Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Client–server model
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
=== Computer security === In a [[computer security]] context, client-side vulnerabilities or attacks refer to those that occur on the client / user's computer system, rather than on the [[server-side|server side]], or [[Man-in-the-middle attack|in between the two]]. As an example, if a server contained an [[encryption|encrypted]] file or message which could only be decrypted using a [[Key (cryptography)|key]] housed on the user's computer system, a client-side attack would normally be an attacker's only opportunity to gain access to the decrypted contents. For instance, the attacker might cause [[malware]] to be installed on the client system, allowing the attacker to view the user's screen, record the user's keystrokes, and steal copies of the user's encryption keys, etc. Alternatively, an attacker might employ [[cross-site scripting]] vulnerabilities to execute malicious code on the client's system without needing to install any permanently resident malware.<ref name=oreilly /><ref name=n3tweb /><ref name=alpinesecurity />
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)