Abstract: | The object of this article is to identify the risks that are run in the network and communications aspects of a client/server environment and thus help to define what security controls ought to be put place for these. However, before it is possible to do this we need to define what is meant by ‘Client/Server’ systems. |