Servers are a main entry point for those who want access to your information or who want to cause destruction. Other entry points are the software, and any back end programs, such as those that contain data and a database.
The server can compromise secrecy by allowing automatic directory listings. They can compromise security by requiring usernamens and passwords for users. In databases, it is important to be sure to encrypt the information and enforce security by requiring authorization. Firewalls are a must have to prevent unwanted access to the server. |