EBK SOFTWARE ENGINEERING
10th Edition
ISBN: 9780133943238
Author: SOMMERVILLE
Publisher: PEARSON CO
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 17, Problem 17.5E
Program Plan Intro
Fat client:
It is also called as thick client. It is nothing but a software that implements its own characteristics. It connects to servers but it functions greatly even when disconnected.
Example: Games
Thin client:
It is not like fat client because, here, only the UI is presented on the client system and all other functions are carried out on the server.
Example: Web browser
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
You have been asked to design a secure system that requires strong authentication and authorization. The system must be designed so that communications between parts of the system cannot be intercepted and read by an attacker. Suggest the most appropriate clientserver architecture for this system and, giving the reasons for your answer, propose how functionality should be distributed between the client and the server systems.
Assume that the authentication protocol used by an organization is Kerberos.
What is the ramifications of a failure of either the AS (authentication server) or the TGS (ticket granting server) on security and service availability?
Explain why network security is crucial to you. Is the significance of it determined by the network's size or complexity? What are some examples of factors that you believe influence the importance of network security?
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- _____________is the evaluation of a system in operation. ______ supplies the reasoning and understanding behind the actions implemented in training. __________is where you will determine live hosts, routers, and servers to establish a picture of the network topology. Any security policy must be aligned with an organization's ___ processes and ___.arrow_forwardSuppose the authentication system used by your company is Kerberos. What is the ramifications of a failure of the AS (authentication server) or the TGS (ticket granting server) on security and service availability?arrow_forwardWhat security features do you expect from a secure email system, and from the machines running a secure email system? Which protocol layer is most appropriate for such a security service? In your answer, distinguish between services that want to offer anonymity and those that do notarrow_forward
- Since the bulk of the company's business activities are handled by servers on a flat network, a network security design is required to improve protection and security. The network is flat, thus that is why this is the case. whenever a demilitarized zone is formed, and whenever. What aspects of the present network's structure would you modify if you could?arrow_forwardYou have been contacted by an insurance company that wants your opinion on the most efficient technique of allowing access to their systems. Give an explanation for why they need both authentication and access control.arrow_forwardDemonstrate how the native authentication and authorization services of the web server are implemented and what each step entails when a web client accesses a secure server resource. This is why the employment of layered protocols is so enticing to you. Provide particular examples to support your assertions.arrow_forward
- An insurance company has asked for your opinion on the most efficient way to allow access to their systems. Justify why both authentication and access control are required.arrow_forwardfind out whether there are any vulnerabilities in the network system Network vulnerabilities should be addressed with appropriate security measures. You should take into account virtualization and cloud computing while making judgments.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage LearningPrinciples of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning