Retrieved from https://studentshare.org/information-technology/1418058-web
https://studentshare.org/information-technology/1418058-web.
Web 2.0 Security Web 2.0 has become a well known trend in last few years, and it is known as the second generation of social services based on internet tools and applications. These internet tools and applications offer staff members, customers and business associates access to a lot of different helpful software services that can be effortlessly upgraded. Additionally, the Web 2.0 also allows the users to access a central corporate resource such as web server and through it, the capability to make use of other important information resources, for instance database servers (Ben-Itzhak; Edwards; Noureddine and Damodaran).
Moreover, before the emergence of Web 2.0, website vendors captured traffic for their web sites by producing web content intended for drawing the attention of large numbers of viewers. On the other hand, Web 2.0 is a web based platform for the users to generate, work together and distribute their ideas or information, which can include various tools such as wikis, blogs, photos or videos. In this scenario, the basic aim of Web 2.0 is to create an easy to use and accessible platform for the people, with the intention that they could access, view and distribute content.
The most famous examples of Web 2.0 include well-liked social networks, for instance YouTube and MySpace.com (Ben-Itzhak; Edwards; Noureddine and Damodaran). Despite the fact that Web 2.0 brings a lot of advantages such as inspiring the internet, building online communities and many others but it is also helpful to create new methods for carrying out illegal activities. In other words, Web 2.0 tools and applications are susceptible to both in-house and outside security threats. However, by adopting appropriate security actions, a company could be able to defend its valuable IT resources from security threats.
Thus, an organizations needs to offer a protected framework for Web-application users (Edwards; Ben-Itzhak; Noureddine and Damodaran). Normally, hackers use two main elements of Web 2.0 in order to carry out their illegal activities. These two elements are server computer and the client computer. In view of the fact that these both sides of the internet connection keep personal and corporate information thus it attracts hackers. When a user desires to download a web page using the browser from client computer, a particular server is targeted to load the web page.
However, this is not a straightforward operation since various other processes may occur: (Noureddine and Damodaran) The desired server may need to obtain required data from another server The web browser may need to obtain data from another server The web browser may need run commands on the client computer The web browser may require the commands that need to be executed on the server computer Furthermore, many developers efficiently utilized the features of traditional Web 1.0 and as a result they got popularity among people.
Consequently, these improvements, in addition to the volatile internet usage, set these features front and center in an attempt to attain the customers’ attention. Moreover, Web 2.0 filled existing technologies of Web 1.0 that developers as well as users alike have tried to evade because of security and consistency issues thus due to Web 2.0 the internet is becoming hackers’ dreamland. Works Cited Ben-Itzhak, Yuval. Tackling the security issues of Web 2.0. 10 September 2007. 20 April 2007 .
Edwards, John. Best Practices for Web 2.0 Security. 2011. 18 April 2011 . Evers, Joris. The security risk in Web 2.0. 28 July 2006. 19 April 2011 . Hines, Matt. Experts hammer Web 2.0 security. 21 February 2008. 19 April 2011 . M86 Security. Web 2.0 Security. 2011. 19 April 2011 . Noureddine, Adam A. and Meledath Damodaran. "Security in web 2.0 application development ." iiWAS '08: Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services .
ACM New York, USA, 2008. 681-685. W2SP. Workshop Program: W2SP 2011: Web 2.0 Security and Privacy 2011. 26 May 2010. 19 April 2011 .
Read More