SlideShare a Scribd company logo
1 of 13
Rahul kundu
6th sem, IT
๏‚ก Client-server security threats can be divided
into 2 major categories:-
a) Threats to client
b) Threats to server
๏‚ก Client threats mostly arise from malicious
data or code, malicious code refers to viruses,
worms,Trojan horses & deviant.
๏‚ก A computer virus is a program or piece of
code that is loaded onto your computer
without your knowledge & runs against your
wishes.
๏‚ก Virus can also replicate themselves.
๏‚ก A program that performs a desired task but
also performs unexpected function.
๏‚ก It is a self-replicating program that a self
continued & does not need any host program
to execute.
๏‚ก Clients must scan for malicious data &
executable program fragment that are
transferred form the server to the client.
๏‚ก Unauthorized eavesdropping
๏‚ก Denial of services(Dos)
๏‚ก Modification of incoming data packets
๏‚ก Watching data or information as it travels
through the internet.
๏‚ก Hackers can use to trap username &
unencrypted password sent over that
network.
๏‚ก A denial of service attack is an effort to make
one or more computer system unavailable.
๏‚ก It is typically targeted at web servers but it
can also be used on mail server, name servers
& any other type of computer system.
๏‚ก The 2 most common types of these attacks
are:-
๏ƒ˜service overloading
๏ƒ˜message overloading
๏‚ก Servers are vulnerable to service overloading.
๏‚ก Dos will occur due to overloading of the
server.
๏‚ก Message overloading will occur when
someone sends a very large file to the
message box of server at every few seconds.
๏‚ก The message box rapidly grows in size &
begins to occupy all space on the disk &
increase the number of receiving process on
the recipientโ€™s machine & causing a disk
crash.
๏‚ก It is an integrity threats that involve
modifying a message packet or destroyed the
message packet.
๏‚ก In many cases, packet information not only
be modified, but its contents may be
destroyed before legitimate users can see
them.
Client server security threats

More Related Content

What's hot

I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commerce
mc aa
ย 
E commerce security
E commerce securityE commerce security
E commerce security
Shakti Singh
ย 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
Biroja
ย 

What's hot (20)

architecture framework for ecommerce
architecture framework for ecommercearchitecture framework for ecommerce
architecture framework for ecommerce
ย 
Anatomy of Ecommerce framework
Anatomy of Ecommerce frameworkAnatomy of Ecommerce framework
Anatomy of Ecommerce framework
ย 
I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commerce
ย 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
ย 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
ย 
Risks involved in E-payment
Risks involved in E-payment Risks involved in E-payment
Risks involved in E-payment
ย 
E-COMMERECE V/S TRADITIONAL COMMERCE
E-COMMERECE V/S TRADITIONAL COMMERCEE-COMMERECE V/S TRADITIONAL COMMERCE
E-COMMERECE V/S TRADITIONAL COMMERCE
ย 
E commerce security
E commerce securityE commerce security
E commerce security
ย 
Consumer Oriented Application, Mercantile process and Mercantile models
Consumer Oriented Application, Mercantile process and Mercantile modelsConsumer Oriented Application, Mercantile process and Mercantile models
Consumer Oriented Application, Mercantile process and Mercantile models
ย 
digital tokens based on E-payments
digital tokens based on E-paymentsdigital tokens based on E-payments
digital tokens based on E-payments
ย 
E commerce (edi)
E commerce (edi)E commerce (edi)
E commerce (edi)
ย 
EDI
 EDI EDI
EDI
ย 
Network Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part INetwork Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part I
ย 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
ย 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
ย 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
ย 
e-commerce
e-commercee-commerce
e-commerce
ย 
Some E-commerce Applications
Some E-commerce ApplicationsSome E-commerce Applications
Some E-commerce Applications
ย 
Client server architecture
Client server architectureClient server architecture
Client server architecture
ย 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
ย 

Similar to Client server security threats

Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network security
Sreerag Gopinath
ย 
Computer Security
Computer SecurityComputer Security
Computer Security
Vaibhavi Patel
ย 
Security communication
Security communicationSecurity communication
Security communication
Say Shyong
ย 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
Ardit Meti
ย 
Saurav vishwaraj pro
Saurav vishwaraj proSaurav vishwaraj pro
Saurav vishwaraj pro
Saurav Mahapatra
ย 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
VishwarajYadav
ย 

Similar to Client server security threats (20)

