3 Replies Latest reply: Jul 6, 2013 12:32 PM by jschellSomeoneStoleMyAlias RSS

    Security

    2a614dc0-adcc-402b-b338-8adfe88b1e6e

      Ok I'm trying to wrap my head around every way someone could breach my program.

       

      Say the program is a classic stand alone three tier but I'm focused mainly on the authentication and connection between the client and server applications not the database.

       

      Hopefully I've thought of them all but so far I've come up with the following.

       

       

      Learning the server end by reading the client side application signatures.

      Intercepting raw network packets. (including all the ways related)

      Breaching the client or server machines via network.

      Stealing a client's login information.

       

      It seems simple so I ask should I be concerned with any other methods?

       

      Thanks

       

      Ryan Bowman