Best writers. Best papers. Let professionals take care of your academic papers

Order a similar paper and get 15% discount on your first order with us
Use the following coupon "FIRST15"
ORDER NOW

securities

It’s a special web application and technology which includes weblogs and wikis. Web 2.0 provides services to users in collaboration with internet. It basically relies on a concept of user-as-publisher model. And allow user created content to be developed and implemented by other group of individuals. Companies are using these technologies increasingly for better staff collaboration and communication.

WEB 2.0 securities:

Web 2.0 offers many advantages such as enriching the internet and improving the user experience. But on the other hand it also brings a number of security concerns and attacks into existence. The main reason for this threat is the greater user involvement. Some of the security changes with this application are as follows.

Threat by high participation of culture: as it enables an individual to create and host their content on blogs and wikis.  Depending on these interaction the possibility of malicious exploitation occurs on those platforms. Such as distribution of links of fraudulent websites, malicious codes and spyware are increasing (ibm.com, 2017).

AJAX related threats: for providing rich user experience many web 2.0 sites employed light weight user interface code such as java script and AJAX. It allows a higher proportion of request processing from client side.

Threats related to Web Feeds: because of its decentralized and distributed content nature the information on web is distributed to other sites via syndication protocols such as Atom and RSS. They will allow both user and the website to access content and body text without site visiting. Standard mechanism to authenticate the publishers feed is lacking

IPR and Data privacy: in many web 2.0 applications the copyright was only loosely enforced about IPR rights and data privacy. Such as reviews posted on Amazon can be copied and posted elsewhere. So there is no personalization of user data and protect their content.

AJAX impact on network: AJAX can result in constant data exchange between client and server.  The data loss and delay can affect other users. Users currently looking for more consistent and reliable network for better performance.

How to protect applications through secure software development

·       Input software cryptographically protected by data decryption, integrity verification. Include data encryption and integrity processing on output software.

·       Data initialization by the application, data read into internal representation or computing within the application.

·       Algorithm hiding and computations from the direct access. Tamper resistant to make software difficult to modify. Which include static and dynamic detection of tampering.

·       Hiding the data and keying material from being accessed directly like anti-debugger techniques (Chakraborty, 2016).

References

Chakraborty, M. (2016). Software integrity. Retrieved from,

https://www.synopsys.com/blogs/software-security/application-security-vs-software-security/

ibm.com. (2017). Security privacy and WEB 2.0. Retrieved from,

https://www.ibm.com/ibm/files/V808675J59502E65/ibm_gio_web2point0_brochure_hi.pdf

 

“Is this question part of your assignment? We Can Help!”


securities was first posted on August 28, 2019 at 4:21 am.
©2019 "Classroom Essays". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at Academicheroes.com

Source link

 

“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”


securities was first posted on August 28, 2019 at 4:22 am.
©2019 "Academicheroes.com". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at admin@Academicheroes.com.com

 
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"