Develop a detailed, well-designed deployment plan that will allow organizations to maintain secure configurations and aids in identifying security vulnerabilities. In the your discussion in the planning stages of a web server, the following items should be considered: purpose(s) of the web server; network services; network service software, client and server; the users, types users; privileges that each type users will have; web server management and appropriate access to information resources.
Primarily a server is a host that facilitates services to other host over a network this is the primary function of a server, like a file server facilitates the capabilities of file sharing across other host so that other user can perform various operations on files like deleting, modifying etc. Another good example can be a database server that facilitates database related services for the Web applications running on the Web servers and the web servers in turns provides web contents to the clients that is the web brewers that user uses to request for a web page from the web server.
We should consider security vulnerabilities and threats to make a web server secure and for this it is must to define the kind of threats that must be reduced. Knowledge to such kind of threats are necessary to take security measurement to make the server secure. there are many kind of threats that can be possible against the data and resource available on the server and that can be either bugs in the operation system or any kind of bug in the server software that can highly enhance the create a security vulnerability. Threats may include the attackers that is trying to access the resources and data available on the server or the administrator that mistakenly forgets to disable the user accounts an ex-employee that has leave the organization. Threats can be of any type and can be from local network such as a displeased or dissatisfied employee, or they can be from remote network for example a remote attacker from any other location and from other network.
Attackers can use many different ways through the application to harm to our organization or business. Each of the way denotes a high risk that may not or may be serious enough to grab our attention. Read about Types of database Models.
In computer world and computer networking, basically a network service is a program of application that is running at the application level and above, it basically provides storage of data, manipulation of data and communication that is implemented using a client-server model based application. A web server provides many service that is usually provided as a server component and running on one or more computers and can be accessed by client components that are running on other devices. However it is not compulsory that the client and server use different machines, the client and server can be run simultaneously on the same machine. The client and server often uses a user interface and sometimes other hardware that are associated with them.