Widespread reports of hackers breaking into everything from bank systems to e-commerce data systems and gaining unauthorized access to
critical data might discourage someone from connecting to the Internet. In general, Web security is necessary to:
Screen out users who are not who they claim to be (access control)
Prevent proprietary data from being viewed, read, or copied by unauthorized persons (data confidentiality)
Prevent data from being corrupted by accident, by malicious intent, or by a disruption such as a power failure (data integrity)
Ensure that financial transactions are not intercepted
Provide access to authorized individuals only
Client-side security threats:
Client-side security is aimed at protecting the end-user system. This is the end-user's personal computer system-their means of requesting resources from the Internet. Threats to client security include:
Compromising privacy; for example, by theft of personal financial data
Compromising end-user system integrity; for example, by introducing a virus into a system
Using a system to compromise other nodes of a network into which the client is linked
Server-Side Security Threats
A server provides services to multiple clients inside and possibly outside a network. Server-side security is directed toward protecting the components and data of the server from internal and external threats to the server's integrity. For example, in what is called a denial of service (DoS) attack, an intruder targets a site to become so inundated with traffic (or hits) that it overloads the server's capacity and consequently shuts down the site and the server.
Imagine if you repeatedly called your pizza delivery shop, then hung up, just to prevent anyone else from getting through. You'll see other examples of server-side security threats in the MouseOver below.
Client-server connection security threats: Anything affecting the network connection between the client and server is a concern for both. Data traveling along the connection may cross several locations before it reaches its final destination. Consequences of breached security along this path include:
Eavesdropping on the network
Internet fraud; for example, IP address spoofing, DNS spoofing (Spoofing means impersonating)
The following diagram depicts the security threats to the client, server, and client-server connection.
Network Security Threats
Worms, Trojan horses, and denial of service types of attacks are utilized maliciously to destroy and consume the given resources of a network .
At times, incorrectly configured hosts and accompanying servers act like threats to network security, since they do eat up available resources without cause.
To be capable of correctly identifying and mitigating such potential threats, an organization has to be ready with the proper security protocols and tools to do the job. A number of the most efficient means for finding and eliminating these types of threats are explored below.
Logic Attacks:
The majority of security professionals group the various threats to network security in one of two significant categories. Either they are
logic attacks
or resource attacks.
Logic attacks are famous for taking advantage of vulnerabilities and bugs in programs with the stated intention of causing a system to crash.
There are cyber criminals who exploit this attack with the intention of willfully gaining illegal access to the system, or downgrading the performance of a given network An example of such a threat to network security concerns the notorious ping of death. In this vile attack, the perpetrator dispatches ICMP packets off to a system which will be greater in size than the maximum allowed capacity. The majority of these sorts of assaults are simply avoided by upgrading software which proves to be vulnerable or by filtering out particular packet sequences.
Security threats on a client system target active content and privacy infringement. In other words, your personal computer system becomes the object of attack.
Security threats on a server system include server/LAN break-ins, and Denail-of-service attacks.
Threats to both client and server via the connection between them include eavesdropping and internet fraud.
In the next lesson, you will learn the characteristics of a good security plan.