You are on page 1of 4

< Layer of software between network and applications

< Acts as a linkage or glue to the host networks and the


applications developed on it
< Client server model distributed systems
etwork Transparency and solation
Client/Server Connectivity
Application and Tool Support (APs)
RDBMS Support
Single System Login
nteraction With Other etwork Services
< More vulnerable
< ot just hardware/ready made software security
solutions which the upper and lower layers have
< The weakest link in a secured architecture
< Consider a college campus directory
< The basic needs for a campus directory is well
known by all
< nternal security threat a campus directory can
face is due to improper policy settings
< Proper perimeter security is also required for the
campus directory ,in addition to the encryption
techniques used to transfer and storage protection

You might also like