Sign In
Not register? Register Now!
Essay Available:
You are here: HomeResearch PaperTechnology
2 pages/≈550 words
3 Sources
Research Paper
English (U.S.)
MS Word
Total cost:
$ 12.96


This was a technology based research paper that sought to establish the existing security threats inherent in web 2.0 as well as possible mitigation measures. source..
Web 2.0 Security Threats and Mitigation Measures Student Name University Name The 1st generation World Wide Web (WWW) was a revolutionary invention designed in 1991 and gifted to humanity by Tim Berners-Lee and CERN. Its users were mostly content consumers, only receiving what was presented to them with minimal or no interaction at all. Web 2.0 represents a progressive and aggressive departure from this, more so in the 21st century where participation, contribution of user generated content as well as enhanced usability without the burden of technical knowledge enriches the interaction and experience between browsers and web publishers (Jackson, 2011). It is however good to note that although equal contribution rights to all presents massive benefits towards quality collaboration, debate and engagement, it also exposes its users to significant network vulnerabilities and risks, specifically towards malicious activity and data loss. Increased adoption and entrenchment of most of these Web 2.0 solutions in corporations to enhance productivity and marketing, has led more enterprises to contend with the need to advance in this new direction without the negative tradeoffs for privacy and security risks inherent in such platforms. Examples of such applications that have gained a considerable foothold include social networking technologies like Facebook and twitter. Recent research has further shown that beyond losses in productivity and vulnerabilities to data leaks, Web 2.0 presents inherent security risks which include but are not limited to; malware and virus introduction, information overexposure, spyware increase, spam volume increase, exposed entry points as well as data leaks (Almeida, 2012). Current paths being explored to mitigate these security risks include; development and implementation of organizational policies that regulate use of the Web 2.0 applications, Installation of anti malware software, customization of browser settings to the highest level, integration of data integrity to ensure protection against data loss, avoidance of clickjacking, applic...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Impacts Of Information And Technology To The Family Life In General
    Description: The task was about the role played by information and technology in parenting and family life in general. This sample discusses the impacts of information technology on the family....
    4 pages/≈1100 words| 3 Sources | APA | Technology | Research Paper |
  • Impact Which Technology Had On European Politics In The 20th Century
    Description: The purpose of this study was to determine the impact of technology on European technology in the 20th Century. The paper is designed to look at the propositions that are associated with the technology which are critical towards understanding the impact of technology on the European Union....
    8 pages/≈2200 words| 3 Sources | APA | Technology | Research Paper |
  • The Independent Literature Review: Agile Software Development
    Description: The agile methodologies are based on iterative and incremental development strategies, and goes back five decades ago when the project management researchers based the development strategies on separated design, implementation, execution and eventual testing....
    10 pages/≈2750 words| 13 Sources | APA | Technology | Research Paper |
Need a Custom Essay Written?
First time 15% Discount!