Give your opinion on already posted response

Read Response-1 below and give your opinion on response given by one of your classmate. your answer should be supported with research unless the question is opinion oriented.. Responses to discussions below should NOT be “I agree” or “I like the way you stated that.” These responses should again be insightful, offering an opinion or facts based on your research and experiences. The response to one classmate should be a minimum of 200 words. See APA criteria for citing resources.

Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet? How do secure software development concepts support protecting applications?

Response-1

The web 2.0 phenomenon is the advancement made on the design of application principles and techniques for the users to enjoy an enhanced web experience. Web 2.0 has brought a significant transformation on networking with multiple options such as adding content on the internet, downloading, deleting and editing (McHale, 2011). Additionally, the network connectivity enhanced by the applications established using RSS and Ajax, through web 2.0 has enhanced the interaction among the internet users and service providers.

Just like any other new technological advancement, web 2.0 has experiences some security breaches and vulnerabilities especially from the users’ end. Below are some of them.

Absence of authentication control. Some users may not have adequate knowledge regarding systems security vulnerabilities, and in the process of such users handling the website’s data, they may end up living some traces of data unprotected or use weak passwords which can give a hacker or unauthorized person a chance to access the system.

The other challenge is lack of Brute force control. In web 2.0, internet users may not have control over brute for attacks. Some users may have powerful passwords for their accounts but in an instance a user select “Save password”, then such account is prune to Brute force attacks.

To eliminate such web 2.0 vulnerabilities, software lifecycle development can assist by defining a procedure to develop, build, deploy, and secure an application right from its early stages. Lifecycle processes such as waterfall, RTC, Agile, and multiple methods can hinder security threats (Aruna, 2016).

References

Aruna, S. (2016). Security in Web Services- Issues and Challenges. International Journal of Engineering Research and, V5(09). doi: 10.17577/ijertv5is090245

McHale, N. (2011). An Introduction to Web Accessibility, Web Standards, and Web Standards Makers. Journal 0f Web Librarianship, 5(2), 152-160. doi: 10.1080/19322909.2011.572434

Order the answer to view it

Assignment Solutions
Assignment Solutions

ORDER THIS OR A SIMILAR PAPER AND GET 20% DICOUNT ON YOUR FIRST THREE PAPERS WITH US. USE CODE GET2O ORDER NOW