How does web 2 change security for the internet

Assignment Help Computer Network Security
Reference no: EM132083207

Written Assignment Information

Capture an spam Email message. View the Email header and copy the information to your assignment document. Only one email is necessary. You do not need a reference for this assignment. You only need to show the header information. No narrative is necessary.

Week 6 Discussion Question

Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet? How do secure software development concepts support protecting applications?

Reply to class mate:

Web 2.0 structures utilize the Web as a stage, as a goliath degree of interconnected contraptions which can give another level of rich and immersive experience for the client, a simple to-utilize and lightweight programming model for the fashioner, and a speedy and adaptable affiliation system for the provider. Web 2.0 reexamines the Internet from the client, the modeler, and the provider's points of view, each of which permits new and innovative occupations of the Internet. (Platt)

The likelihood of association supports each related structure, including, obviously, Web 2.0. An association creates structure is based concerning the standard of the division of stresses using free coupling or message passing. The free coupling engages accommodation to be made as an association and passed on completed a structure; for instance, in the Web 2.0 world, journal comfort can be given by a blog motor and be passed on as an assistant of the end client or blogger over the Internet. (Platt)

In Web 2.0, the programming models, musings and systems are fundamentally not precisely the same as those that have been utilized as a bit of the endeavor. While they are associations based and reinforced with lighting up passing, they utilize Representational State Transfer (REST) conventions and concentrate on simplicity and solace. (Platt)

Web 2.0 creation PC programs endless supply of concerns utilizing a generally coupled, message-passing-form show up with respect to best of an Internet-based, standard course of action of exchanges customs (HTTP) which is routinely called REST full programming. It derives the displays of syndication and affiliation where associations are given without information of their utilization. This is overall not the same as an ordinary unequivocally coupled, regard based and disagree orchestrated structure. It has a substitute course of action of great conditions, for example, adaptability and speed of execution, and inconveniences, for example, dependability and association. (Platt)

The vernaculars, for example, Perl, Python, and Ruby-and systems utilized as a bit of Web 2.0 are fundamental and dynamic, giving a low farthest point to portion and reuse and high profitability. The structures have worked in help for the principal course of action diagrams, for example, Model View Controller (MVC), and procedures, for example, created programming change. They are enthusiastic and simple to learn, utilize, and be profitable in. (Platt)

Reference no: EM132083207

Questions Cloud

What is the break-even point in dollars in units : Use the contribution margin ratio approach and consider each requirement separately. What is the break-even point in dollars? In units?
Compute walton profit margin : Compute Walton's profit margin, turnover and return on investment for 2018. (Round "Profit margin" and "Return on investment" to 1 decimal place.)
Identify a recent ethically questionable situation : Identify a recent (within the last six (6) months) ethical dilemma or ethically questionable situation relating to ICT that you are familiar with.
Determine the total compensation cost : Walters Audio Visual Inc. offers an incentive stock option plan to its regional managers. On January 1, 2016, options were granted for 64 million $1 par common.
How does web 2 change security for the internet : Web 2.0 reexamines the Internet from the client, the modeler, and the provider's points of view, each of which permits new and innovative occupations .
What minimum price should violet charge : Violet has received a special order for 110 units of its product. The product normally sells for $2,400 and has the following manufacturing costs.
Describe an it or similar business project you have done : Bases on Balanced Scorecard describe an IT or similar business project you have done or are currently doing.
Calculate the correct cost of the inventory : The Village Hat Shop Limited counted the entire inventory in its store on August 31 and arrived at a total inventory cost of $66,880.
Explain what is meant by the term diversity management : Explain what is meant by the term 'diversity management'. Where would you be likely to find a diversity policy within the organisation

Reviews

Write a Review

Computer Network Security Questions & Answers

  Problem regarding the cyber-attack

This exercise is to identify and characterize assets. Imagine there is a severe natural calamity in your area and your personal vehicles have been rendered immobile. The local mayor is running school buses on their routes to evacuate residents and..

  Write a program in to find the largest value of k

Write a program in to find the largest value of k such that there exists a k-core in a given undirected graph G = (V, E). Also print out the nodes in the largest k-core.

  Enlist the correct number of dns servers that would be need

Enlist the correct number of DNS servers that would be needed?

  Do you feel the security patches help secure your computer

In a separate paragraph, do you feel these security patches help secure your computer? Why? Defend your response.

  Describe the packet-filtering router firewall system

Describe the Packet-filtering router firewall system, Screened host firewall system and Screened-Subnet firewall system.

  Develop a security plan and recommendation memo to the cio

Develop a Security Plan and Recommendation Memo to the CIO

  Wireless security assessment

How does this toolkit differ from that you would use for an application security assessment, wireless security assessment. You can list other types of related assessments if you know if how you might adjust for the given scenario.

  Prepare a presentation about wireless attacks

Prepare a Presentation about Wireless attacks. Detailed description of the area researched, Technology involved in the area and Future trends in the area.

  Udp and tcp use 1s complement for their checksums

Suppose you have the following 2 bytes: 01011100 and 01010110. What is the 1s complement of the sum of these 2 bytes?

  Difference between the terms safety and security

What is the difference between the terms ‘safety' and ‘security' and what is the conclusion of the paper?

  Secure software and systems

What are two of the best practices for developing secure software and systems? Why would each practice be suitable for an organization to implement to strengthen its information security posture? Describe the benefits of each.

  Future of internet anonymity services

Discuss what you believe to be the most important lesson you have learnt as a result of these discussions. Explain the impact of this and its application/impact in real life.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd