes: Unauthorized physical access to computers, such as
in public workstation rooms, where a hacker could reboot a machine into single-
user mode and tamper with files.
 2. Software Security Holes: Badly written programs or compromised 'privileged'
software can lead to security breaches. For example, the 'sendmail' hole of 1988
or creating a 'root' shell with super user access.
 3. Inconsistent Uses Holes: Flawed combinations of hardware and software by
system administrators create security vulnerabilities. These problems are hard to
isolate once the system is running, so systems should be carefully built with
security in mind.
PHYSICAL SECURITY HOLES
 Unauthorized physical access examples.
 Public workstation room scenario.
 Network system access through password guessing.
SOFTWARE SECURITY HOLES
 Badly written or compromised programs.
 'Sendmail' hole example.
 Creation of 'root' shell or super user access.
INCONSISTENT USES HOLES
 Flawed hardware and software combinations.
 Difficulty in isolating problems once the system is running.
 Importance of careful system building.
PROTECTION STRATEGIES
 1. Trust-Based Security
 2. Security Through Obscurity (STO)
 3. Password Schemes
 4. Biometric Systems
TRUST-BASED SECURITY & STO
 Trust-Based Security: Assumption of user trustworthiness.
 STO: Hiding operational details and providing information on a need-to-know
basis.
PASSWORD SCHEMES & BIOMETRIC
SYSTEMS
 Password Schemes: First-level barrier, one-time passwords, smart cards, tokens.
 Biometric Systems: Fingerprints, retinal patterns, voice recognition, high
implementation cost.

More Related Content

PPS
Sreerag cs network security
PPTX
Network security and firewalls
PPT
chapter 1 security.ppt
PPT
Computer Securityyyyyyyy - Chapter 1.ppt
DOCX
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
PDF
COMP 424 Computer System Security Fall 2016
PPTX
CyberSecurity and Importance of cybersecurity
PPT
ch0001 computer systems security and principles and practices
Sreerag cs network security
Network security and firewalls
chapter 1 security.ppt
Computer Securityyyyyyyy - Chapter 1.ppt
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
COMP 424 Computer System Security Fall 2016
CyberSecurity and Importance of cybersecurity
ch0001 computer systems security and principles and practices

Similar to Client Server Network Security and its threats (20)

PPT
Lecture 4 presentation of cyber security
PPTX
Cyber security
PDF
Computer Security
PPTX
Lecture 3 Country Specific Strategy.pptx
PPTX
Client server network threat
PPTX
computer network and security.pptx
PPTX
Ch01 NetSec5e Network Security Essential Chapter 1.pptx
KEY
Mis
PPTX
Information Security Bachelor in Information technology unit 1
PPTX
Network security by sandhya
PPT
Chapter 1.ppt
PPT
InfoSecConcepts.ppt
PPT
ICSE6104 Lecturedfffffffffffffffffffff 1.ppt
PPTX
hgfhvgggggggggggggggggggggggpresent.pptx
PPT
Security practivce and their best way to lear
PDF
Invited Talk - Cyber Security and Open Source
PPTX
02-overview.pptx
PPTX
Rishabhcyber security.pptx
PPT
PBL PROJECT - B2- (54,56,50,40) (2) (1).ppt
PPTX
Cyber Security PPT.pptx
Lecture 4 presentation of cyber security
Cyber security
Computer Security
Lecture 3 Country Specific Strategy.pptx
Client server network threat
computer network and security.pptx
Ch01 NetSec5e Network Security Essential Chapter 1.pptx
Mis
Information Security Bachelor in Information technology unit 1
Network security by sandhya
Chapter 1.ppt
InfoSecConcepts.ppt
ICSE6104 Lecturedfffffffffffffffffffff 1.ppt
hgfhvgggggggggggggggggggggggpresent.pptx
Security practivce and their best way to lear
Invited Talk - Cyber Security and Open Source
02-overview.pptx
Rishabhcyber security.pptx
PBL PROJECT - B2- (54,56,50,40) (2) (1).ppt
Cyber Security PPT.pptx
Ad

More from sivaraman163206 (16)

PPTX
Brand Positioning and factores involved in it
PPTX
Product Modification in Marketing Management
PPTX
Buying Decisions to be made in Marketing
PDF
Introduction to Marketing Management in Brief
PPTX
Strategies to Mitigate Non-Payment Risks.pptx
PPTX
Incoterms and their explanations are briefed.pptx
PDF
EXPORT MANAGEMENT IMPORTANCE AND FEATURES
PPTX
Supplier Performances measurement in SCM
PPTX
Key Areas of Outsourcing in Supply Chain Management
PPTX
Purchasing Partnerships and their importance
PPTX
Factors influencing a country's Export.pptx
PPTX
The role of EXIM Bank in the global trade
PDF
An introduction to E-Commerce and its uses.
PPTX
Electronic data interchange and its uses in daily life
PPTX
Network Security Firewall(Basics of Firewall)
PPTX
Steps involved in the implementation of EDI in a company
Brand Positioning and factores involved in it
Product Modification in Marketing Management
Buying Decisions to be made in Marketing
Introduction to Marketing Management in Brief
Strategies to Mitigate Non-Payment Risks.pptx
Incoterms and their explanations are briefed.pptx
EXPORT MANAGEMENT IMPORTANCE AND FEATURES
Supplier Performances measurement in SCM
Key Areas of Outsourcing in Supply Chain Management
Purchasing Partnerships and their importance
Factors influencing a country's Export.pptx
The role of EXIM Bank in the global trade
An introduction to E-Commerce and its uses.
Electronic data interchange and its uses in daily life
Network Security Firewall(Basics of Firewall)
Steps involved in the implementation of EDI in a company
Ad

Recently uploaded (20)

PPTX
Modernising the Digital Integration Hub
PPTX
Chapter 5: Probability Theory and Statistics
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
August Patch Tuesday
PDF
Five Habits of High-Impact Board Members
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Architecture types and enterprise applications.pdf
PDF
STKI Israel Market Study 2025 version august
Modernising the Digital Integration Hub
Chapter 5: Probability Theory and Statistics
A novel scalable deep ensemble learning framework for big data classification...
Univ-Connecticut-ChatGPT-Presentaion.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Final SEM Unit 1 for mit wpu at pune .pptx
sustainability-14-14877-v2.pddhzftheheeeee
August Patch Tuesday
Five Habits of High-Impact Board Members
A review of recent deep learning applications in wood surface defect identifi...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Tartificialntelligence_presentation.pptx
Group 1 Presentation -Planning and Decision Making .pptx
Enhancing emotion recognition model for a student engagement use case through...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Zenith AI: Advanced Artificial Intelligence
Architecture types and enterprise applications.pdf
STKI Israel Market Study 2025 version august

Client Server Network Security and its threats

  • 1. CLIENT-SERVER NETWORK SECURITY L R Siva Raman Assistant Professor PG & Research Department of International Business Sri Ramakrishna College of Arts & Science
  • 2. OVERVIEW  System administrators face the challenge of balancing user accessibility with site security and confidentiality of local information. Network security on the internet is a major concern for commercial organizations, particularly for top management. Connecting to the internet can expose a local network to the entire internet population, breaching the physical security perimeter of the corporate network.
  • 3. SECURITY CONCERNS  Even relaxed organizations must pay attention to security. For many commercial operations, security involves ensuring existing system features, such as passwords and privileges, are properly confined. Auditing all network access, including recording all login attempts (especially unsuccessful ones), can alert managers to the need for stronger measures. Additional measures are necessary where secrets or important corporate assets must be available to remote users. Hackers can employ password guessing, password trapping, security holes in programs, or common network access procedures to impersonate users, posing
  • 4. TYPES OF SECURITY HOLES  1. Physical Security Holes: Unauthorized physical access to computers, such as in public workstation rooms, where a hacker could reboot a machine into single- user mode and tamper with files.  2. Software Security Holes: Badly written programs or compromised 'privileged' software can lead to security breaches. For example, the 'sendmail' hole of 1988 or creating a 'root' shell with super user access.  3. Inconsistent Uses Holes: Flawed combinations of hardware and software by system administrators create security vulnerabilities. These problems are hard to isolate once the system is running, so systems should be carefully built with security in mind.
  • 5. PHYSICAL SECURITY HOLES  Unauthorized physical access examples.  Public workstation room scenario.  Network system access through password guessing.
  • 6. SOFTWARE SECURITY HOLES  Badly written or compromised programs.  'Sendmail' hole example.  Creation of 'root' shell or super user access.
  • 7. INCONSISTENT USES HOLES  Flawed hardware and software combinations.  Difficulty in isolating problems once the system is running.  Importance of careful system building.
  • 8. PROTECTION STRATEGIES  1. Trust-Based Security  2. Security Through Obscurity (STO)  3. Password Schemes  4. Biometric Systems
  • 9. TRUST-BASED SECURITY & STO  Trust-Based Security: Assumption of user trustworthiness.  STO: Hiding operational details and providing information on a need-to-know basis.
  • 10. PASSWORD SCHEMES & BIOMETRIC SYSTEMS  Password Schemes: First-level barrier, one-time passwords, smart cards, tokens.  Biometric Systems: Fingerprints, retinal patterns, voice recognition, high implementation cost.