StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Web 2.0 Security - Research Paper Example

Cite this document
Summary
Web 2.0 has become a well known trend in last few years,and it is known as the second generation of social services based on internet tools and applications.These internet tools and applications offer staff members,customers and business associates access to a lot of different helpful software services that can be effortlessly upgraded…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96% of users find it useful
Web 2.0 Security
Read Text Preview

Extract of sample "Web 2.0 Security"

Web 2.0 Security Web 2.0 has become a well known trend in last few years, and it is known as the second generation of social services based on internet tools and applications. These internet tools and applications offer staff members, customers and business associates access to a lot of different helpful software services that can be effortlessly upgraded. Additionally, the Web 2.0 also allows the users to access a central corporate resource such as web server and through it, the capability to make use of other important information resources, for instance database servers (Ben-Itzhak; Edwards; Noureddine and Damodaran).

Moreover, before the emergence of Web 2.0, website vendors captured traffic for their web sites by producing web content intended for drawing the attention of large numbers of viewers. On the other hand, Web 2.0 is a web based platform for the users to generate, work together and distribute their ideas or information, which can include various tools such as wikis, blogs, photos or videos. In this scenario, the basic aim of Web 2.0 is to create an easy to use and accessible platform for the people, with the intention that they could access, view and distribute content.

The most famous examples of Web 2.0 include well-liked social networks, for instance YouTube and MySpace.com (Ben-Itzhak; Edwards; Noureddine and Damodaran). Despite the fact that Web 2.0 brings a lot of advantages such as inspiring the internet, building online communities and many others but it is also helpful to create new methods for carrying out illegal activities. In other words, Web 2.0 tools and applications are susceptible to both in-house and outside security threats. However, by adopting appropriate security actions, a company could be able to defend its valuable IT resources from security threats.

Thus, an organizations needs to offer a protected framework for Web-application users (Edwards; Ben-Itzhak; Noureddine and Damodaran). Normally, hackers use two main elements of Web 2.0 in order to carry out their illegal activities. These two elements are server computer and the client computer. In view of the fact that these both sides of the internet connection keep personal and corporate information thus it attracts hackers. When a user desires to download a web page using the browser from client computer, a particular server is targeted to load the web page.

However, this is not a straightforward operation since various other processes may occur: (Noureddine and Damodaran) The desired server may need to obtain required data from another server The web browser may need to obtain data from another server The web browser may need run commands on the client computer The web browser may require the commands that need to be executed on the server computer Furthermore, many developers efficiently utilized the features of traditional Web 1.0 and as a result they got popularity among people.

Consequently, these improvements, in addition to the volatile internet usage, set these features front and center in an attempt to attain the customers’ attention. Moreover, Web 2.0 filled existing technologies of Web 1.0 that developers as well as users alike have tried to evade because of security and consistency issues thus due to Web 2.0 the internet is becoming hackers’ dreamland. Works Cited Ben-Itzhak, Yuval. Tackling the security issues of Web 2.0. 10 September 2007. 20 April 2007 .

Edwards, John. Best Practices for Web 2.0 Security. 2011. 18 April 2011 . Evers, Joris. The security risk in Web 2.0. 28 July 2006. 19 April 2011 . Hines, Matt. Experts hammer Web 2.0 security. 21 February 2008. 19 April 2011 . M86 Security. Web 2.0 Security. 2011. 19 April 2011 . Noureddine, Adam A. and Meledath Damodaran. "Security in web 2.0 application development ." iiWAS '08: Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services .

ACM New York, USA, 2008. 681-685. W2SP. Workshop Program: W2SP 2011: Web 2.0 Security and Privacy 2011. 26 May 2010. 19 April 2011 .

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Web 2.0 Security Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1418058-web
(Web 2.0 Security Research Paper Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/information-technology/1418058-web.
“Web 2.0 Security Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1418058-web.
  • Cited: 0 times

CHECK THESE SAMPLES OF Web 2.0 Security

Web Security: Applications, and Tools

Web security is a branch of Information security that deals with the security of websites, web applications, and web services.... At higher levels, web security operates on the ethics of application security and applies them to Internet and web systems.... hellip; Web security: Applications, and Tools.... Web security is a branch of Information security that deals with the security of websites, web applications, and web services....
6 Pages (1500 words) Essay

Web Security and Factors Contributing to Web Security

The paper discusses web security and factors contributing to web security in terms of user's knowledge, technology, and necessary tools for security.... Additionally, the paper touches on the web history, user's responsibility, internet controls, and development of SWEET… The paper discusses web security and factors contributing to web security in terms of user's knowledge, technology, and necessary tools for security....
14 Pages (3500 words) Essay

The Idea of the Web 2.0

Basically, web 2.... is used in conjunction with web applications that can be useful to improve the potential to communicate, distribute interactive information,… In addition, some of the well-known examples of web 2.... include a wide variety of web based applications such as social-networking blogs, interactive websites, Wikis, video-sharing web 2.... web 2.... Affiliation The idea of the “web 2....
1 Pages (250 words) Assignment

Evolution of Web Security

This paper ''Web security'' tells that Technological evolution has grown fast and vast.... hellip; However, these platforms are loaded with a major risk: information security risk.... In recent years, web security, a branch of information security has drawn an eye of attention from many industries and organizations.... This is because websites, web applications, and web services, all being components of web security, create an integral part of the daily operations of these industries and organizations....
12 Pages (3000 words) Essay

Web Security Importance

The paper "Web security Importance " states that Web security is not an instant success story but, instead, requires the ongoing implementation of countermeasures that try to curb any malpractices that may pose a threat to secure information transfer.... Several experts have come up with different tools such as SWEET that provide a better environment for the training and management of security operations on the web.... Web security has become a very key component in the world of information technology....
12 Pages (3000 words) Coursework

Use of the Web

The author outlines all the issues associated with web 2.... As time passed, different technological advancements converged and brought about web 2.... web 2.... , web 2.... NESSI (Networked European Soft and Services Initiative) states that 'web 2.... he use of media and web 2.... The current devices have connected the people, and this has made use of marketing easier using the web 2....
7 Pages (1750 words) Report

Information Security Program Survey of the Department of Veteran Affairs

The paper "Information security Program Survey of the Department of Veteran Affairs" seeks to critically analyze the information security of the Veteran Affairs sector in the US.... The Information security program as envisaged by the United States Government Accountability Office (GAO) for the department of veterans affairs is to exert a pull and maintain individuals with skills in the field of information technology.... These guidelines show how the sector of Veteran Affairs handles protects its information assets, as well as making prospect resolution about the information systems security infrastructure....
6 Pages (1500 words) Term Paper

Solving the Household Food Insecurity Problem in Missouri

Different types of organizations in the EFAS including food pantries, emergency kitchens, food banks, food rescue organizations, and emergency food organizations assist the poor in achieving food security.... he World Health Organization (WHO) defines food security is, “when all people at all times have access to sufficient, safe, nutritious food to maintain a healthy and active life” (WHO n.... In 2012, the household food security in the United States was the eighty-five-percentage proportion of the total population (USDA n....
5 Pages (1250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us