Write down as many dns names or ip addresses as you can

Assignment Help Management Information Sys
Reference no: EM132027997

1Q) Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet? How do secure software development concepts support protecting applications?

need 250 words with APA format.

2q) Need a reply of below post with 150 words

Designing set of application principles and techniques for enhancing the web experience is Web 2.0 phenomenon. Every web based application shares different strategy patterns. Web 2.0 is the second generation of WWW. In 2004, Web 2.0 was introduced by Tim O'Reily and Dale Dougherty.

It completely transformed the networking to a different level which has multiple options of not just downloading the content from web but we can add, delete new content using the upload option. The gap between the users and data providers is minimized due to establishment of successful connections among them.

For better interaction among the users and providers, web 2.0 has established applications using Ajax, RSS with much enhanced network connectivity. Internet made the world small, social and user-friendly. As with any new advancement, there come the security breaches and vulnerabilities in the system. Some of the threats are:

Lacking authentication control: Often users handle the websites data and its content but sometimes because of inexpert users there may cause security vulnerabilities in the system. Unauthorized access can be mainly due to weak passwords which help the hackers to easily attack the system in a network.

Lacking control on Brute force: Brute force attacks in web 2.0 are nothing to do with users. Users will not have any control of such attacks. Secured passwords keeps the account protected but when users chooses the save password or remember username and password options, then there is high chance of brute force attacks.

Software life cycle development can fix most of the Web 2.0 vulnerabilities by defining a process to build, develop, deploy and secure the application from its early stages. Agile, RTC waterfall and multiple methods of lifecycle process can prevent the security threats.

3Q) Provide a short narrative on security techniques and mechanisms in protecting against spam activity.

Find at least ten pieces of spam mail from any account. whether it be home, work, school, or something else. Using the e-mail headers, and any web site might provide information,attempt to trace the spam mail back to its original source.

You will need the following materials.

1. Collect the emails and view the email header information in your email program.

2. Find the received field in the headers and write down as many DNS names or IP addresses as you can. Also look for common details in the header elements of the different message. such as the same email servers and spammers.

Reference no: EM132027997

Questions Cloud

What hypothesis test should you use for this problem : Test the claim that the proportion of wins at home is greater than on the road. Use the a = 0.01 significance level.
Discuss about the cloud infrastructure management : Organizations should opt for SLAs that best suit the business requirements, instead of going in for strigent.
Describe various characteristics of each market structure : Construct a table that describes the various characteristics of each market structure. Identify a firm for each of these market structures and explain.
What is the personal and financial cost to us : Everyday we choose one financial decision over another. Should we buy a cup of coffee or should we save that money? What is the personal and financial cost.
Write down as many dns names or ip addresses as you can : Find the received field in the headers and write down as many DNS names or IP addresses as you can.
Discuss the potential customers for this product-service : Describe the product/service including the benefits of using the product/service.Discuss the potential customers for this product/service.
Very environmentally aware moderately environmentally : Very environmentally aware Moderately environmentally aware Not environmentally aware
Why it is important in cloud infrastructure management : A SLA administration framework sending will for the most part incorporate a storehouse used to store and recover collected SLA information .
Two hospital implementation project : What data analysis methods were used in the article Napping on the nightshift: a two hospital implementation project

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd