2. ๏ก Client-server security threats can be divided
into 2 major categories:-
a) Threats to client
b) Threats to server
3. ๏ก Client threats mostly arise from malicious
data or code, malicious code refers to viruses,
worms,Trojan horses & deviant.
4. ๏ก A computer virus is a program or piece of
code that is loaded onto your computer
without your knowledge & runs against your
wishes.
๏ก Virus can also replicate themselves.
5. ๏ก A program that performs a desired task but
also performs unexpected function.
6. ๏ก It is a self-replicating program that a self
continued & does not need any host program
to execute.
๏ก Clients must scan for malicious data &
executable program fragment that are
transferred form the server to the client.
8. ๏ก Watching data or information as it travels
through the internet.
๏ก Hackers can use to trap username &
unencrypted password sent over that
network.
9. ๏ก A denial of service attack is an effort to make
one or more computer system unavailable.
๏ก It is typically targeted at web servers but it
can also be used on mail server, name servers
& any other type of computer system.
๏ก The 2 most common types of these attacks
are:-
๏service overloading
๏message overloading
10. ๏ก Servers are vulnerable to service overloading.
๏ก Dos will occur due to overloading of the
server.
11. ๏ก Message overloading will occur when
someone sends a very large file to the
message box of server at every few seconds.
๏ก The message box rapidly grows in size &
begins to occupy all space on the disk &
increase the number of receiving process on
the recipientโs machine & causing a disk
crash.
12. ๏ก It is an integrity threats that involve
modifying a message packet or destroyed the
message packet.
๏ก In many cases, packet information not only
be modified, but its contents may be
destroyed before legitimate users can see
them.