From the course: CompTIA Data Systems (DSO-001) Cert Prep
Unlock this course with a free trial
Join today to access over 24,000 courses taught by industry experts.
Client/server architecture
From the course: CompTIA Data Systems (DSO-001) Cert Prep
Client/server architecture
- A client-server architecture divides the database system into two main components: the client and the server. The server is where the database management system resides. Database clients send requests to the server to perform actions such as querying, inserting, updating, or deleting data. The server processes these requests, interacts with the database, and returns the results to the client. Examples of clients include applications, application servers, and API endpoints. Now, it's very important to secure a client-server architecture by properly configuring network devices. Specifically, you can use firewalls to protect the database server from unauthorized access. A firewall is a security device that monitors and controls incoming and outgoing network traffic using predetermined security rules. As barriers between trusted internal networks and untrusted external networks, firewalls prevent unauthorized access while protecting internal resources from potential security threats. In…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Structured Query Language3m 41s
-
(Locked)
SELECT statement2m 27s
-
(Locked)
Sorting results4m 3s
-
(Locked)
Filtering data4m 1s
-
(Locked)
Aggregating data3m 8s
-
(Locked)
String manipulation2m 43s
-
(Locked)
Working with dates2m 14s
-
(Locked)
Derived values3m 16s
-
(Locked)
Set operations5m 37s
-
(Locked)
Join operations1m 58s
-
(Locked)
Inner joins7m 7s
-
(Locked)
Joining multiple tables6m 34s
-
(Locked)
Outer joins2m 55s
-
(Locked)
Transactions and the ACID model3m 48s
-
(Locked)
-
-
(Locked)
Query optimization2m 11s
-
(Locked)
Index optimization2m 5s
-
(Locked)
Patch management1m 33s
-
(Locked)
Database integrity checks2m 38s
-
(Locked)
Data corruption checks2m 21s
-
(Locked)
Audit log review2m 6s
-
(Locked)
Performance tuning3m 23s
-
(Locked)
Load balancing2m 58s
-
(Locked)
Change management3m
-
(Locked)
-
-
(Locked)
Legal and compliance risks2m 19s
-
(Locked)
Data privacy4m
-
(Locked)
General Data Protection Regulation (GDPR)7m 12s
-
(Locked)
California Consumer Privacy Act (CCPA)5m 56s
-
(Locked)
Data types1m 42s
-
(Locked)
Data classification2m 44s
-
(Locked)
Data loss prevention5m 17s
-
(Locked)
Security policies5m 7s
-
(Locked)
-
-
(Locked)
Identity and access management2m 58s
-
(Locked)
Usernames and access cards3m 23s
-
(Locked)
Biometrics2m 42s
-
(Locked)
Authentication factors3m 26s
-
(Locked)
Multifactor authentication2m 35s
-
(Locked)
Password policies4m 19s
-
(Locked)
Need to know and least privilege2m 34s
-
(Locked)
Privileged account management2m 31s
-
(Locked)