Wednesday, October 16, 2019
Web 2.0 Security Research Paper Example | Topics and Well Written Essays - 2500 words
Web 2.0 Security - Research Paper Example The idea of the ââ¬Å"Web 2.0 was given by Darcy DiNucci, an advisor on electronic information paradigm. In this regard, this emerging idea is normally linked with web applications that are helpful to increase the capability to communicate interactive information distribution, cooperation, user-centered plan on the www. Additionally, the web sites which encompass the features of Web 2.0 offer its users the free option to work together or cooperate with each other in the community media discussion as designers of user-produced information material in a virtual society, as compared to those websites where clients are restricted to the inactive analysis of content that was developed for them. Moreover, the instances of Web 2.0 comprise a range of applications like social-networking blogs, websites, video-sharing websites, wikis, web applications, hosted services, folksonomies and mashups. Despite the fact that the idea presents an innovative description of the World-Wide-Web, but it do es not offer an update to some technological conditions, however relatively growing transformations in the means software developers and end users utilize the Web (XIBL; Mysore). Normally, the Web 2.0 incorporates the client-side website browser expertise such as Flash, Asynchronous JavaScript and XML (Ajax) and JavaScript/Ajax frameworks and the Adobe Flex framework like that Dojo Toolkit, Yahoo! UI Library, jQuery and MooTools. In this scenario, Ajax programming utilizes Java-Script to upload as well as download new data from the web server without reloading a page repeatedly (XIBL; Mysore). Web 2.0 uses machine-based connections like that SOAP and REST. In this scenario, servers frequently represent administrative Application Programming Interfaces or simply APIs, however standard APIs (for instance, for positioning to an internet blog or informing a blog revision) are also used in development. Moreover, for the communications in APIs incorporate XML or else JSON payloads (XIBL; Mysore). The new web based or web-supported tools offer a range of effective software features and services to the consumers, workers and business associates. These services could be easily managed and handled. Additionally, the new information technology offers access to a major business resource such as the web server, which gives the capability to access various other useful information resources, for instance database servers (ITSecurity). At the present time, a lot of young people have fully integrated Web 2.0 tools and applications into their professional and personal lives. According to various researches, more than 80% of workers make use of social networking applications or web sites like that MySpace, Facebook and YouTube at workplaces or on their laptops. Thus, it is clear that the fame of video-calling (Skype), instant messaging and peer-to-peer (such as multi-player gaming) is increasing day by day and it is causing augmenting danger for businessââ¬â¢s status, networ k performance in addition to information safety (M86 Security). Web 2.0 is definitely very helpful in almost every walk of life. For instance, people read blogs on various latest issues, and place queries on communication board to get response of their questions or investigate specialized debates or forums to get latest knowledge about a definite issue. Moreover, the Web 2.0 applications such as IM (or instant messaging), P2P and Skype frequently offer extra advantages for exchanging information with associates (M86 Security). Obviously, Web 2.0 technology can negatively affect business information security as well as efficiency of organizations. For instance, the lively, interactive website content on Web 2.0 websites can simply divert a worker for hours. Moreover, the businesses are bothered regarding the possible discovery of secret and sensitive data and information by workers when they communicate with other, write messages, write blogs or leave remarks when participating in so cial media (M86 Security). The major examples of Web 2.0 includes
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.