Computing safety
Computing safetyComputing safety
Computing safety
ย 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
ย 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber security
ย 
Network security
Network securityNetwork security
Network security
ย 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
ย 
Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network security
ย 
Computer Security
Computer SecurityComputer Security
Computer Security
ย 
Computer Security
Computer SecurityComputer Security
Computer Security
ย 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
ย 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
ย 
Security communication
Security communicationSecurity communication
Security communication
ย 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
ย 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
ย 
Computer security system Unit1.pptx
Computer security system Unit1.pptxComputer security system Unit1.pptx
Computer security system Unit1.pptx
ย 
Web server security challenges
Web server security challengesWeb server security challenges
Web server security challenges
ย 
cryptography .pptx
cryptography .pptxcryptography .pptx
cryptography .pptx
ย 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
ย 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
ย 
Saurav vishwaraj pro
Saurav vishwaraj proSaurav vishwaraj pro
Saurav vishwaraj pro
ย 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
ย 

More from rahul kundu (17)

Material management
Material managementMaterial management
Material management
ย 
Business function in organization
Business function in organizationBusiness function in organization
Business function in organization
ย 
Document object model(dom)
Document object model(dom)Document object model(dom)
Document object model(dom)
ย 
Document object model(dom)
Document object model(dom)Document object model(dom)
Document object model(dom)
ย 
Dhtml
DhtmlDhtml
Dhtml
ย 
Sgml
SgmlSgml
Sgml
ย 
Internet
InternetInternet
Internet
ย 
Type of internet connectivity
Type of internet connectivityType of internet connectivity
Type of internet connectivity
ย 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
ย 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udp
ย 
Electronic payment system(EPS)
Electronic payment system(EPS)Electronic payment system(EPS)
Electronic payment system(EPS)
ย 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
ย 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slides
ย 
Electronic data-interchange slides
Electronic data-interchange slidesElectronic data-interchange slides
Electronic data-interchange slides
ย 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
ย 
Virus slides
Virus slidesVirus slides
Virus slides
ย 
Mpeg 7 slides
Mpeg 7 slides Mpeg 7 slides
Mpeg 7 slides
ย 

Recently uploaded

valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
ย 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
SUHANI PANDEY
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
SUHANI PANDEY
ย 
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
ย 

Recently uploaded (20)

Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
ย 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
ย 
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
ย 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
ย 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
ย 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
ย 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
ย 
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort ServiceBusty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
ย 
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
ย 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
ย 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
ย 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
ย 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
ย 
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
ย 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
ย 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
ย 
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
ย 
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
ย 

Client server security threats

  • 2. ๏‚ก Client-server security threats can be divided into 2 major categories:- a) Threats to client b) Threats to server
  • 3. ๏‚ก Client threats mostly arise from malicious data or code, malicious code refers to viruses, worms,Trojan horses & deviant.
  • 4. ๏‚ก A computer virus is a program or piece of code that is loaded onto your computer without your knowledge & runs against your wishes. ๏‚ก Virus can also replicate themselves.
  • 5. ๏‚ก A program that performs a desired task but also performs unexpected function.
  • 6. ๏‚ก It is a self-replicating program that a self continued & does not need any host program to execute. ๏‚ก Clients must scan for malicious data & executable program fragment that are transferred form the server to the client.
  • 7. ๏‚ก Unauthorized eavesdropping ๏‚ก Denial of services(Dos) ๏‚ก Modification of incoming data packets
  • 8. ๏‚ก Watching data or information as it travels through the internet. ๏‚ก Hackers can use to trap username & unencrypted password sent over that network.
  • 9. ๏‚ก A denial of service attack is an effort to make one or more computer system unavailable. ๏‚ก It is typically targeted at web servers but it can also be used on mail server, name servers & any other type of computer system. ๏‚ก The 2 most common types of these attacks are:- ๏ƒ˜service overloading ๏ƒ˜message overloading
  • 10. ๏‚ก Servers are vulnerable to service overloading. ๏‚ก Dos will occur due to overloading of the server.
  • 11. ๏‚ก Message overloading will occur when someone sends a very large file to the message box of server at every few seconds. ๏‚ก The message box rapidly grows in size & begins to occupy all space on the disk & increase the number of receiving process on the recipientโ€™s machine & causing a disk crash.
  • 12. ๏‚ก It is an integrity threats that involve modifying a message packet or destroyed the message packet. ๏‚ก In many cases, packet information not only be modified, but its contents may be destroyed before legitimate users can see them.