The client server model refers to a relationship between two computer programs in which one program; the server program fulfills a request made by another program that is the client server. The client server network makes available a convenient way to link programs that are distributed resourcefully across different locations. Instances of client server network model in computer transactions include checking bank account balances from a personal computer.
It is impractical to have numerous clients to be members of a single distributed system, as with peer to peer, and connected to each other. Each SQLFire server runs in its own process and provides network server functionality so as to manage the connections to clients and other servers in the band. The client driver in the client/server deployment model is lightweight and less than 1MB and is implemented as a thin JDBC driver for Java applications, .NET and Mono applications, or an ADO.NET for Microsoft.
For the thin clients, they initially connect to one server at time and for multiple thin-clients, the connections can be load balanced across all SQLFire servers in the band. The client server deployment model allows Microsoft .NET, Mono applications, and Java applications to access SQLFire. Scenarios in which the client server model is used include;
- When numerous clients are supported and scalability is a more important factor than distribution dormancy.
- The client server deployment is considered when the expense of re-creating data from disk or a different repository in the case where clients are needed to be separated from the data stores.
- A client server model is used when the clients connect over a remote network or reside on desktop computers since there might be impossibilities because of network boundaries or firewalls.
The scenarios provided by the National Internet Search Provider client depicts risks which are to be dealt with to ensure confidentiality and integrity of data and information, as well as the corporate network security.
User credential related risk
The use of VPNs provides easy access from the internet into a corporate network and its internal resources and yet its security isn’t as robust as the procedures used to authenticate the users and the devices at the remote end of the connection. A two factor authentication will be prudent for use.
Spread of worms, viruses, Trojans to the internal network from the remote computer
Remote computer access is normally a major threat vector to the network security of the company. The remote computers may forward a potential infection from its local network environment to the company`s internal network.
Inadequate required host security software on public machines
It is easy and convenient to connect from anywhere on the internet to a corporate internet network by use of Secure Sockets Layer and Virtual Private Network. However, the local computer may lack antivirus software properly installed hence they may spread worms, Trojans horses, viruses, and may become a back door for malicious attackers.
Keystroke loggers
When public computers are used, SSL VPN client machines may be more susceptible to keystroke loggers since they may fail to meet the security policies and standards for the organization.
Man in the middle attacks
Here, the attacker intercepts user traffic to capture credentials and other relevant information. This information may be used by the attacker to access the actual destination network. The attacker who serves as a malicious proxy/gateway presenting a false SSL VPN site to the user is passed the authentication to be used to access the real destination site. These possess a security risk to the organization.
End points or loss of sensitive information and intellectuality property
Sensitive information ranging from user credentials, customer information, and internal personnel information may be left on a remote computer if the computer is not properly protected. This requires endpoint type of protection to limit this type of risk.
References
International IFIP-TC6 Networking Conference, Boutaba, R., & International Federation for Information Processing. (2005). Networking 2005: Networking technologies, services, and protocols : performance of computer and communication networks : mobile and wireless communication systems : 4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005 : proceedings. Berlin: Springer.